all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 3.55 MiB | November 06 2020 | |||
1 |
|
Internal Photos | Internal Photos | 1.24 MiB | November 06 2020 | |||
1 |
|
External Photos | External Photos | 344.09 KiB | November 06 2020 | |||
1 |
|
Label | ID Label/Location Info | 459.55 KiB | November 06 2020 | |||
1 |
|
Applicant Declaration Letter | Cover Letter(s) | 135.33 KiB | November 06 2020 | |||
1 |
|
Auth letter FCC | Cover Letter(s) | 107.34 KiB | November 06 2020 | |||
1 | Block Diagram | Block Diagram | November 06 2020 | confidential | ||||
1 |
|
MCL | Cover Letter(s) | 186.71 KiB | November 06 2020 | |||
1 |
|
MPE | RF Exposure Info | 464.18 KiB | November 06 2020 | |||
1 | Operation Description | Operational Description | November 06 2020 | confidential | ||||
1 | Schematics | Schematics | November 06 2020 | confidential | ||||
1 |
|
Test Report | Test Report | 1.19 MiB | November 06 2020 | |||
1 |
|
Test Setup photos | Test Setup Photos | 297.05 KiB | November 06 2020 | |||
1 |
|
confidentiality letter | Cover Letter(s) | 78.52 KiB | November 06 2020 |
1 | User Manual | Users Manual | 3.55 MiB | November 06 2020 |
DS-K1T680 Series Face Recognition Terminal User Manual DS-K1T680 Series Face Recognition Terminal User Manual Legal Information 2020 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved. About this Manual The Manual includes instructions for using and managing the Product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find the latest version of this Manual at the Hikvision website ( https://
www.hikvision.com/ ). Please use this Manual with the guidance and assistance of professionals trained in supporting the Product. Trademarks Hikvision in various jurisdictions. Other trademarks and logos mentioned are the properties of their respective owners. and other Hikvision's trademarks and logos are the properties of Disclaimer TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED AS IS AND WITH ALL FAULTS AND ERRORS. HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS. YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW. ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR i DS-K1T680 Series Face Recognition Terminal User Manual PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS ABUSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS. Data Protection During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision devices incorporates privacy by design principles. For example, for device with facial recognition features, biometrics data is stored in your device with encryption method; for fingerprint device, only fingerprint template will be saved, which is impossible to reconstruct a fingerprint image. As data controller, you are advised to collect, store, process and transfer data in accordance with the applicable data protection laws and regulations, including without limitation, conducting security controls to safeguard personal data, such as, implementing reasonable administrative and physical security controls, conduct periodic reviews and assessments of the effectiveness of your security controls. ii DS-K1T680 Series Face Recognition Terminal User Manual Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Danger Caution Note Indicates a hazardous situation which, if not avoided, will or could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance degradation, or unexpected results. Provides additional information to emphasize or supplement important points of the main text. iii DS-K1T680 Series Face Recognition Terminal User Manual Regulatory Information FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. FCC Conditions This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference. 2. This device must accept any interference received, including interference that may cause undesired operation. EU Conformity Statement This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed iv DS-K1T680 Series Face Recognition Terminal User Manual under the EMC Directive 2014/30/EU, RE Directive 2014/53/EU,the RoHS Directive 2011/65/EU 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see:
www.recyclethis.info 2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury
(Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see:www.recyclethis.info v DS-K1T680 Series Face Recognition Terminal User Manual Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Dangers and Cautions:
Dangers: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage. Dangers: Follow these safeguards to prevent serious injury or death. Cautions: Follow these precautions to prevent potential injury or material damage. Danger:
of the nation and region. In the use of the product, you must be in strict compliance with the electrical safety regulations CAUTION: To reduce the risk of fire, replace only with the same type and rating of fuse. CAUTION: This equipment is for use only with Hikvisions bracket. Use with other (carts, stands, or carriers) may result in instability causing injury. To prevent possible hearing damage, do not listen at high volume levels for long periods. Please use the power adapter, which is provided by normal company. The power consumption cannot be less than the required value. Do not connect several devices to one power adapter as adapter overload may cause over-heat Please make sure that the power has been disconnected before you wire, install or dismantle the When the product is installed on wall or ceiling, the device shall be firmly fixed. If smoke, odors or noise rise from the device, turn off the power at once and unplug the power cable, and then please contact the service center. If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.) or fire hazard. device. Cautions:
+ identifies the positive terminal(s) of equipment which is used with, or generates direct current.
+ identifies the negative terminal(s) of equipment which is used with, or generates direct current. No naked flame sources, such as lighted candles, should be placed on the equipment. The USB port of the equipment is used for connecting to a USB flash drive only. The serial port of the equipment is used for debugging only. Burned fingers when handling the fingerprint sensor metal. Wait one-half hour after switching off before handling the parts. vi DS-K1T680 Series Face Recognition Terminal User Manual Install the equipment according to the instructions in this manual. To prevent injury, this equipment must be securely attached to the floor/wall in accordance with the installation instructions. Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage). Do not place the device in extremely hot (refer to the specification of the device for the detailed operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation. Exposing the equipment to direct sun light, low ventilation or heat source such as heater or radiator is forbidden (ignorance can cause fire danger). Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise (which is not a malfunction however), and affecting the endurance of sensor at the same time. Please use the provided glove when open up the device cover, avoid direct contact with the device cover, because the acidic sweat of the fingers may erode the surface coating of the device cover. Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do not use alkaline detergents. Please keep all wrappers after unpack them for future use. In case of any failure occurred, you need to return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs. Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer. Biometric recognition products are not 100% applicable to anti-spoofing environments. If you require a higher security level, use multiple authentication modes. Please make sure that the biometric recognition accuracy will be affected by the collected pictures' quality and the light in the environment, which cannot be 100% correct. vii DS-K1T680 Series Face Recognition Terminal User Manual Available Models Product Name Model Face Recognition Terminal Use only power supplies listed in the user instructions:
Model Manufacturer Standard ADS-26FSG-12 12024EPG Shenzhen Honor Electronic Co.,Ltd MSA-C2000IC12.0-24P-DE MOSO Technology Co.,Ltd ADS-26FSG-12 12024EPB Shenzhen Honor Electronic Co.,Ltd ADS-26FSG-12 12024EPCU/EPC Shenzhen Honor Electronic PCU ADS-26FSG-12 12024EPI-01 ADS-26FSG-12 12024EPBR Co.,Ltd Shenzhen Honor Electronic Co.,Ltd Shenzhen Honor Electronic Co.,Ltd PG PDE PB PI PBR DS-K1T680D-E1 DS-K1T680D DS-K1T680DW DS-K1T680DG DS-K1T680DG1 DS-K1T680DF-E1 DS-K1T680DF DS-K1T680DFW DS-K1T680DFG DS-K1T680DFG1 viii DS-K1T680 Series Face Recognition Terminal User Manual Contents Chapter 1 Overview .................................................................................................................... 1 1.1 Overview ................................................................................................................................ 1 1.2 Features ................................................................................................................................. 1 Chapter 2 Appearance ................................................................................................................ 2 Chapter 3 Installation ................................................................................................................. 4 3.1 Installation Environment ........................................................................................................ 4 3.2 Flush Mounting with Gang Box .............................................................................................. 4 3.3 Surface Mounting .................................................................................................................. 6 Chapter 4 Wiring ...................................................................................................................... 10 4.1 Terminal Description ............................................................................................................ 10 4.2 Wire Normal Device ............................................................................................................. 12 4.3 Wire Secure Door Control Unit ............................................................................................ 13 4.4 Wire Fire Module ................................................................................................................. 14 4.4.1 Wiring Diagram of Door Open When Powering Off .................................................... 14 4.4.2 Wiring Diagram of Door Locked When Powering Off .................................................. 16 Chapter 5 Activation ................................................................................................................. 18 5.1 Activate via Device ............................................................................................................... 18 5.2 Activate via Web Browser .................................................................................................... 20 5.3 Activate via SADP ................................................................................................................. 20 5.4 Activate Device via Client Software ...................................................................................... 21 Chapter 6 Quick Operation ....................................................................................................... 23 6.1 Select Language ................................................................................................................... 23 6.2 Set Application Mode .......................................................................................................... 23 6.3 Set Network Parameters ...................................................................................................... 24 6.4 Link to Mobile Client ............................................................................................................ 26 6.5 Set Administrator ................................................................................................................. 26 ix DS-K1T680 Series Face Recognition Terminal User Manual Chapter 7 Basic Operation ........................................................................................................ 29 7.1 Login .................................................................................................................................... 29 7.1.1 Login by Administrator ................................................................................................ 29 7.1.2 Login by Activation Password ...................................................................................... 30 7.2 Communication Settings ...................................................................................................... 31 7.2.1 Set Wired Network Parameters .................................................................................. 31 7.2.2 Set Wi-Fi Parameters ................................................................................................... 32 7.2.3 Set RS-485 Parameters ................................................................................................ 34 7.2.4 Set Wiegand Parameters ............................................................................................. 34 7.2.5 Enable 3G/4G .............................................................................................................. 35 7.3 User Management ............................................................................................................... 35 7.3.1 Add Administrator ....................................................................................................... 35 7.3.2 Add Face Picture ......................................................................................................... 37 7.3.3 Add Fingerprint ........................................................................................................... 39 7.3.4 Add Card ..................................................................................................................... 40 7.3.5 View Password ............................................................................................................ 41 7.3.6 Set Authentication Mode ............................................................................................ 42 7.3.7 Search and Edit User ................................................................................................... 43 7.4 Data Management ............................................................................................................... 43 7.4.1 Delete Data ................................................................................................................. 43 7.4.2 Import Data ................................................................................................................. 43 7.4.3 Export Data ................................................................................................................. 44 7.5 Identity Authentication ........................................................................................................ 44 7.5.1 Authenticate via Single Credential .............................................................................. 45 7.5.2 Authenticate via Multiple Credential .......................................................................... 45 7.6 Basic Settings ....................................................................................................................... 46 7.7 Set Biometric Parameters .................................................................................................... 47 7.8 Set Access Control Parameters ............................................................................................ 49 x DS-K1T680 Series Face Recognition Terminal User Manual 7.9 Time and Attendance Status Settings .................................................................................. 50 7.9.1 Disable Attendance Mode via Device ......................................................................... 51 7.9.2 Set Manual Attendance via Device ............................................................................. 51 7.9.3 Set Auto Attendance via Device .................................................................................. 52 7.9.4 Set Manual and Auto Attendance via Device .............................................................. 54 7.10 System Maintenance .......................................................................................................... 55 7.11 Video Intercom .................................................................................................................. 56 7.11.1 Call Client Software from Device ............................................................................... 56 7.11.2 Call Center from Device ............................................................................................ 57 7.11.3 Call Device from Client Software ............................................................................... 58 7.11.4 Call Room from Device .............................................................................................. 58 Chapter 8 Operation via Web Browser ...................................................................................... 59 8.1 Login .................................................................................................................................... 59 8.2 Live View .............................................................................................................................. 59 8.3 Person Management ............................................................................................................ 60 8.4 Search Event ........................................................................................................................ 61 8.5 Configuration ....................................................................................................................... 62 8.5.1 Set Local Parameters ................................................................................................... 62 8.5.2 View Device Information ............................................................................................. 62 8.5.3 Set Time ...................................................................................................................... 62 8.5.4 Set DST ........................................................................................................................ 63 8.5.5 View Open Source Software License ........................................................................... 63 8.5.6 Upgrade and Maintenance ......................................................................................... 64 8.5.7 Security Mode Settings ............................................................................................... 65 8.5.8 Change Administrator's Password ............................................................................... 65 8.5.9 Network Settings ......................................................................................................... 66 8.5.10 Set Video and Audio Parameters .............................................................................. 69 8.5.11 Set Image Parameters ............................................................................................... 69 xi DS-K1T680 Series Face Recognition Terminal User Manual 8.5.12 Set Supplement Light Brightness .............................................................................. 70 8.5.13 Time and Attendance Settings .................................................................................. 71 8.5.14 Set Video Intercom Parameters ................................................................................ 73 8.5.15 Set Access Control and Authentication Parameters .................................................. 75 8.5.16 Set Card Security ....................................................................................................... 76 8.5.17 Configure SIP Parameters .......................................................................................... 76 8.5.18 Set RS-485 Parameters .............................................................................................. 77 8.5.19 Set Wiegand Parameters ........................................................................................... 77 8.5.20 Set Biometric Parameters ......................................................................................... 78 8.5.21 Set Notice Publication ............................................................................................... 81 Chapter 9 Client Software Configuration ................................................................................... 82 9.1 Configuration Flow of Client Software ................................................................................. 82 9.2 Device Management ............................................................................................................ 82 9.2.1 Add Device .................................................................................................................. 83 9.2.2 Reset Device Password ................................................................................................ 90 9.3 Group Management ............................................................................................................. 91 9.3.1 Add Group ................................................................................................................... 91 9.3.2 Import Resources to Group ......................................................................................... 92 9.3.3 Edit Resource Parameters ........................................................................................... 92 9.3.4 Remove Resources from Group .................................................................................. 93 9.4 Person Management ............................................................................................................ 93 9.4.1 Add Organization ........................................................................................................ 93 9.4.2 Configure Basic Information ....................................................................................... 94 9.4.3 Issue a Card by Local Mode ......................................................................................... 94 9.4.4 Upload a Face Photo from Local PC ............................................................................ 96 9.4.5 Take a Photo via Client ................................................................................................ 96 9.4.6 Collect Face via Access Control Device ....................................................................... 97 9.4.7 Collect Fingerprint via Client ....................................................................................... 98 xii DS-K1T680 Series Face Recognition Terminal User Manual 9.4.8 Collect Fingerprint via Access Control Device ............................................................. 99 9.4.9 Configure Access Control Information ........................................................................ 99 9.4.10 Customize Person Information ................................................................................ 101 9.4.11 Configure Resident Information .............................................................................. 102 9.4.12 Configure Additional Information ........................................................................... 102 9.4.13 Import and Export Person Identify Information ...................................................... 103 9.4.14 Import Person Information ..................................................................................... 103 9.4.15 Import Person Pictures ........................................................................................... 103 9.4.16 Export Person Information ...................................................................................... 104 9.4.17 Export Person Pictures ............................................................................................ 104 9.4.18 Get Person Information from Access Control Device .............................................. 105 9.4.19 Move Persons to Another Organization .................................................................. 105 9.4.20 Issue Cards to Persons in Batch ............................................................................... 106 9.4.21 Report Card Loss ..................................................................................................... 106 9.4.22 Set Card Issuing Parameters .................................................................................... 107 9.5 Configure Schedule and Template ..................................................................................... 108 9.5.1 Add Holiday ............................................................................................................... 108 9.5.2 Add Template ............................................................................................................ 109 9.6 Set Access Group to Assign Access Authorization to Persons ............................................ 110 9.7 Configure Advanced Functions .......................................................................................... 112 9.7.1 Configure Device Parameters .................................................................................... 112 9.7.2 Configure Remaining Open/Closed ........................................................................... 117 9.7.3 Configure Multi-Factor Authentication ..................................................................... 118 9.7.4 Configure Card Reader Authentication Mode and Schedule .................................... 120 9.7.5 Configure First Person In ........................................................................................... 122 9.7.6 Configure Anti-Passback ........................................................................................... 123 9.7.7 Configure Multi-door Interlocking ............................................................................ 124 9.7.8 Configure Device Parameters .................................................................................... 125 xiii DS-K1T680 Series Face Recognition Terminal User Manual 9.8 Configure Linkage Actions for Access Control .................................................................... 131 9.8.1 Configure Client Actions for Access Event ................................................................. 131 9.8.2 Configure Device Actions for Access Event ............................................................... 132 9.8.3 Configure Device Actions for Card Swiping ............................................................... 133 9.8.4 Configure Device Actions for Person ID .................................................................... 134 9.9 Door Control ...................................................................................................................... 135 9.9.1 Control Door Status ................................................................................................... 135 9.9.2 Check Real-Time Access Records .............................................................................. 136 9.10 Event Center .................................................................................................................... 137 9.10.1 Enable Receiving Event from Devices ..................................................................... 138 9.10.2 View Real-Time Events ............................................................................................ 138 9.10.3 Search Historical Events .......................................................................................... 139 9.11 Time and Attendance ....................................................................................................... 142 9.11.1 Configure Attendance Parameters .......................................................................... 142 9.11.2 Add General Timetable ........................................................................................... 148 9.11.3 Add Shift .................................................................................................................. 150 9.11.4 Manage Shift Schedule ........................................................................................... 152 9.11.5 Manually Correct Check-in/out Record ................................................................... 155 9.11.6 Add Leave and Business Trip ................................................................................... 156 9.11.7 Calculate Attendance Data ...................................................................................... 157 9.11.8 Attendance Statistics .............................................................................................. 158 Appendix A. Tips for Scanning Fingerprint ............................................................................... 162 Appendix B. Tips When Collecting/Comparing Face Picture .................................................... 164 Appendix C. Tips for Installation Environment ........................................................................ 166 Appendix D. Dimension .......................................................................................................... 167 Appendix E. Function Differences ........................................................................................... 169 Appendix F. Communication Matrix and Device Command ..................................................... 170 xiv DS-K1T680 Series Face Recognition Terminal User Manual Chapter 1 Overview Face recognition terminal is a kind of access control device for face recognition, which is mainly applied in security access control systems, such as logistic centers, airports, university campuses, alarm centrals, dwellings, etc. 1.1 Overview 1.2 Features 8-inch touch screen with bezel-less design Presents card on the screen to authenticate card permission. 2 MP wide-angle dual-lens Face anti-spoofing Face recognition distance: 0.3 m to 3 m Deep learning algorithm Up to 100,000 face capacity, 100,000 card capacity, and 150,000 event capacity Face recognition duration 0.2 s/User; face recognition accuracy rate 99%
Capture linkage and captured pictures storage Transmits card and user data from or to the client software via TCP/IP protocol and saves the Imports pictures from the USB flash drive to the device or export pictures, events, from the data on the client software device to the USB flash drive Stand-alone operation Manage, search and set device data after logging in the device locally Connects to one external card reader via RS-485 protocol Connects to secure door control unit via RS-485 protocol to avoid the door opening when the Connects to external access controller or Wiegand card reader via Wiegand protocol Two-way audio with indoor station and master station Supports 6 attendance status, including check in, check out, break in, break out, overtime in, terminal is destroyed overtime out Configuration via the web client Remotely opens door and starts live view via Hik-Connect Supports ISAPI and ISUP 5.0 protocol Supports multiple languages: English, Thai, Portuguese, Russian, Spanish, Arabic, Japanese, Ukrainian, and Indonesian Self-defined voice prompt of authentication result 1 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 2 Appearance Refer to the following contents for detailed information of the face recognition terminal:
Figure 2-1 Face Recognition Terminal Diagram Table 2-1 Description of Face Recognition Terminal No. Description USB to micro USB cable is included in the package. 1 2 3 4 5 6 7 8 9 10 11 microUSB Interface Note Card Presenting Area Touch Screen IR Light Camera Camera IR Light Fingerprint Module Debugging Port microSIM Card Slot Network Interface 2 DS-K1T680 Series Face Recognition Terminal User Manual No. Description Note If the device supports PoE, the network interface supports power supply by PoE. If the device supports power supply by PoE and the network interface is connected, do not wire the power input terminal. 12 13 14 Loudspeaker TAMPER Wiring Terminals 3 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 3 Installation 3.1 Installation Environment Avoid backlight, direct sunlight, and indirect sunlight. For better recognition, there should be light source in or near the installation environment. If you have to install the device outdoors, you should install a protective shield (optional) for the For details about installation environment, see Tips for Installation Environment. 3.2 Flush Mounting with Gang Box device. Note Steps Note The gang box is optional. You should purchase it separately. 1. Remove the back sheet under the TAMPER button by removing the 2 screws. Secure the mounting plate on the base plate with 4 screws. Remove the sponge tage on the base plate and secure the device on the mounting plate with 2 screws. Figure 3-1 Secure the Device on the mounting plate 2. Secure the decoration plate on the base plate with 4 screws. Stick 3 waterproof membranes on the decoration plate as shown below. Route the cable through the cable hole of the plates, and connect to external device's cables. Note The waterproof membranes is used only in the flush mounting. 4 DS-K1T680 Series Face Recognition Terminal User Manual Figure 3-2 Secure the Decoration Plate on the Base Plate 3. Dig a hole (242 mm 114 mm 30.5 mm) on the wall. Place a gang box in the hole (a), and remove the 4 mounting ears with tool (b). Secure the combination and the gang box with 1 screw (c). Figure 3-3 Secure the Combination and the Gang Box 5 DS-K1T680 Series Face Recognition Terminal User Manual 3.3 Surface Mounting Steps Note The additional force shall be equal to three times the weight of the equipment. The equipment ad its associated mounting means shall remain secure during the installation. After the installation, the equipment, including any associated mounting plate, shall not be damaged. 1. According to the datum line on the mounting template, stick the mounting template on the wall or other surfaces, 1.4 meters higher than the ground. 6 DS-K1T680 Series Face Recognition Terminal User Manual Figure 3-4 Mounting Template 2. Drill holes on the wall or other surface according to the Hole 1 and Hole 2 on the mounting 3. Remove the cable hole on the mounting plate with tools. 4. Align the holes to the mounting plate and secure the mounting plate on the wall with the 4 template. supplied screws (Pa425). 7 DS-K1T680 Series Face Recognition Terminal User Manual Figure 3-5 Install Mounting Plate 5. Route the cable through the cable hole of the mounting plate, and connect to corresponding external devices' cables. 6. Align the device with the mounting plate and hang the device on the mounting plate. 7. Use 2 supplied screw (KM36) to secure the device and the mounting plate. Figure 3-6 Hang Device 8 DS-K1T680 Series Face Recognition Terminal User Manual Figure 3-7 Secure Device 9 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 4 Wiring The device supports connecting to the RS-485 terminal, the door lock, the exit button, the alarm output/input devices, the Wiegand card reader, the access controller, and the power supply. You can wire the peripherals according to the descriptions below. If connect the Wiegand card reader with the access controller, the face recognition terminal can transmit the authentication information to the access controller and the access controller can judge whether to open the door or not. Note If the cable size is 18 AWG, you should use a 12 V switched-mode power supply. And the distance between the power supply and the device should be no more than 20 m. If the cable size is 15 AWG, you should use a 12 V switched-mode power supply. And the distance between the power supply and the device should be no more than 30 m. If the cable size is 12 AWG, you should use a 12 V switched-mode power supply. And the distance between the power supply and the device should be no more than 40 m. 4.1 Terminal Description The terminals contains power input, alarm input, alarm output, RS-485, Wiegand output, and door lock. The terminal's diagram is as follows:
10 DS-K1T680 Series Face Recognition Terminal User Manual The descriptions of the terminals are as follows:
Figure 4-1 Terminal Diagram Table 4-1 Terminal Descriptions Group No. Function Color Name Description Power Input Red
+12 ~ 24 VDC Power Supply Group A Group B A1 A2 B1 B2 B3 B4 B5 B6 Alarm Input Yellow/Blue Black Black GND IN1 GND Yellow/Orange IN2 Alarm Output Yellow/Purple NC Yellow/Brown COM Yellow/Red NO Ground Alarm Input 1 Ground Alarm Input 2 Alarm Output Wiring 11 DS-K1T680 Series Face Recognition Terminal User Manual Group No. Function Color Name Description Group C RS-485 RS-485 Wiring C1 C2 C3 C4 C5 C6 D1 D2 D3 D4 D5 D6 D7 Wiegand Yellow Blue Black Green White Black 485+
485-
GND W0 W1 GND White/Yellow COM White/Red NO Black Yellow/Gray GND BTN Yellow/Black GND Ground Wiegand Wiring 0 Wiegand Wiring 1 Ground Lock Wiring
(NC) Common Lock Wiring
(NO) Ground Exit Door Wiring Ground Yellow/Green SENSOR Door Contact Group D Door Lock White/Purple NC 4.2 Wire Normal Device You can connect the terminal with normal peripherals. 12 DS-K1T680 Series Face Recognition Terminal User Manual Figure 4-2 Device Wiring Note You should set the face recognition terminal's Wiegand direction as Input to connect to a Wiegand card reader. If connects to an access controller, you should set the Wiegand direction as Output to transmit authentication information to the access controller. For details about Wiegand direction settings, see Set Wiegand Parameters . Do not wire the device to the electric supply directly. 4.3 Wire Secure Door Control Unit You can connect the terminal with the secure door control unit. The wiring diagram is as follows. Figure 4-3 Secure Door Control Unit Wiring 13 DS-K1T680 Series Face Recognition Terminal User Manual Note The secure door control unit should connect to an external power supply separately. The suggested external power supply is 12V, 0.5A. 4.4 Wire Fire Module 4.4.1 Wiring Diagram of Door Open When Powering Off Lock Type: Anode Lock, Magnetic Lock, and Electric Bolt (NO) Security Type: Door Open When Powering Off Scenario: Installed in Fire Engine Access Type 1 Note The fire system controls the power supply of the access control system. Figure 4-4 Wire Device 14 DS-K1T680 Series Face Recognition Terminal User Manual Figure 4-5 Wire Secure Door Control Unit Type 2 Note The fire system (NO and COM, normally open when powering off) is connected with the lock and the power supply in series. When an fire alarm is triggered, the door remains open. In normal times, NO and COM are closed. Figure 4-6 Wiring Device 15 DS-K1T680 Series Face Recognition Terminal User Manual Figure 4-7 Wiring Secure Door Control Unit 4.4.2 Wiring Diagram of Door Locked When Powering Off Lock Type: Cathode Lock, Electric Lock, and Electric Bolt (NC) Security Type: Door Locked When Powering Off Scenario: Installed in Entrance/Exit with Fire Linkage Note The Uninterpretable Power Supply (UPS) is required. The fire system (NC and COM, normally closed when powering off) is connected with the lock and the power supply in series. When an fire alarm is triggered, the door remains open. In normal times, NC and COM are open. 16 DS-K1T680 Series Face Recognition Terminal User Manual Figure 4-8 Device Wiring Figure 4-9 Wiring Diagram 17 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 5 Activation You should activate the device before the first login. After powering on the device, the system will switch to Device Activation page. Activation via the device, SADP tool and the client software are supported. The default values of the device are as follows:
The default IP address: 192.0.0.64 The default port No.: 8000 The default user name: admin 5.1 Activate via Device If the device is not activated, you can activate the device after it is powered on. On the Activate Device page, create a password and confirm the password. Tap Activate and the device will activated. 18 DS-K1T680 Series Face Recognition Terminal User Manual Figure 5-1 Activation Page Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. After activation, you should select a language according to your actrual needs. After activation, you should select an application mode. For details, see Set Application Mode . After activation, if you need to add the device to the client software or other platforms, you should edit the device IP address. For details, see Set Network Parameters . 19 DS-K1T680 Series Face Recognition Terminal User Manual After activation, if you need to operate the device remotely via APP, you should scan the QR code to link to the APP. For details, see Link to Mobile Client . After activation, if you need to add administrator to manage the device parameters, you should set administrator. For details, see Add Administrator . 5.2 Activate via Web Browser You can activate the device via the web browser. Steps 1. Enter the device default IP address (192.0.0.64) in the address bar of the web browser, and press Enter. Note Caution Make sure the device IP address and the computer's should be in the same IP segment. 2. Create a new password (admin password) and confirm the password. STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 3. Click Activate. 4. Edit the device IP address. You can edit the IP address via the SADP tool, the device, and the client software. 5.3 Activate via SADP SADP is a tool to detect, activate and modify the IP address of the device over the LAN. Before You Start Get the SADP software from the supplied disk or the official website http://
www.hikvision.com/en/ , and install the SADP according to the prompts. The device and the PC that runs the SADP tool should be within the same subnet. The following steps show how to activate a device and modify its IP address. For batch activation and IP addresses modification, refer to User Manual of SADP for details. Steps 1. Run the SADP software and search the online devices. 2. Find and select your device in online device list. 3. Input new password (admin password) and confirm the password. 20 DS-K1T680 Series Face Recognition Terminal User Manual Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Click Activate to start activation. Status of the device becomes Active after successful activation. 5. Modify IP address of the device. 1) Select the device. 2) Change the device IP address to the same subnet as your computer by either modifying the IP address manually or checking Enable DHCP. 3) Input the admin password and click Modify to activate your IP address modification. 5.4 Activate Device via Client Software For some devices, you are required to create the password to activate them before they can be added to the software and work properly. Steps Note This function should be supported by the device. on the right of Device Management and select Device. 1. Enter the Device Management page. 2. Click 3. Click Online Device to show the online device area. The searched online devices are displayed in the list. 21 DS-K1T680 Series Face Recognition Terminal User Manual 4. Check the device status (shown on Security Level column) and select an inactive device. 5. Click Activate to open the Activation dialog. 6. Create a password in the password field, and confirm the password. Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 7. Click OK to activate the device. 22 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 6 Quick Operation 6.1 Select Language You can select a language for the device system. After the device activation, you can select a language for the device system. Figure 6-1 Select System Language 6.2 Set Application Mode After activating the device, you should select an application mode for better device application. Steps 1. On the Welcome page, select Indoor or Others from the drop-down list. 23 DS-K1T680 Series Face Recognition Terminal User Manual Figure 6-2 Welcome Page 2. Tap OK to save. Note You can also change the settings in System Settings. If you install the device indoors near the window or the face recognition function is not If you do not configure the application mode and tap Next, the system will select Indoor by If you activate the device via other tools remotely, the system will select Indoor as the working well, select Others. default. application mode by default. 6.3 Set Network Parameters After activation and select application mode, you can set the network for the device 24 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. When you enter the Select Network page, tap Wired Network or Wi-Fi for your actual needs. Figure 6-3 Select Network Disconnect the wired network before connecting a Wi-Fi. Note 2. Tap Next. Wired Network Note Make sure the device has connected to a network. If enable DHCP, the system will assign the IP address and other parameters automatically. If disable DHCP, you should set the IP address, the subnet mask, and the gateway. Wi-Fi Select a Wi-Fi and enter the Wi-Fi's password to get connected. 25 DS-K1T680 Series Face Recognition Terminal User Manual Or tap Add Wi-Fi and enter the Wi-Fi's name and the password to get connected. 3. Optional: Tap Skip to skip network settings. 6.4 Link to Mobile Client After activation, selecting application mode, selecting networking, you can add the device to the mobile client. Download and install the mobile client. Use the scan QR code function of the mobile client and scan the QR code displayed on the device to link the device to the mobile client. Follow the instructions to link the device to the mobile client. Figure 6-4 Link to Mobile Client 6.5 Set Administrator After device activation, you can add an administrator to manage the device parameters. 26 DS-K1T680 Series Face Recognition Terminal User Manual Before You Start Activate the device and select an application mode. Steps 1. Optional: Tap Skip to skip adding administrator if required. 2. Enter the administrator's name (optional) and tap Next. Figure 6-5 Add Administrator Page 3. Select a credential to add. Note Up to one credential should be added.
: Face forward at the camera. Make sure the face is in the face recognition area. Click to capture and click to confirm.
: Press your finger according to the instructions on the device screen. Click
: Enter the card No. or present card on the card presenting area. Click OK. to confirm. 4. Click OK. You will enter the authentication page. 27 DS-K1T680 Series Face Recognition Terminal User Manual Status Icon Description Device is armed/not armed. Hik-Connect is enabled/disabled.
3G/4G is enabled. Shortcut Keys Description Note The device wired network is connected/not connected/connecting failed. The device' Wi-Fi is enabled and connected/not connected/enabled but not connected. You can configure those shortcut keys displayed on the screen. For details, see Basic Settings . Scan QR code to authenticate. The QR code can be obtained from the visitor terminal. Enter the device room No. and tap OK to call. Tap to call the center. Note Note Enter password to authenticate. The device should be added to the center, or the calling operation will be failed. 28 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 7 Basic Operation 7.1 Login Login the device to set the device basic parameters. 7.1.1 Login by Administrator If you have added an administrator for the device, only the administrator can login the device for device operation. Steps 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture to enter the admin login page. 2. Authenticate the administrator's face, fingerprint or card to enter the home page. Figure 7-1 Admin Login 29 DS-K1T680 Series Face Recognition Terminal User Manual Figure 7-2 Home Page Note The device will be locked for 30 minutes after 5 failed fingerprint or card attempts. 3. Optional: Tap 4. Optional: Tap and you can enter the device activation password for login. and you can exit the admin login page. 7.1.2 Login by Activation Password You should login the system before other device operations. If you do not configure an administrator, you should follow the instructions below to login. Steps 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture to enter password entering page. 2. Tap the Password field and enter the device activation password. 3. Tap OK to enter the home page. 30 DS-K1T680 Series Face Recognition Terminal User Manual Note The device will be locked for 30 minutes after 5 failed password attempts. Figure 7-3 Home Page 7.2 Communication Settings You can set the network parameters, the Wi-Fi parameter, the RS-485 parameters, the Wiegand parameters, and enable 3G/4G on the communication settings page. 7.2.1 Set Wired Network Parameters You can set the device wired network parameters, including the IP address, the subnet mask, and the gateway. 31 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page. 2. On the Communication Settings page, tap Wired Network. 3. Set DHCP, IP Address, Subnet Mask, or Gateway. Figure 7-4 Wired Network Settings Note The device's IP address and the computer IP address should be in the same IP segment. 7.2.2 Set Wi-Fi Parameters You can enable the Wi-Fi function and set the Wi-Fi related parameters. Steps Note page. The function should be supported by the device. 1. Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings 2. On the Communication Settings page, tap. 32 DS-K1T680 Series Face Recognition Terminal User Manual 3. Enable the Wi-Fi function. 4. Configure the Wi-Fi parameters. Figure 7-5 Wi-Fi Settings
- Select a Wi-Fi from the list, and enter the Wi-Fi's password. Tap OK.
If the target Wi-Fi is not in the list,tap Add Wi-Fi. Enter the Wi-Fi's name and password. And tap OK. Only digits, letters, and special characters are allowed in the password. Note 5. Set the Wi-Fi's parameters.
- By default, DHCP is enable. The system will allocate the IP address, the subnet mask, and the
gateway automatically. If disable DHCP, you should enter the IP address, the subnet mask, and the gateway manually. 6. Tap OK to save the settings and go back to the Wi-Fi tab. 7. Tap to save the network parameters. 33 DS-K1T680 Series Face Recognition Terminal User Manual 7.2.3 Set RS-485 Parameters The face recognition terminal can connect external access controller, secure door control unit or card reader via the RS-485 terminal. Steps 1. Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page. 2. On the Communication Settings page, tap RS-485 to enter the RS-485 tab. 3. Select an peripheral type according to your actual needs. Figure 7-6 Set RS-485 Parameters If you select Access Controller: If connect the device to a terminal via the RS-485 interface, set the RS-485 address as 2. If you connect the device to a controller, set the RS-485 address according to the door No. 4. Tap the back icon at the upper left corner and you should reboot the device if you change the Note parameters. 7.2.4 Set Wiegand Parameters You can set the Wiegand transmission direction. 34 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page. 2. On the Communication Settings page, tap Wiegand to enter the Wiegand tab. 3. Enable the Wiegand function. 4. Select a transmission direction. Figure 7-7 Wiegand Settings Output: A face recognition terminal can connect an external access controller. And the two devices will transmit the card No. via Wiegand 34. Input: A face recognition terminal can connect a Wiegand card reader. 5. Tap to save the network parameters. Note If you change the external device, and after you save the device parameters, the device will reboot automatically. 7.2.5 Enable 3G/4G You can enable the 3G/4G function to connect the 3G/4G network . Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page, and enable 3G/4G. On the user management interface, you can add, edit, delete and search the user. 7.3 User Management 7.3.1 Add Administrator The administrator can log in the device backend and configure the device parameters. 35 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Long tap on the initial page and log in the backend. 2. Tap User + to enter the Add User page. 3. Edit the employee ID. Note The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers. The employee ID should not be duplicated. 4. Tap the Name field and input the user name on the soft keyboard. Note name. Numbers, upper case letters, lower case letters, and special characters are allowed in the user Up to 32 characters are allowed in the user name. 5. Optional: Add a face picture, fingerprints, cards, or password for the administrator. 36 DS-K1T680 Series Face Recognition Terminal User Manual For details about adding a face picture, see Add Face Picture . For details about adding a fingerprint, see Add Fingerprint . For details about adding a card, see Add Card . For details about adding a password, see View Password . 6. Optional: Set the administrator's authentication type. Note Note Note For details about setting the authentication type, see Set Authentication Mode . 7. Enable the Administrator Permission function. Enable Administrator Permission The user is the administrator. Except for the normal attendance function, the user can also enter the Home page to operate after authenticating the permission. 8. Tap to save the settings. 7.3.2 Add Face Picture Add user's face picture to the device. And the user can use the face picture to authenticate. Steps 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and log in the backend. 2. Tap User + to enter the Add User page. 3. Edit the employee ID. The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers. The employee ID should not be duplicated. 4. Tap the Name field and input the user name on the soft keyboard. Numbers, upper case letters, lower case letters, and special characters are allowed in the user The suggested user name should be within 32 characters. 5. Tap the Face Picture field to enter the face picture adding page. Note Note name. 37 DS-K1T680 Series Face Recognition Terminal User Manual Figure 7-8 Add Face Picture 6. Look at the camera. Note Make sure your face picture is in the face picture outline when adding the face picture. Make sure the captured face picture is in good quality and is accurate. For details about the instructions of adding face pictures, see Tips When Collecting/
Comparing Face Picture . After completely adding the face picture, a captured face picture will be displayed at the upper right corner of the page. 7. Tap Save to save the face picture. 8. Optional: Tap Try Again and adjust your face position to add the face picture again. 9. Set the user role. Administrator The user is the administrator. Except for the normal attendance function, the user can also enter the Home page to operate after authenticating the permission. 38 DS-K1T680 Series Face Recognition Terminal User Manual The User is the normal user. The user can only authenticate or take attendance on the initial page. Normal User 10. Tap to save the settings. 7.3.3 Add Fingerprint Steps Note Add a fingerprint for the user and the user can authenticate via the added fingerprint. 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and enter The function should be supported by the device. Up to 10,000 fingerprints can be added. the device backend. 2. Tap User + to enter the Add User page. 3. Tap the Employee ID. field and edit the employee ID. The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers. The employee ID should not start with 0 and should not be duplicated. 4. Tap the Name field and input the user name on the soft keyboard. Numbers, upper case letters, lower case letters, and special characters are allowed in the user The suggested user name should be within 32 characters. 5. Tap the Fingerprint field to enter the Add Fingerprint page. Note Note name. 39 DS-K1T680 Series Face Recognition Terminal User Manual 6. Follow the instructions to add a fingerprint. Note The same fingerprint cannot be repeatedly added. Up to 10 fingerprints can be added for one user. You can also use the client software or the fingerprint recorder to record fingerprints. For details about the instructions of scanning fingerprints, see Tips for Scanning Fingerprint . The user is the administrator. Except for the normal attendance function, the user can also enter the Home page to operate after authenticating the permission. The User is the normal user. The user can only authenticate or take attendance on the initial page. 8. Tap to save the settings. Add a card for the user and the user can authenticate via the added card. 7. Set the user role. Administrator Normal User 7.3.4 Add Card Steps Note 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and log in Up to 100,000 cards can be added. the backend. 2. Tap User + to enter the Add User page. 40 Note Note name. Note DS-K1T680 Series Face Recognition Terminal User Manual 3. Connect an external card reader according to the wiring diagram. 4. Tap the Employee ID. field and edit the employee ID. The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers. The employee ID should not be duplicated. 5. Tap the Name field and input the user name on the soft keyboard. Numbers, upper case letters, lower case letters, and special characters are allowed in the user The suggested user name should be within 32 characters. 6. Tap the Card field and tap +. 7. Configure the card No.
- Enter the card No. manually.
- Present the card over the card presenting area to get the card No. The card No. cannot be empty. Up to 20 characters are allowed in the card No. The card No. cannot be duplicated. 8. Configure the card type. 9. Set the user role. Administrator Normal User 10. Tap to save the settings. 7.3.5 View Password The user is the administrator. Except for the normal attendance function, the user can also enter the Home page to operate after authenticating the permission. The User is the normal user. The user can only authenticate or take attendance on the initial page. Add a password for the user and the user can authenticate via the password. Steps 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and log in the backend. 2. Tap User + to enter the Add User page. 41 Note Note name. Note DS-K1T680 Series Face Recognition Terminal User Manual 3. Tap the Employee ID. field and edit the employee ID. The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers. The employee ID should not be duplicated. 4. Tap the Name field and input the user name on the soft keyboard. Numbers, upper case letters, lower case letters, and special characters are allowed in the user The suggested user name should be within 32 characters. 5. Tap the Password to view the password. The password cannot be edited. It can only be applied by the platform. 6. Set the user role. Administrator Normal User The user is the administrator. Except for the normal attendance function, the user can also enter the Home page to operate after authenticating the permission. The User is the normal user. The user can only authenticate or take attendance on the initial page. 7. Tap to save the settings. 7.3.6 Set Authentication Mode After adding the user's face picture, password, or other credentials, you should set the authentication mode and the user can authenticate his/her identity via the configured authentication mode. Steps 1. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and log in 2. Tap User Add User/Edit User Authentication Mode . 3. Select Device or Custom as the authentication mode. the backend. Device If you want to select device mode, you should set the terminal authentication mode in Access Control Settings page first. For details see Setting Access Control Parameters. 42 DS-K1T680 Series Face Recognition Terminal User Manual You can combine different authentication modes together according to your actual needs. Custom 4. Tap to save the settings. 7.3.7 Search and Edit User After adding the user, you can search the user and edit it. Search User On the User Management page, Tap the search area to enter the Search User page. Tap Card on the left of the page and select a search type from the drop-down list. Enter the employee ID, card No., or the user name for search. Tap to search. Edit User On the User Management page, select a user from the user list to enter the Edit User page. Follow the steps in User Management to edit the user parameters. Tap to save the settings. Note The employee ID cannot be edited. 7.4 Data Management You can delete data, import data, and export data. 7.4.1 Delete Data Delete user data. 7.4.2 Import Data On the Home page, tap Data Delete Data User Data . All user data added in the device will be deleted. Steps 1. Plug a USB flash drive in the device. 2. On the Home page, tap Data Import Data . 3. Tap User Data or Face Data. 4. Enter the created password when you exported the data. If you do not create a password when you exported the data, leave a blank in the input box and tap OK immediately. 43 DS-K1T680 Series Face Recognition Terminal User Manual Note If you want to transfer all user information from one device (Device A) to another (Device B), you should export the information from Device A to the USB flash drive and then import from the USB flash drive to Device B. In this case, you should import the user data before importing the profile photo. The supported USB flash drive format is FAT32. The imported pictures should be saved in the folder (named enroll_pic) of the root directory and the picture's name should be follow the rule below:
Card No._Name_Department_Employee ID_Gender.jpg If the folder enroll_pic cannot save all imported pictures, you can create another folders, named enroll_pic1, enroll_pic2, enroll_pic3, enroll_pic4, under the root directory. The employee ID should be less than 32 characters. It can be a combination of lower letters, upper letters, and numbers. It should not be duplicated, and should not start with 0. Requirements of face picture should follow the rules below: It should be taken in full-face view, directly facing the camera. Do not wear a hat or head covering when taking the face picture. The format should be JPEG or JPG. The resolution should be 640 480 pixel or more than of 640 480 pixel. The picture size should be between 60 KB and 200 KB. 7.4.3 Export Data Steps 1. Plug a USB flash drive in the device. 2. On the Home page, tap Data Export Data . 3. Tap Event Data, User Data, or Face Data. 4. Optional: Create a password for exporting. When you import those data to another device, you should enter the password. Note The supported USB flash drive format is DB. The system supports the USB flash drive with the storage of 1G to 32G. Make sure the free space of the USB flash drive is more than 512M. The exported user data is a DB file, which cannot be edited. 7.5 Identity Authentication After network configuration, system parameters configuration and user configuration, you can go back to the initial page for identity authentication. The system will authenticate person according to the configured authentication mode. You can authenticate identity via 1:1 matching or 1:N matching. 44 DS-K1T680 Series Face Recognition Terminal User Manual 1:N Matching 1: 1 Matching Compare the captured face picture with all face pictures stored in the device. Compare the captured face picture with the linked face picture. 7.5.1 Authenticate via Single Credential Set the user authentication type before authentication. For details, see Set Authentication Mode . Authenticate face, fingerprint, card or QR code. Face Face forward at the camera and start authentication via face. Place the enrolled fingerprint on the fingerprint module and start authentication via fingerprint. Fingerprint Card QR Code Note Note Password Present the card on the card presenting area and start authentication via card. The card can be normal IC card, or encrypted card. Put the QR code in front of the device camera to authenticate via QR code. Authentication via QR code should be supported by the device. Enter the password to authenticate via password. If authentication completed, a prompt "Authenticated" will pop up. 7.5.2 Authenticate via Multiple Credential Before You Start Set the user authentication type before authentication. For details, see Set Authentication Mode . Steps 1. If the authentication mode is Card and Face, Password and Face, Card and Password, Card and Face and Fingerprint, authenticate any credential according to the instructions on the live view page. 45 DS-K1T680 Series Face Recognition Terminal User Manual Note Note Picture. The card can be normal IC card, or encrypted card. If the QR Code Scanning function is enabled, you can put the QR code in front of the device camera to authenticate via QR code. 2. After the previous credential is authenticated, continue authenticate other credentials. For detailed information about scanning fingerprint, see Tips for Scanning Fingerprint. For detailed information about authenticating face, see Tips When Collecting/Comparing Face If authentication succeeded, the prompt "Authenticated" will pop up. 7.6 Basic Settings You can set the shortcut key, voice, time, language, community No., building No., and Unit No. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and login the device home page. Tap Basic. Figure 7-9 Basic Settings Page shortcut key, voice, time, language, supplement light, community No., building No., and Unit No. Shortcut Key 46 DS-K1T680 Series Face Recognition Terminal User Manual Choose the shortcut key that displayed on the authentication page, including the QR code function, the call function, call type, and the password entering function. You can select call type from Call Room, Call Center, and Call Specified Room No. Call Room When you tap the call button on the authentication page, you should dial a room No. to call. When you tap the call button on the authentication page, you can call the center directly. Call Specified Room No. You should set a room No. When you tap the call button on the authentication page, you can call the configured room directly without dialing. When you tap the call button on the authentication page, you will call the mobile client where the device is added. You can enable/disable the voice prompt function and adjust the voice volume. Note Call Center Call APP Voice Settings Note Time Settings Language Community No. Building No. Unit No. You can set the voice volume between 0 and 10. Set the time zone, the device time and the DST. Select the language according to actual needs. Set the device installed community No. Set the device installed building No. Set the device installed unit No. 7.7 Set Biometric Parameters 47 You can customize the face parameters to improve the face recognition performance. The configurable parameters includes face anti-spoofing, liveness security level, pitch angle, yaw angle, pupillary distance, and WDR. DS-K1T680 Series Face Recognition Terminal User Manual Long tap on the initial page for 3 s and login the home page. Tap Biometric. Table 7-1 Face Picture Parameters Parameter Description Application Mode Select either others or indoor according to actual environment. Face Anti-Spoofing Enable or disable the face anti-spoofing function. If enabling the function, the device can recognize whether the person is a live one or not. Note Biometric recognition products are not 100% applicable to anti-spoofing environments. If you require a higher security level, use multiple authentication modes. Face Liveness Level After enabling face anti-spoofing function, you can set the matching security level when performing live face authentication. Face Recognition Distance Face Recognition Interval Set the valid distance between the user and the camera when authenticating. The time interval between two continuous face recognitions when authenticating. Note You can input the number from 1 to 10. Wide Dynamic It is suggested to enable the WDR function if installing the device outdoors. When there are both very bright and very dark areas simultaneously in the view, you can enable the WDR function to balance the brightness of the whole image and provide clear images with details. Face 1:N Security Level Set the matching threshold when authenticating via 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. Face 1:1 Security Level Set the matching threshold when authenticating via 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. ECO Settings After enabling the ECO mode, the device will use the IR camera to authenticate faces in the low light or dark environment. And you can set the ECO mode threshold, ECO mode (1:N), and ECO mode (1:1). ECO Threshold 48 DS-K1T680 Series Face Recognition Terminal User Manual Parameter Description When enabling the ECO mode, you can set the ECO modes threshold. The larger the value, the easier the device entering the ECO mode. ECO Mode (1:1) ECO Mode (1:N) Set the matching threshold when authenticating via ECO mode 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. Set the matching threshold when authenticating via ECO mode 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate Hard Hat Detection Level After enabling the hard hat detection, you can set the strategy. Prompt and Open If the person do not wear the hard hat when authenticating, the device prompts and the door is open. Prompt and Not Open Door If the person do not wear the hard hat when authenticating, the device prompts and the door keeps closed. 7.8 Set Access Control Parameters You can set the access control permissions, including the functions of authentication mode, enable NFC card, door contact, and door open time. On the Home page, tap ACS (Access Control Settings) to enter the Access Control Settings page. Edit the access control parameters on this page. Figure 7-11 Access Control Parameters 49 DS-K1T680 Series Face Recognition Terminal User Manual The available parameters descriptions are as follows:
Table 7-2 Access Control Parameters Descriptions Parameter Description Terminal Auth. Mode (Terminal Authentication Mode) Select the face recognition terminal's authentication mode. You can also customize the authentication mode. Note Only the device with the fingerprint module supports the fingerprint related function. Biometric recognition products are not 100% applicable to anti-spoofing environments. If you require a higher security level, use multiple authentication modes. If you adopt multiple authentication modes, you should authenticate other methods before authenticating face. Select the card reader's authentication mode. Enable the function and you can present the NFC card to authenticate. You can select "Remain Open" or "Remian Closed" according to your actual needs. By default, it is Remian Closed. Set the door unlocking duration. If the door is not opened for the set time, the door will be locked. Available door locked time range: 1 to 255s. Set the device authenticating interval. Available authentication interval range: 0 to 65535. Reader Auth. Mode (Card Reader Authentication Mode) Enable NFC Card Door Contact Open Duration Authentication Interval 7.9 Time and Attendance Status Settings Set time and attendance status. You can set the attendance mode as check in, check out, break out, break in, overtime in, and overtime out according to your actual situation. Note The function should be used cooperatively with time and attendance function on the client software. 50 DS-K1T680 Series Face Recognition Terminal User Manual 7.9.1 Disable Attendance Mode via Device Disable the attendance mode and the system will not display the attendance status on the initial page. Tap T&A Status to enter the T&A Status page. Figure 7-12 Disable Attendance Mode Set the Attendance Mode as Disable. You will not view or configure the attendance status on the initial page. And the system will follow the attendance rule that configured on the platform. 7.9.2 Set Manual Attendance via Device Set the attendance mode as manual, and you should select a status manually when you take attendance. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Tap T&A Status to enter the T&A Status page. 2. Set the Attendance Mode as Manual. 51 DS-K1T680 Series Face Recognition Terminal User Manual Figure 7-13 Manual Attendance Mode 3. Enable the Attendance Status Required. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. The name will be displayed on the T & A Status page and the authentication result page. You should select an attendance status manually after authentication. Result Note If you do not select a status, the authentication will be failed and it will not be marked as a valid attendance. 7.9.3 Set Auto Attendance via Device Set the attendance mode as auto, and you can set the attendance status and its available schedule. The system will automatically change the attendance status according to the configured schedule. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Tap T&A Status to enter the T&A Status page. 2. Set the Attendance Mode as Auto. 52 DS-K1T680 Series Face Recognition Terminal User Manual Figure 7-14 Auto Attendance Mode 3. Enable the Attendance Status function. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. The name will be displayed on the T & A Status page and the authentication result page. 6. Set the status' schedule. 1) Tap Attendance Schedule. 2) Select Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, or Sunday. 3) Set the selected attendance status's start time of the day. 4) Tap Confirm. 5) Repeat step 1 to 4 according to your actual needs. The attendance status will be valid within the configured schedule. Note Result When you authenticate on the initial page, the authentication will be marked as the configured attendance status according to the configured schedule. Example If set the Break Out as Monday 11:00, and Break In as Monday 12:00, the valid user's authentication from Monday 11:00 to 12:00 will be marked as break. 53 DS-K1T680 Series Face Recognition Terminal User Manual 7.9.4 Set Manual and Auto Attendance via Device Set the attendance mode as Manual and Auto, and the system will automatically change the attendance status according to the configured schedule. At the same time you can manually change the attendance status after the authentication. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Tap T&A Status to enter the T&A Status page. 2. Set the Attendance Mode as Manual and Auto. Figure 7-15 Manual and Auto Mode 3. Enable the Attendance Status function. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. The name will be displayed on the T & A Status page and the authentication result page. 6. Set the status' schedule. 1) Tap Attendance Schedule. 2) Select Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, or Sunday. 3) Set the selected attendance status's start time of the day. 4) Tap OK. 5) Repeat step 1 to 4 according to your actual needs. 54 DS-K1T680 Series Face Recognition Terminal User Manual The attendance status will be valid within the configured schedule. Note Result On the initial page and authenticate. The authentication will be marked as the configured attendance status according to the schedule. If you tap the edit icon on the result tab, you can select a status to take attendance manually, the authentication will be marked as the edited attendance status. Example If set the Break Out as Monday 11:00, and Break In as Monday 12:00, the valid user's authentication from Monday 11:00 to 12:00 will be marked as break. 7.10 System Maintenance You can view the system information and the capacity. You can also upgrade the device, restore to factory settings, restore to default settings, and reboot the device. Long tap on the initial page for 3 s and slide to the left/right by following the gesture and login the home page. Tap Maint.. System Information Figure 7-16 Maintenance Page 55 Capacity Note Note Device Upgrade DS-K1T680 Series Face Recognition Terminal User Manual You can view the device model, serial No., versions, address, production data, QR code, and open source code license. The page may vary according to different device models. Refers to the actual page for details. You can view the number of, user, face picture, card, event and fingerprint. Parts of the device models support displaying the fingerprint number. Refers to the actual page for details. Plug the USB flash drive in the device USB interface. Tap Upgrade, and the device will read the digicap.dav file in the USB flash drive to start upgrading. Unlink APP Account Restore to Default Settings After unlinking APP account, you cannot operate via APP. All parameters, except for the communication settings, remotely imported user information, will be restored to the default settings. The system will reboot to take effect. All parameters will be restored to the factory settings. The system will reboot to take effect. Restore to Factory Settings Reboot Reboot the device. 7.11 Video Intercom After adding the device to the client software, you can call the device from the client software, call the master station from the device, call the client software from the device, or call the indoor station from the device. 7.11.1 Call Client Software from Device Steps 1. Get the client software from the supplied disk or the official website, and install the software according to the prompts. 2. Run the client software and the control panel of the software pops up. 3. Click Device Management to enter the Device Management interface. 4. Add the device to the client software. 56 DS-K1T680 Series Face Recognition Terminal User Manual Note Note Note Note Note For details about adding device, see Add Device. 5. Call the client software. 1) Tap Call on the device initial page. 2) Input 0 in the pop-up window. 3) Tap Call to call the client software. 6. Tap Answer on the pop-up page of the client software and you can start two-way audio between the device and the client software. If the device is added to multiple client softwares and when the device is calling the client software, only the first client software added the device will pop up the call receiving window. 7.11.2 Call Center from Device Steps 1. Get the client software from the supplied disk or the official website, and install the software according to the prompts. 2. Run the client software and the control panel of the software pops up. 3. Click Device Management to enter the Device Management interface. 4. Add the master station and the device to the client software. For details about adding device, see Add Device. 5. Set the master station's IP address and SIP address in the remote configuration page. For details about the operation, see the user manual of the master station. 6. Call the center.
If you have configured to call center in the Basic Settings , you can tap If you have not configured to call center in the Basic Settings , you should tap the center to call the center. to call 7. Answers the call via the master station and starts two-way audio. The device will call the master station in priority. 57 DS-K1T680 Series Face Recognition Terminal User Manual 7.11.3 Call Device from Client Software Steps 1. Get the client software from the supplied disk or the official website, and install the software according to the prompts. 2. Run the client software and the control panel of the software pops up. 3. Click Device Management to enter the Device Management page. 4. Add the device to the client software. For details about adding device, see Add Device. 5. Enter the Live View page and double-click the added device to start live view. Note Note For details about operations in the Live View page, see Live View in the user manual of the client software. 6. Right click the live view image to open the right-click menu. 7. Click Start Two-Way Audio to start two-way audio between the device and the client software. 7.11.4 Call Room from Device Steps 1. Get the client software from the supplied disk or the official website, and install the software according to the prompts. 2. Run the client software and the control panel of the software pops up. 3. Click Device Management to enter the Device Management interface. 4. Add the indoor station and the device to the client software. Note For details about adding device, see Add Device. 5. Link a user to an indoor station and set a room No. for the indoor station. 6. Call the room.
If you have configured a specified room No. in the Basic Settings , you can tap room. If you have not configured a specified room No. in the Basic Settings , you should tap the authentication page of the device. Enter the room No. on the dial page and tap the room. to call the on to call 7. After the indoor station answers the call, you can start two-way audio with the indoor station. 58 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 8 Operation via Web Browser 8.1 Login Note You can login via the web browser or the remote configuration of the client software. Make sure the device is activated. For detailed information about activation, see Activation . Login via Web Browser Enter the device IP address in the address bar of the web browser and press Enter to enter the login page. Enter the device user name and the password. Click Login. Login via Remote Configuration of Client Software Download and open the client software. After adding the device, click page. to enter the Configuration 8.2 Live View You can view the live video of the device. After logging in, you will enter the live view page. You can perform the live view, capture, video recording, and other operations. Figure 8-1 Live View Page Function Descriptions:
Select the image size when starting live view. 59 DS-K1T680 Series Face Recognition Terminal User Manual Set the volume when starting live view. Note If you adjust the volume when starting two-way audio, you may hear a repeated sounds. You can capture image when starting live view. Reserved function. You can zoom in the live view image. Unlock the linked door. Start or stop live view. Start or stop video recording. Select the streaming type when starting live view. You can select from the main stream and the sub stream. Select the window division type when starting live view. Full screen view. 8.3 Person Management Click and add the person's information, including the basic information, card, authentication mode, and the Click OK to save the person. Add Basic Information Click User Add to enter the Add Person page. Add the person's basic information, including the employee ID, the person's name, the gender, and the user role. Click Save to save the settings. Add Card Click User Add to enter the Add Person page. Click Add Card and enter a card number. 60 DS-K1T680 Series Face Recognition Terminal User Manual Click Save to save the settings. Add Face Picture Click User Add to enter the Add Person page. Click + on the right to upload a face picture from the local PC. Note The picture format should be JPEG and the size should be less than 200K. Click Save to save the settings. Add Authentication Mode Click User Add to enter the Add Person page. Set the authentication mode. Click Save to save the settings. 8.4 Search Event Click Search to enter the Search page. Figure 8-2 Search Page 61 DS-K1T680 Series Face Recognition Terminal User Manual Enter the search conditions, including the employee ID, the name, the card No., the start time, and the end time, and click Search. The results will be displayed on the right panel. 8.5 Configuration 8.5.1 Set Local Parameters Set the live view parameters, record file saving path, and captured pictures saving path. Set Live View Parameters Click Configuration Local to enter the Local page. Configure the stream type and the image format and click Save. Set Record File Saving Path Click Configuration Local to enter the Local page. Select a saving path from your local computer and click Save. You can also click Open to open the file folder to view details. Set Captured Pictures Saving Path Click Configuration Local to enter the Local page. Select a saving path from your local computer and click Save. You can also click Open to open the file folder to view details. 8.5.2 View Device Information View the device No., model, serial No., version, device capacity, etc. Click Configuration System System Settings Basic Information to enter the configuration page. You can view the device No., model, serial No., version, device capacity, etc. 8.5.3 Set Time Set the device's time zone, synchronization mode, and the device time. Click Configuration System System Settings Time Settings . 62 DS-K1T680 Series Face Recognition Terminal User Manual Figure 8-3 Time Settings Click Save to save the settings after the configuration. Time Zone Select the device located time zone from the drop-down list. Time Sync. NTP Manual 8.5.4 Set DST You should set the NTP server's IP address, port No., and interval. By default, the device time should be synchronized manually. You can set the device time manually or check Sync. with Computer Time to synchronize the device time with the computer's time. Steps 1. Click Configuration System System Settings DST . Figure 8-4 DST Page 2. Check Enable DST. 3. Set the DST start time, end time and bias time. 4. Click Save to save the settings. 8.5.5 View Open Source Software License Select a device from the Device for Management tab and click About . Click View Licenses to view the open source code license. 63 System Device Information DS-K1T680 Series Face Recognition Terminal User Manual 8.5.6 Upgrade and Maintenance Reboot device, restore device parameters, and upgrade device version. Reboot Device Click Configuration System Maintenance Upgrade & Maintenance . Click Reboot to start reboot the device. Figure 8-5 Upgrade and Maintenance Page Restore Parameters Click Configuration System Maintenance Upgrade & Maintenance . Restore All All parameters will be restored to the factory settings. You should activate the device before usage. Default The device will restore to the default settings, except for the device IP address and the user information. Unbound Account Unbound the EZVIZ account from the platform. Import and Export Parameters Click Configuration System Maintenance Upgrade & Maintenance . Export Click Export to export the logs or device parameters. You can import the exported device parameters to another device. Note Import 64 DS-K1T680 Series Face Recognition Terminal User Manual Click and select the file to import. Click Import to start import configuration file. Upgrade Click Configuration System Maintenance Upgrade & Maintenance . Select an upgrade type from the drop-down list. Click local PC. Click Upgrade to start upgrading. and select the upgrade file from your Note Do not power off during the upgrading. 8.5.7 Security Mode Settings Set the security mode for logging in the client software. On the Device for Management page, click Configuration System Security . You can also enable SSH to get a more secure network. Select a security mode from the drop-down list, and click Save. Security Mode High security level for user information verification when logging in the client software. Compatible Mode The user informaiton verification is compatible with the old client software version when logging in. 8.5.8 Change Administrator's Password Steps 1. Click Configuration User Management . 2. Click 3. Enter the old password and create a new password. 4. Confirm the new password. 5. Click OK. Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 65 DS-K1T680 Series Face Recognition Terminal User Manual Set TCP/IP, port, Wi-Fi parameters, report strategy and platform access. 8.5.9 Network Settings Note Some device models do not support Wi-Fi settings. Refer to the actual products when configuration. Set Basic Network Parameters Set TCP/IP Parameters Click Configuration Network Basic Settings TCP/IP . Figure 8-6 TCP/IP Settings Page Click Save to save the settings. NIC Type Select a NIC type from the drop-down list. By default, it is Auto. DHCP DNS Server If uncheck the function, you should set the IPv4 address, IPv4 subnet mask, IPv4 default gateway, MTU, and the device port. If you check the function, the system will allocate the IPv4 address, IPv4 subnet mask, and the IPv4 default gateway automatically. Set the preferred DNS server and the Alternate DNS server according to your actual need. Set Port Parameters Set the HTTP, RTSP, HTTPS, Server and WebSocket port parmaeters. Click Configuration Network Basic Settings Port . 66 DS-K1T680 Series Face Recognition Terminal User Manual It refers to the port through which the browser accesses the device. For example, when the HTTP Port is modified to 81, you need to enter http://192.0.0.65:81 in the browser for login. It refers to the port of real-time streaming protocol. Set the HTTPS for accessing the browser. Certificate is required when accessing. It refers to the port through which the client adds the device. TCP-based full-duplex communication protocol port for plug-in free preview. Set Wi-Fi Parameters Set the Wi-Fi parameters for device wireless connection. HTTP RTSP HTTPS Server WebSocket Steps Note The function should be supported by the device. 1. Click Configuration Network Basic Settings Wi-Fi . Figure 8-7 Wi-Fi Settings Page 2. Check Wi-Fi. 3. Select a Wi-Fi Wi-Fi is connected, click OK. 4. Optional: Set the WLAN parameters. 1) Click TCP/IP Settings.
- Click
- Click Add and enter a Wi-Fi's name, password, and encryption type. Click Connect. When the of a Wi-Fi in the list and enter the Wi-Fi password. 67 DS-K1T680 Series Face Recognition Terminal User Manual 2) Set the IP address, subnet mask, and default gateway. Or check Enable DHCP and the system will allocate the IP address, subnet mask, and default gateway automatically. 5. Click Save. Report Strategy Settings You can set the center group for uploading the log via the ISUP protocol. On the Device for Management page, click Strategy Settings tab. You can set the center group and the system will transfer logs via ISUP protocol. Click Save to save the settings. Center Group Network Report Strategy to enter the Report Select a center group from the drop-down list. Main Channel/Backup Channel The device will communicate with the center via the main channel. When exception occurs in the main channel, the device and the center will communicate with each other via the backup channel. Note N1 refers to wired network and G1 refers to GPRS. Only device with 3G/4G function supports setting the channel as G1. Set ISUP Parameters Set the ISUP parameters for accessing device via ISUP protocol. Steps Note Note 5. Click Save. The function should be supported by the device. 1. Click Configuration Network Advanced Settings Platform . 2. Select ISUP from the platform access mode drop-down list. 3. Check Enable. 4. Set the ISUP version, server address, device ID, and the ISUP status. If you select 5.0 as the version, you should set the ISUP key as well. 68 DS-K1T680 Series Face Recognition Terminal User Manual 8.5.10 Set Video and Audio Parameters Set the image quality, resolution, and the device volume. Set Video Parameters Click Configuration Video/Audio Video . Set the stream type, the video type, the bitrate type, the frame rate, and the Max. bitrate. Click Save to save the settings after the configuration. Figure 8-8 Video Settings Page Set Audio Parameters Click Configuration Video/Audio Audio . Drag the block to adjust the device input and output volume. Click Save to save the settings after the configuration. Set the video standard, WDR, brightness, contrast, saturation, and sharpness. 8.5.11 Set Image Parameters Steps 1. Click Configuration Image . 69 DS-K1T680 Series Face Recognition Terminal User Manual 2. Configure the parameters to adjust the image. Video Standard Figure 8-9 Image Settings Page Set the video frame rate when performing live view remotely. After changing the standard, you should reboot the device to take effect. PAL 25 frames per second. Suitable for mainland China, Hong Kong (China), the Middle East countries, Europe countries, etc. 30 frames per second. Suitable for the USA, Canada, Japan, Taiwan (China), Korea, the Philippines, etc. NTSC WDR Enable or disable the WDR function. When there are both very bright and very dark areas simultaneously in the view, WDR balances the brightness level of the whole image and provide clear images with details. Brightness/Contrast/Saturation/Sharpness Drag the block or enter the value to adjust the live video's brightness, contrast, saturation, and sharpness. Start/end recording video. Capture the image. 8.5.12 Set Supplement Light Brightness Set the device supplement light brightness. 70 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Click Configuration Image . Figure 8-10 Supplement Light Settings Page 2. Click Supplement Light Parameters in the Basic Parameter panel. 3. Select a supplement light type and mode from the drop-down list. If you select the mode as ON, you should set the brightness. 4. Optional: Click Default to restore the parameters to the default settings. 8.5.13 Time and Attendance Settings If you want to track and monitor when the persons start/stop work and monitor their working hours and late arrivals, early departures, time taken on breaks, and absenteeism, you can add the person to the shift group and assign a shift schedule (a rule for the attendance defining how the schedule repeats, the shift type, break settings, and the card swiping rule.) to the shift group to define the attendance parameters for the persons in the shift group. Disable Attendance Mode via Web Disable the attendance mode and the system will not display the attendance status on the initial page. Steps 1. Click Configuration Attendance to enter the settings page. 2. Set the Attendance Mode as Disable. You will not view or configure the attendance status on the initial page. And the system will follow the attendance rule that configured on the platform. Result Time Settings Steps 1. Click Configuration Time Settings to enter the settings page. 2. Select Status Type. 3. Optional: Edit Schedule Name according to the actual needs. 71 DS-K1T680 Series Face Recognition Terminal User Manual 4. Drag mouse to set the schedule. Note Set the schedule from Monday to Sunday according to the actual needs. 5. Optional: Select a timeline and click Delete. Or click Delete All to clear the settings. 6. Click Save. Set Manual Attendance via Web Set the attendance mode as manual, and you should select a status manually when you take attendance. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Click Configuration Attendance to enter the settings page. 2. Set the Attendance Mode as Manual. 3. Enable the Attendance Status Required and set the attendace status lasts duration. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. You should select an attendance status manually after authentication. Result Note If you do not select a status, the authentication will be failed and it will not be marked as a valid attendance. Set Auto Attendance via Web Set the attendance mode as auto, and you can set the attendance status and its available schedule. The system will automatically change the attendance status according to the configured schedule. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Click Configuration Attendance to enter the settings page. 2. Set the Attendance Mode as Auto. 72 DS-K1T680 Series Face Recognition Terminal User Manual 3. Enable the Attendance Status function. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. 6. Set the status' schedule. Refers to Time Settings for details. Set Manual and Auto Attendance via Web Set the attendance mode as Manual and Auto, and the system will automatically change the attendance status according to the configured schedule. At the same time you can manually change the attendance status after the authentication. Before You Start Add at least one user, and set the user's authentication mode. For details, see User Management. Steps 1. Click Configuration Attendance to enter the settings page. 2. Set the Attendance Mode as Manual and Auto. 3. Enable the Attendance Status function. 4. Enable a group of attendance status. Note The Attendance Property will not be changed. 5. Optional: Select an status and change its name if required. 6. Set the status' schedule. Refers to Time Settings for details. Result On the initial page and authenticate. The authentication will be marked as the configured attendance status according to the schedule. If you tap the edit icon on the result tab, you can select a status to take attendance manually, the authentication will be marked as the edited attendance status. Example If set the Break Out as Monday 11:00, and Break In as Monday 12:00, the valid user's authentication from Monday 11:00 to 12:00 will be marked as break. 8.5.14 Set Video Intercom Parameters The device can be used as a door station or outer door station. You should set the device No. before usage. 73 DS-K1T680 Series Face Recognition Terminal User Manual Set Device No. Click Configuration Video Intercom Device No. Click Save to save the settings after the configuration. Device Type Figure 8-11 Device No. Settings The device can be used as a door station or outer door station. Select a device type from the drop-down list. If you change the device type, you should reboot the device. Note Community No. Building No. Set the device installed community No. Set the device installed building No. Unit No. Floor No. No. Set the device installed unit No. Set the device installed floor No. If you select outer door station as the device type, you should enter a number between 1 and 99. Note If you change the No., you should reboot the device. Set Linked Network Settings Click Configuration Video Intercom Linked Network Settings . You can set the device type, the SIP server's IP address, and the master station's IP address. After setting the parameters, you can communicate among the access control device, door station, indoor station, master station, and the platform. 74 DS-K1T680 Series Face Recognition Terminal User Manual Click Save to save the settings after the configuration. 8.5.15 Set Access Control and Authentication Parameters Set the access control parameters and the authentication parameters. Set Authentication Parameters Click Configuration Access Control Authentication Settings . Figure 8-12 Authentication Parameters Settings Click Save to save the settings after the configuration. Authentication Select an authentication mode according to your actual needs from the drop-down list. Display Result with Min. Recognition Interval Check Face Picture, Name, or Employee ID. When authentication is completed, the system will display the selected contents in the result. If the interval between card presenting of the same card is less than the configured value, the card presenting is invalid. Set Door Parameters Click Configuration Access Control Door Parameters . Figure 8-13 Door Parameters Settings Page Click Save to save the settings after the configuration. Door Contact You can select Remain Open or Remain Closed according to your actual needs. By default, it is Remain Closed. Open Duration 75 DS-K1T680 Series Face Recognition Terminal User Manual Set the door unlocking duration. If the door is not opened for the set time, the door will be locked. Open Timeout Alarm (Door Open Timeout Alarm) An alarm will be triggered if the door has not been closed within the configured time duration. 8.5.16 Set Card Security Click Configuration Access Control Card Security to enter the settings page. Set the parameters and click Save. Enable NFC Card In order to prevent the mobile phone from getting the data of the access control, you can enable NFC card to increase the security level of the data. Enable M1 card to authenticate by presenting M1 card. Enable EM card to authenticate by presenting EM card. Enable M1 Card Enable EM Card Enable CPU Card Enable ID Card Enable ID card to authenticate by presenting ID card. 8.5.17 Configure SIP Parameters The device can read the data from CPU card when enabling the CPU card function. Set the master station's IP address and the SIP server's IP address. After setting the parameters, you can communicate among the access control device, door station, indoor station, master station, and the platform. Note Only the access control device and other devices or systems (such as door station, indoor station, master station, platform) are in the same IP segment, the two-way audio can be performed. to enter the remote configuration page. Click Maintenance and Management Group to enter the device list. Click Click Access Control Linked Network Settings and set the master station's IP address and SIP server's IP address. Click Save. 76 DS-K1T680 Series Face Recognition Terminal User Manual 8.5.18 Set RS-485 Parameters You can set the RS-485 parameters including the peripheral, address, baud rate and output type. Click Configuration Access Control RS-485 Settings . Click Save to save the settings after the configuration. Peripheral Type Select a peripheral from the drop-down list according the actual situation. You can select from Card Reader, Extension Module, Access Controller, or Disable. After the peripheral is changed and saved, the device will reboot automatically. Set the RS-485 Address according to your actual needs. If you select Access Controller: If connect the device to a terminal via the RS-485 interface, set the RS-485 address as 2. If you connect the device to a controller, set the RS-485 address according to the door No. The baud rate when the devices are communicating via the RS-485 protocol. If you select Access Controller as the peripheral type, you should set the parameter. The device will output the card No. or the employee ID to the access controller. 8.5.19 Set Wiegand Parameters You can set the Wiegand transmission direction. RS-485 Address Note Note Baud Rate Output Type Steps Note Some device models do not support this function. Refer to the actual products when configuration. 1. Click Configuration Access Control Wiegand Settings . 77 DS-K1T680 Series Face Recognition Terminal User Manual 2. Check Wiegand to enable the Wiegand function. 3. Set a transmission direction. Figure 8-14 Wiegand Page Input Output The device can connect a Wiegand card reader. The can connect an external access controller. And the two devices will transmit the card No. via Wiegand 26 or 34. If you change the peripheral, and after you save the device parameters, the device will reboot automatically. 4. Click Save to save the settings. Note 8.5.20 Set Biometric Parameters Set Basic Parameters Click Configuration Smart Smart . 78 DS-K1T680 Series Face Recognition Terminal User Manual Click Save to save the settings after the configuration. Face Anti-spoofing Figure 8-15 Smart Settings Page Enable or disable the live face detection function. If enabling the function, the device can recognize whether the person is a live one or not. Note Biometric recognition products are not 100% applicable to anti-spoofing environments. If you require a higher security level, use multiple authentication modes. Live Face Detection Security Level After enabling the face anti-spoofing function, you can set the matching security level when performing live face authentication. Recognition Distance Application Mode Select the distance between the authenticating user and the device camera. Select either others or indoor according to actual environment. Continuous Face Recognition Interval Set the time interval between two continuous face recognitions when authenticating. 79 DS-K1T680 Series Face Recognition Terminal User Manual Pitch Angle Yaw Angle Pupillary Distance The maximum pitch angle when starting face authentication. The maximum yaw angle when starting face authentication. The minimum resolution between two pupils when starting face recognition. The actual resolution should be larger than the configured value. By default, the resolution is 40. Face Grading Set the face grading according to your needs. 1:1 Matching Threshold Set the matching threshold when authenticating via 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. 1:N Matching Threshold Set the matching threshold when authenticating via 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. ECO Mode ECO Mode (1:1) ECO Mode (1:N) After enabling the ECO mode, the device will use the IR camera to authenticate faces in the low light or dark environment. And you can set the ECO mode threshold, ECO mode (1:N), and ECO mode (1:1). Set the matching threshold when authenticating via ECO mode 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. Set the matching threshold when authenticating via ECO mode 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate Fingerprint Security Level Select the fingerprint security level. The higher is the security level, the lower is the false acceptance rate (FAR). The higher is the security level, the higher is the false rejection rate (FRR). Set Recognition Area Click Configuration Smart Area Configuration . Drag the yellow frame in the live video to adjust the recognition area. Only the face within the area can be recognized by the system. Click Save to save the settings. Click to record videos or capture pictures. or 80 DS-K1T680 Series Face Recognition Terminal User Manual 8.5.21 Set Notice Publication You can set the screen saver and the sleep time for the device. Click Configuration Notice Publication . Figure 8-16 Notice Page Sleep Customize Screen Saver Enable Sleep and the device will enter the sleep mode when no operation with the configured sleep time. Enable the function, and you can upload the screen saver pictures from the local PC. You can also set the slide show interval for the screen saver. 81 DS-K1T680 Series Face Recognition Terminal User Manual Chapter 9 Client Software Configuration 9.1 Configuration Flow of Client Software Follow the flow diagram below to configure on the client software. Figure 9-1 Flow Diagram of Configuration on Client Software 9.2 Device Management The client supports managing access control devices and video intercom devices. Example You can control entrance & exit and manage attendance after adding access control devices to the client; you can perform video intercom with the indoor stations and door stations. 82 DS-K1T680 Series Face Recognition Terminal User Manual The client provides three device adding modes including by IP/domain, IP segment, and ISUP protocol. The client also supports importing multiple devices in a batch when there are large amount of devices to be added. 9.2.1 Add Device Add Online Device The active online devices in the same local subnet with the client software will be displayed on the Online Device area. You can click Refresh Every 60s to refresh the information of the online devices. Add a Detected Online Device You can select a detected online device displayed in the online device list and add it to the client. Steps 1. Enter the Device Management module. 2. Click Device tab on the top of the right panel. 3. Click Online Device to show the online device area. The searched online devices are displayed in the list. 4. Select an online device in the Online Device area, and click Add to open the device adding window. Note Name IP Address Port User Name Password For the inactive device, you need to create the password for it before you can add the device properly. For detailed steps, refer to . 5. Enter the required information. Enter a descriptive name for the device. Enter the device's IP address. The IP address of the device is obtained automatically in this adding mode. You can customize the port number. The port number of the device is obtained automatically in this adding mode. By default, the user name is admin. 83 DS-K1T680 Series Face Recognition Terminal User Manual Enter the device password. Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 6. Optional: Check Transmission Encryption (TLS) to enable transmission encryption using TLS
(Transport Layer Security) protocol for security purpose. Note This function should be supported by the device. If you have enabled Certificate Verification, you should click Open Certificate Directory to open the default folder, and copy the certificate file exported from the device to this default directory to strengthen the security. See for details about enabling certificate verification. You can log into the device to get the certificate file by web browser. 7. Check Synchronize Time to synchronize the device time with the PC running the client after 8. Optional: Check Import to Group to create a group by the device name, and import all the adding the device to the client. channels of the device to this group. Example For access control device, its access points, alarm inputs/outputs, and encoding channels (if exist) will be imported to this group. 9. Click Add. Add Multiple Detected Online Devices For detected online devices sharing the same user name and password, you can add them to the client in a batch. Before You Start Make sure the to-be-added devices are online. Steps 1. Enter the Device Management module. 2. Click Device tab on the top of the right panel. 3. Click Online Device to show the online device area at the bottom of the page. 84 DS-K1T680 Series Face Recognition Terminal User Manual The searched online devices are displayed in the list. 4. Select multiple devices. Note For the inactive device, you need to create the password for it before you can add the device properly. For details, refer to . 5. Click Add to open the device adding window. 6. Enter the required information. User Name Password By default, the user name is admin. Enter the device password. Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 7. Optional: Check Synchronize Time to synchronize the device time with the PC running the client 8. Optional: Check Import to Group to create a group by the device name, and import all the after adding the device to the client. channels of the device to this group. Example For access control device, its access points, alarm inputs/outputs, and encoding channels (if exist) will be imported to this group. 9. Click Add to add the devices. Add Device by IP Address or Domain Name If you know the IP address or domain name of the device to add, you can add devices to the client by specifying the IP address (or domain name), user name, password, etc. Steps 1. Enter Device Management module. 2. Click Device tab on the top of the right panel. The added devices are displayed on the right panel. 85 DS-K1T680 Series Face Recognition Terminal User Manual 3. Click Add to open the Add window, and then select IP/Domain as the adding mode. 4. Enter the required information. Create a descriptive name for the device. For example, you can use a nickname that can show the location or feature of the device. The IP address or domain name of the device. The devices to add share the same port number. The default value is 8000. Enter the device user name. By default, the user name is admin. Name Address Port User Name Password Enter the device password. Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 5. Optional: Check Transmission Encryption (TLS) to enable transmission encryption using TLS
(Transport Layer Security) protocol for security purpose. Note This function should be supported by the device. If you have enabled Certificate Verification, you should click Open Certificate Directory to open the default folder, and copy the certificate file exported from the device to this default directory to strengthen the security. See for details about enabling certificate verification. You can log into the device to get the certificate file by web browser. 6. Check Synchronize Time to synchronize the device time with the PC running the client after 7. Optional: Check Import to Group to create a group by the device name, and import all the adding the device to the client. channels of the device to this group. 86 DS-K1T680 Series Face Recognition Terminal User Manual Example For access control device, its access points, alarm inputs/outputs, and encoding channels (if exist) will be imported to this group. 8. Finish adding the device.
- Click Add to add the device and back to the device list page.
- Click Add and New to save the settings and continue to add other device. Add Devices by IP Segment If the devices share the same port No., user name and password, and their IP addresses ranges in the same IP segment, you can add them to the client by specifying the start IP address and the end IP address, port No., user name, password, etc of the devices. Steps 1. Enter the Device Management module. 2. Click Device tab on the top of the right panel. The added devices are displayed on the right panel. 3. Click Add to open the Add window. 4. Select IP Segment as the adding mode. 5. Enter the required information. Enter a start IP address. Start IP End IP Port User Name Password By default, the user name is admin. Enter the device password. Caution Enter an end IP address in the same network segment with the start IP. Enter the device port No. The default value is 8000. The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. 87 DS-K1T680 Series Face Recognition Terminal User Manual Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 6. Optional: Check Transmission Encryption (TLS) to enable transmission encryption using TLS
(Transport Layer Security) protocol for security purpose . Note This function should be supported by the device. If you have enabled Certificate Verification, you should click Open Certificate Folder to open the default folder, and copy the certificate file exported from the device to this default directory to strengthen the security. See for details about enabling certificate verification. You can log into the device to get the certificate file by web browser. 7. Check Synchronize Time to synchronize the device time with the PC running the client after 8. Optional: Check Import to Group to create a group by the device name, and import all the adding the device to the client. channels of the device to the group. 9. Finish adding the device.
- Click Add to add the device and back to the device list page.
- Click Add and New to save the settings and continue to add other device. Add Device by ISUP Account For access control devices supports ISUP 5.0 protocol, you can add them to the client by ISUP protocol after entering device ID and key, if you have configured their server addresses, port No., and device IDs. Before You Start Make sure the devices have connected to the network properly. Steps 1. Enter Device Management module. The added devices are displayed on the right panel. 2. Click Add to open the Add window. 3. Select ISUP as the adding mode. 4. Enter the required information. Device Account ISUP Key Enter the account name registered on ISUP protocol. For ISUP 5.0 devices, enter the ISUP key if you have set it when configuring network center parameter for the device. 88 DS-K1T680 Series Face Recognition Terminal User Manual Note This function should be supported by the device. 5. Optional: Check Synchronize Time to synchronize the device time with the PC running the client 6. Optional: Check Import to Group to create a group by the device name, and import all the after adding the device to the client. channels of the device to the group. 7. Finish adding the device.
- Click Add to add the device and go back to the device list.
- Click Add and New to save the settings and continue to add other device. Note Face pictures cannot be applied to devices added by ISUP account except DS-K1T671 series and DS-K1T331 series. 8. Optional: Perform the following operation(s). Device Status Click on Operation column to view device status. Edit Device Information on Operation column to edit the device information, such as Click device name, device account, and ISUP key. Check Online User on Operation column to check the online users who access Click the device, such as user name, user type, user's IP address, and login time. Refresh Click on Operation column to get the latest device information. Delete Device Select one or multiple devices and click Delete to delete the selected device(s) from the client. Import Devices in a Batch You can add multiple devices to the client in a batch by entering the device parameters in a pre-
defined CSV file. Steps 1. Enter the Device Management module. 2. Click Device tab on the top of the right panel. 3. Click Add to open the Add window, and then select Batch Import as the adding mode. 4. Click Export Template and then save the pre-defined template (CSV file) on your PC. 5. Open the exported template file and enter the required information of the devices to be added on the corresponding column. Note For detailed description of the required fields, refer to the introductions in the template. 89 DS-K1T680 Series Face Recognition Terminal User Manual Edit the address of the device. Adding Mode Enter 0 or 1 or 2. Address Port User Name Password Enter the device password. Caution Enter the device port number. The default port number is 8000. Enter the device user name. By default, the user name is admin. The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Import to Group Enter 1 to create a group by the device name. All the channels of the device will be imported to the corresponding group by default. Enter 0 to disable this function. 6. Click 7. Click Add to import the devices. and select the template file. 9.2.2 Reset Device Password If you forgot the password of the detected online devices, you can reset the device password via the client. Steps 1. Enter Device Management page. 2. Click Online Device to show the online device area. All the online devices sharing the same subnet will be displayed in the list. 3. Select the device from the list and click 4. Reset the device password. on the Operation column. 90 DS-K1T680 Series Face Recognition Terminal User Manual
- Click Generate to pop up the QR Code window and click Download to save the QR code to your PC. You can also take a photo of the QR code to save it to your phone. Send the picture to our technical support. For the following operations for resetting the password, contact our technical support. Note Caution The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 9.3 Group Management The client provides groups to manage the added resources in different groups. You can group the resources into different groups according to the resources' locations. Example For example, on the 1st floor, there mounted 16 doors, 64 alarm inputs, and 16 alarm outputs. You can organize these resources into one group (named 1st Floor) for convenient management. You can control door status, and do some other operations of the devices after managing the resources by groups. 9.3.1 Add Group You can add group to organize the added device for convenient management. Steps 1. Enter the Device Management module. 2. Click Device Management Group to enter the group management page. 3. Create a group.
- Click Add Group and enter a group name as you want.
- Click Create Group by Device Name and select an added device to create a new group by the name of the selected device. 91 DS-K1T680 Series Face Recognition Terminal User Manual Note The resources (such as alarm inputs/outputs, access points, etc.) of this device will be imported to the group by default. 9.3.2 Import Resources to Group You can import the device resources (such as alarm inputs/outputs, access points, etc.) to the added group in a batch. Before You Start Add a group for managing devices. Refer to Add Group . Steps 1. Enter the Device Management module. 2. Click Device Management Group to enter the group management page. 3. Select a group from the group list and select the resource type as Access Point, Alarm Input, Alarm Output, etc. 4. Click Import. 5. Select the thumbnails/names of the resources in the thumbnail/list view. Note You can click or to switch the resource display mode to thumbnail view or to list view. 6. Click Import to import the selected resources to the group. 9.3.3 Edit Resource Parameters After importing the resources to the group, you can edit the resource parameters. For access point, you can edit the access point name. For alarm input, you can edit the alarm input name. Here we take access point as an example. Before You Start Import the resources to group. Steps 1. Enter the Device Management module. 2. Click Device Management Group to enter the group management page. All the added groups are displayed on the left. 3. Select a group on the group list and click Access Point. The access points imported to the group will display. in the Operation column to open the Edit Resource window. 4. Click 5. Edit the resource name. 6. Click OK to save the new settings. 92 DS-K1T680 Series Face Recognition Terminal User Manual 9.3.4 Remove Resources from Group You can remove the added resources from the group. Steps 1. Enter the Device Management module. 2. Click Device Management Group to enter the group management page. All the added groups are displayed on the left. 3. Click a group to show the resources added to this group. 4. Select the resource(s) and click Delete to remove the resource(s) from the group. 9.4 Person Management You can add person information to the system for further operations such as access control, video intercom, time and attendance, etc. You can manage the added persons such as issuing cards to them in a batch, importing and exporting person information in a batch, etc. 9.4.1 Add Organization You can add an organization and import person information to the organization for effective management of the persons. You can also add a surbodinate organization for the added one. Steps 1. Enter Person module. 2. Select a parent organization in the left column and click Add in the upper-left corner to add an 3. Create a name for the added organization. organization. Note Up to 10 levels of organizations can be added. 4. Optional: Perform the following operation(s). Edit Organization Hover the mouse on an added organization and click name. to edit its Hover the mouse on an added organization and click to delete it. Delete Organization Note organization. The lower-level organizations will be deleted as well if you delete an Make sure there is no person added under the organization, or the organization cannot be deleted. 93 DS-K1T680 Series Face Recognition Terminal User Manual Show Persons in Sub Organization Check Show Persons in Sub Organization and select an organization to show persons in its sub organizations. 9.4.2 Configure Basic Information You can add person to the client software one by one and configure the person's basic information such as name, gender, phone number, etc. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person. 3. Click Add to open the adding person window. The Person ID will be generated automatically. 4. Enter the basic information including person name, gender, tel, email address, etc. 5. Optional: Set the effective period of the person. Once expired, the credentials and access control settings of the person will be invalid and the person will have no authorization to access the doors\floors. Example For example, if the person is a visitor, his/her effective period may be short and temporary. 6. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons. 9.4.3 Issue a Card by Local Mode If a card enrollment station is available, you can issue a card by local mode. To read the card number, you should connect the card enrollment station to the PC running the client by USB interface or COM, and place the card on the card enrollment station. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add to enter Add Person panel. Note Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. In the Credential Card area, click +. 4. Click Settings to enter the Settings page. 5. Select Local as the card issuing mode. 94 DS-K1T680 Series Face Recognition Terminal User Manual Figure 9-2 Issue a Card by Local Mode 6. Set other related parameters. Card Enrollment Station Select the model of the connected card enrollment station. Note Card Type Buzzing Card No. Type M1 Card Encryption Currently, the supported card enrollment station models include DS-K1F100-D8, DS-K1F100-
M, DS-K1F100-D8E, and DS-K1F180-D8E. This field is only available when the model is DS-K1F100-D8E or DS-K1F180-D8E. Select the card type as EM card or Mifare card according to the actual card type. Enable or disable the buzzing when the card number is read successfully. Select the type of the card number according to actual needs. 95 DS-K1T680 Series Face Recognition Terminal User Manual This field is only available when the model is DS-K1F100-D8, DS-K1F100-D8E, or DS-K1F180-
D8E. If the card is M1 card, then you can enable the M1 Card Encryption function and select the sector of the card to encrypt. 7. Click OK to confirm the operation. 8. Place the card on the card enrollment station, and click Read to get the card number. The card number will display in the Card No. field automatically. 9. Click Add. The card will be issued to the person. 9.4.4 Upload a Face Photo from Local PC When adding person, you can upload a face photo stored in local PC to the client as the person's profile. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. Click Add Face in the Basic Information panel. 4. Select Upload. 5. Select a picture from the PC running the client. Note Note The picture should be in JPG or JPEG format and smaller than 200 KB. 6. Optional: Enable Verify by Device to check whether the facial recognition device managed in the client can recognize the face in the photo. 7. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons . 9.4.5 Take a Photo via Client When adding person, you can take a photo of the person by the webcam of the PC running the client and set this photo as the person's profile. Before You Start Add at least one access control device checking whether the face in the photo can be recognized by the facial recognition device managed by the client. 96 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Note Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. Click Add Face in the Basic Information panel. 4. Select Take Photo. 5. Connect the face scanner to the PC running the client. 6. Optional: Enable Verify by Device to check whether the facial recognition device managed in the client can recognize the face in the photo. 1) Face to the webcam of the PC and make sure your face is in the middle of the collecting 7. Take a photo. window. to capture a face photo. 2) Click 3) Optional: Click to capture again. 4) Click OK to save the captured photo. 8. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons. 9.4.6 Collect Face via Access Control Device When adding person, you can collect the person's face via access control device added to the client which supports facial recognition function. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Note Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. Click Add Face in the Basic Information panel. 4. Select Remote Collection. 5. Select an access control device which supports face recognition function from the drop-down list. 6. Collect face. middle of the collecting window. 2) Click to capture a photo. 1) Face to the camera of the selected access control device and make sure your face is in the 97 DS-K1T680 Series Face Recognition Terminal User Manual 3) Click OK to save the captured photo. 7. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons . 9.4.7 Collect Fingerprint via Client Collecting fingerprints locally means you can collect the fingerprint via the fingerprint recorder connected directly to the PC running the client. The fingerprints recorded can be used as credentials of the persons to access the authorized doors. Before You Start Connect the fingerprint recorder to the PC running the client. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. In the Credential Fingerprint panel, click +. 4. In the pop-up window, select the collection mode as Local. 5. Select the model of the connected fingerprint recorder. If the fingerprint recorder is DS-K1F800-F, you can click Settings to select the COM the fingerprint recorder connects to. 6. Collect the fingerprint. 1) Click Start. 2) Place and lift your fingerprint on the fingerprint recorder to collect the fingerprint. 3) Click Add to save the recorded fingerprint. 7. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons. Note Note Note Once the fingerprint is added, the fingerprint type cannot be changed. 98 DS-K1T680 Series Face Recognition Terminal User Manual 9.4.8 Collect Fingerprint via Access Control Device When adding person, you can collect fingerprint information via the access control device's fingerprint module. The fingerprints recorded can be used as credentials of the persons to access the authorized doors. Before You Start Make sure fingerprint collection is supported by the access control device. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. In the Credential Fingerprint panel, click +. 4. In the pop-up window, select the collection mode as Remote. 5. Select an access control device which supports fingerprint recognition function from the drop-
down list. 6. Collect the fingerprint. 1) Click Start. 2) Place and lift your fingerprint on the fingerprint scanner of the selected access control device to collect the fingerprint. 3) Click Add to save the recorded fingerprint. 7. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons . Note Note Once the fingerprint is added, the fingerprint type cannot be changed. 9.4.9 Configure Access Control Information When adding a person, you can set her/his access control information, such as binding an access control group with the person, configuring PIN code, setting the person as a visitor, a blocklist person, or a super user, etc. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. 3. In the Access Control area, click to select access group(s) for the person. 99 DS-K1T680 Series Face Recognition Terminal User Manual Note For details, refer to Set Access Group to Assign Access Authorization to Persons . Figure 9-3 Configure Access Control Information 4. Set a unique PIN code for the person which can be used for access authentication.
- Manually enter a PIN code containing 4 to 8 digits. Persons' PIN codes cannot be repeated.
- Click Generate to randomly generate an unrepeated PIN code of 6 digits. Note Note If there are repeated PIN codes, a prompt will pop up on the client. The admin can generate a new PIN code to replace the repeated PIN code and notify related persons. 5. Check the person's operation permissions. Super User If the person is set as a super user, he/she will have authorization to access all the doors/
floors and will be exempted from remaining closed restrictions, all anti-passback rules, and first person authorization. Extended Door Open Time Use this function for persons with reduced mobility. When accessing the door, the person will have more time than others to pass through doors. For details about setting the door's open duration, refer to Configure Parameters for Door/
Elevator . Add to Blocklist Mark as Visitor Add the person to the blocklist and when the person tries to access doors/floors, an event will be triggered and sent to the client to notify the security personnel. If the person is a visitor, you should set the her/his valid times for visit. 100 DS-K1T680 Series Face Recognition Terminal User Manual The valid times for visit is between 1 and 100. You can also check No Limit, then there are no limited times for the visitor to access doors/floors. For person with device operator role, he/she is authorized to operate on the access control devices. Note Device Operator Note The Super User, Extended Door Open Time, Add to Blocklist, and Mark as Visitor functions cannot be enabled concurrently. For example, if one person is set as super user, you cannot enable extended door open time for her/him, add her/him to the blocklist, or set her/him as visitor. 6. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons. 9.4.10 Customize Person Information You can customize the person properties which are not pre-defined in the client according to actual needs, e.g., place of birth. After customizing, when add a person, you can enter the custom information to make the person information complete. Steps 1. Enter Person module. 2. Set the fields of custom information. 1) Click Custom Property. 2) Click Add to add a new property. 3) Enter the property name. 4) Click OK. 3. Set the custom information when adding a person. 1) Select an organization in the organization list to add the person and click Add. Note Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 2) In the Custom Information panel, enter the person information. 3) Click Add to add the person and close the Add Person window, or click Add and New to add the person and continue to add other persons. 101 DS-K1T680 Series Face Recognition Terminal User Manual 9.4.11 Configure Resident Information If the person is resident, for video intercom purpose, you need to set the room number for her/him and bind an indoor station. After bound, you can call this person by calling the indoor station and perform video intercom with her/him. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. In the Resident Information panel, select the indoor station to bind it to the person. If you select Analog Indoor Station, the Door Station field will display and you are required to select the door station to communicate with the analog indoor station. 4. Enter the floor No. and room No. of the person. 5. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons. 9.4.12 Configure Additional Information When adding person, you can configure the additional information for the person, such as person's identity type, identity No., country, etc., according to actual needs. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information . 3. In the Additional Information panel, enter the additional information of the person, including person's ID type, ID No., job title, etc., according to actual needs. 4. Confirm to add the person.
- Click Add to add the person and close the Add Person window.
- Click Add and New to add the person and continue to add other persons . Note Note Note 102 DS-K1T680 Series Face Recognition Terminal User Manual 9.4.13 Import and Export Person Identify Information You can import the information and pictures of multiple persons to the client software in a batch. Meanwhile, you can also export the person information and pictures and save them in your PC. 9.4.14 Import Person Information You can enter the information of multiple persons in a predefined template (a CSV file) to import the information to the client in a batch. Steps 1. Enter the Person module. 2. Select an added organization in the list, or click Add in the upper-left corner to add an organization and then select it. 3. Click Import to open the Import panel. 4. Select Person Information as the importing mode. 5. Click Download Template for Importing Person to download the template. 6. Enter the person information in the downloaded template. If the person has multiple cards, separate the card No. with semicolon. Items with asterisk are required. By default, the Hire Date is the current date. 7. Click 8. Click Import to start importing. to select the CSV file with person information. Note Note importing. If a person No. already exists in the client's database, delete the existing information before You can import information of no more than 10,000 persons. 9.4.15 Import Person Pictures After importing face pictures for the added persons to the client, the persons in the pictures can be identified by an added face recognition terminal. You can either import person pictures one by one, or import multiple pictures at a time according to your need. Before You Start Be sure to have imported person information to the client beforehand. Steps 1. Enter the Person module. 103 DS-K1T680 Series Face Recognition Terminal User Manual 2. Select an added organization in the list, or click Add in the upper-left corner to add an organization and then select it. 3. Click Import to open the Import panel and check Face. 4. Optional: Enable Verify by Device to check whether face recognition device managed in the client can recognize the face in the photo. 5. Click to select a face picture file. Note The (folder of) face pictures should be in ZIP format. Each picture file should be in JPG format and should be no larger than 200 KB. Each picture file should be named as "Person ID_Name". The Person ID should be the same with that of the imported person information. 6. Click Import to start importing. The importing progress and result will be displayed. 9.4.16 Export Person Information You can export the added persons' information to local PC as a CSV file. Before You Start Make sure you have added persons to an organization. Steps 1. Enter the Person module. 2. Optional: Select an organization in the list. Note All persons' information will be exported if you do not select any organization. 3. Click Export to open the Export panel and check Person Information as the content to export. 4. Check desired items to export. 5. Click Export to save the exported CSV file in your PC. 9.4.17 Export Person Pictures You can export face picture file of the added persons and save in your PC. Before You Start Make sure you have added persons and their face pictures to an organization. Steps 1. Enter the Person module. 2. Optional: Select an organization in the list. 104 DS-K1T680 Series Face Recognition Terminal User Manual All persons' face pictures will be exported if you do not select any organization. 3. Click Export to open the Export panel and check Face as the content to export. 4. Click Export to start exporting. The exported file is in ZIP format. The exported face picture is named as "Person ID_Name_0" ("0" is for a full-frontal face). 9.4.18 Get Person Information from Access Control Device If the added access control device has been configured with person information (including person details, fingerprint, and issued card information), you can get the person information from the device and import them to the client for further operations. Note Note Steps Note If the person name stored in the device is empty, the person name will be filled with the issued card No. after importing to the client. The gender of the persons will be Male by default. If the card number or person ID (employee ID) stored on the device already exists in the client database, the person with this card number or person ID will not be imported to the client. 1. Enter Person module. 2. Select an organization to import the persons. 3. Click Get from Device. 4. Select the access control device from the drop-down list. 5. Click Get to start importing the person information to the client. The person information, including person details, person's fingerprint information (if configured), and the linked cards (if configured), will be imported to the selected organization. 9.4.19 Move Persons to Another Organization You can move the added persons to another organization if you need. Before You Start Make sure you have added at least two organizations. Make sure you have imported person information. Steps 1. Enter Person module. 105 DS-K1T680 Series Face Recognition Terminal User Manual 2. Select an organization in the left panel. The persons under the organization will be displayed in the right panel. 3. Select the person to move. 4. Click Change Organization. 5. Select the organization to move persons to. 6. Click OK. 9.4.20 Issue Cards to Persons in Batch Steps 1. Enter Person module. 2. Click Batch Issue Cards. The client provides a convenient way to issue cards to multiple persons in a batch. All the added persons with no card issued will be displayed in the right panel. 3. Optional: Enter key words (name or person ID) in the input box to filter the person(s) that need 4. Optional: Click Settings to set the card issuing parameters. For details, refer to . 5. Click Initialize to initialize the card enrollment station or card reader to make it ready for issuing issuing cards. cards. 6. Click the Card No. column and enter the card number.
- Place the card on the card enrollment station.
- Swipe the card on the card reader.
- Manually enter the card number and press the Enter key. The person(s) in the list will be issued with card(s). 9.4.21 Report Card Loss If the person lost his/her card, you can report the card loss so that the card's related access authorization will be inactive. Steps 1. Enter Person module. 2. Select the person you want to report card loss for and click Edit to open the Edit Person window. 3. In the Credential Card panel, click on the added card to set this card as lost card. After reporting card loss, the access authorization of this card will be invalid and inactive. Other person who gets this card cannot access the doors by swiping this lost card. 4. Optional: If the lost card is found, you can click to cancel the loss. After cancelling card loss, the access authorization of the person will be valid and active. 106 DS-K1T680 Series Face Recognition Terminal User Manual 5. If the lost card is added in one access group and the access group is applied to the device already, after reporting card loss or cancelling card loss, a window will pop up to notify you to apply the changes to the device. After applying to device, these changes can take effect on the device. 9.4.22 Set Card Issuing Parameters The client provides two modes for reading a card's number: via card enrollment station or via the card reader of the access control device. If a card enrollment station is available, connect it to the PC running the client by USB interface or COM, and place the card on the card enrollment to read the card number. If not, you can also swipe the card on the card reader of the added access control device to get the card number. As a result, before issuing a card to one person, you need to set the card issuing parameters including the issuing mode and related parameters. When adding a card to one person, click Settings to open the Card Issuing Settings window. Local Mode: Issue Card by Card Enrollment Station Connect a card enrollment station to the PC running the client. You can place the card on the card enrollment station to get the card number. Card Enrollment Station Select the model of the connected card enrollment station Currently, the supported card enrollment station models include DS-K1F100-D8, DS-K1F100-M, DS-K1F100-D8E, and DS-K1F180-D8E. Note Card Type Serial Port Buzzing Card No. Type M1 Card Encryption This field is only available when the model is DS-K1F100-D8E or DS-K1F180-D8E. Select the card type as EM card or IC card according to the actual card type. It is only available when the model is DS-K1F100-M. Select the COM the card enrollment station connects to. Enable or disable the buzzing when the card number is read successfully. Select the type of the card number according to actual needs. This field is only available when the model is DS-K1F100-D8, DS-K1F100-D8E, or DS-K1F180-D8E. If the card is M1 card, and if you need to enable the M1 Card Encryption function, you should enable this function and select the sector of the card to encrypt. 107 DS-K1T680 Series Face Recognition Terminal User Manual Remote Mode: Issue Card by Card Reader Select an access control device added in the client and swipe the card on its card reader to read the card number. 9.5 Configure Schedule and Template You can configure the template including holiday and week schedule. After setting the template, you can adopt the configured template to access groups when setting the access groups, so that the access group will take effect in the time durations of the template. For access group settings, refer to Set Access Group to Assign Access Authorization to Persons . You can create holidays and set the days in the holidays, including start date, end date, and holiday duration in one day. Note 9.5.1 Add Holiday Steps Note You can add up to 64 holidays in the software system. 1. Click Access Control Schedule Holiday to enter the Holiday page. 2. Click Add on the left panel. 3. Create a name for the holiday. 4. Optional: Enter the descriptions or some notifications of this holiday in the Remark box. 5. Add a holiday period to the holiday list and configure the holiday duration. Up to 16 holiday periods can be added to one holiday. 1) Click Add in the Holiday List field. 2) Drag the cursor to draw the time duration, which means in that duration of time, the configured access group is activated. Note Note Up to 8 time durations can be set to one holiday period. 3) Optional: Perform the following operations to edit the time durations. 108 DS-K1T680 Series Face Recognition Terminal User Manual Move the cursor to the time duration and drag the time duration on the timeline bar to the desired position when the cursor turns to
. Click the time duration and directly edit the start/end time in the appeared dialog. Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration when the cursor turns to
. 4) Optional: Select the time duration(s) that need to be deleted, and then click in the Operation column to delete the selected time duration(s). 5) Optional: Click 6) Optional: Click in the Operation column to clear all the time duration(s) in the time bar. in the Operation column to delete this added holiday period from the holiday list. 6. Click Save. 9.5.2 Add Template Steps Note Note Template includes week schedule and holiday. You can set week schedule and assign the time duration of access authorization for different person or group. You can also select the added holiday(s) for the template. You can add up to 255 templates in the software system. 1. Click Access Control Schedule Template to enter the Template page. There are two default templates: All-Day Authorized and All-Day Denied, and they cannot be edited or deleted. All-Day Authorized The access authorization is valid in each day of the week and it has no holiday. All-Day Denied The access authorization is invalid in each day of the week and it has no holiday. 2. Click Add on the left panel to create a new template. 3. Create a name for the template. 4. Enter the descriptions or some notification of this template in the Remark box. 5. Edit the week schedule to apply it to the template. 1) Click Week Schedule tab on the lower panel. 2) Select a day of the week and draw time duration(s) on the timeline bar. Note Up to 8 time duration(s) can be set for each day in the week schedule. 3) Optional: Perform the following operations to edit the time durations. 109 DS-K1T680 Series Face Recognition Terminal User Manual Move the cursor to the time duration and drag the time duration on the timeline bar to the desired position when the cursor turns to
. Click the time duration and directly edit the start/end time in the appeared dialog. Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration when the cursor turns to
. 4) Repeat the two steps above to draw more time durations on the other days of the week. 6. Add a holiday to apply it to the template. Up to 4 holidays can be added to one template. 1) Click Holiday tab. 2) Select a holiday in the left list and it will be added to the selected list on the right panel. 3) Optional: Click Add to add a new holiday. Note Note For details about adding a holiday, refer to Add Holiday . 4) Optional: Select a selected holiday in the right list and click to remove the selected one, or click Clear to clear all the selected holiday(s) in the right list. 7. Click Save to save the settings and finish adding the template. 9.6 Set Access Group to Assign Access Authorization to Persons After adding the person and configuring the person's credentials, you can create the access groups to define which person(s) can get access to which door(s) and then apply the access group to the access control device to take effect. Before You Start Add person to the client. Add access control device to the client and group access points. For details, refer to Group Management . Add template. Steps When the access group settings are changed, you need to apply the access groups to the devices again to take effect. The access group changes include changes of template, access group settings, person's access group settings, and related person details (including card number, fingerprint, face picture, linkage between card number and fingerprint, linkage between card number and fingerprint, card password, card effective period, etc). 1. Click Access Control Authorization Access Group to enter the Access Group interface. 2. Click Add to open the Add window. 3. In the Name text field, create a name for the access group as you want. 4. Select a template for the access group. 110 DS-K1T680 Series Face Recognition Terminal User Manual Note You should configure the template before access group settings. Refer to Configure Schedule and Template for details. 5. In the left list of the Select Person field, select person(s) to assign access authority. 6. In the left list of the Select Access Point field, select door(s), door station(s) or floor(s) for the selected persons to access. 7. Click Save. You can view the selected person(s) and the selected access point(s) on the right side of the interface. Figure 9-4 Display the Selected Person(s) and Access Point(s) 8. After adding the access groups, you need to apply them to the access control device to take effect. 1) Select the access group(s) to apply to the access control device. 2) Click Apply All to Devices start applying all the selected access group(s) to the access control 3) Click Apply All to Devices or Apply Changes to Devices. device or door station. Apply All to Devices This operation will clear all the existed access groups of the selected devices and then apply the new access group to the device. Apply Changes to Devices This operation will not clear the existed access groups of the selected devices and only apply the changed part of the selected access group(s) to the device(s). 4) View the applying status in the Status column or click Applying Status to view all the applied access group(s). 111 DS-K1T680 Series Face Recognition Terminal User Manual Note Note You can check Display Failure Only to filter the applying results. The selected persons in the applied access groups will have the authorization to enter/exit the selected doors/door stations with their linked card(s) or fingerprints. 9. Optional: Click to edit the access group if necessary. If you change the persons' access information or other related information, you will view the promptAccess Group to Be Applied on the right corner of the client. You can click the prompt to apply the changed data to the device. You can select either Apply Now or Apply Later. Figure 9-6 Data Synchronization 9.7 Configure Advanced Functions You can configure the advanced functions of access control to meet some special requirements in different scene. Note For the card related functions(the type of access control card), only the card(s) with access group applied will be listed when adding cards. The advanced functions should be supported by the device. Hover the cursor on the Advanced Function, and then Click function(s) to be displayed. to customize the advanced 9.7.1 Configure Device Parameters After adding the access control device, you can configure the parameters of access control device, access control points. 112 DS-K1T680 Series Face Recognition Terminal User Manual Configure Parameters for Access Control Device After adding the access control device, you can configure its parameters, including overlaying user information on picture, uploading pictures after capturing, saving captured pictures, etc. Steps 1. Click Access Control Advanced Function Device Parameter . If you can find Device Parameter in the Advanced Function list, Hover the cursor on the Advanced Function, and then Click to select the Device Parameter to be displayed. 2. Select an access device to show its parameters on the right page. 3. Turn the switch to ON to enable the corresponding functions. The displayed parameters may vary for different access control devices. Some of the following parameters are not listed in the Basic Information page, click More to Note Note edit the parameters. Voice Prompt If you enable this function, the voice prompt is enabled in the device. You can hear the voice prompt when operating in the device. Upload Pic. After Linked Capture Save Pic. After Linked Capture Upload the pictures captured by linked camera to the system automatically. If you enable this function, you can save the picture captured by linked camera to the device. Face Recognition Mode Normal Mode Recognize face via the camera normally. Deep Mode The device can recognize a much wider people range than the normal mode. This mode is applicable to a more complicated environment. Enable NFC Card Enable M1 Card Enable EM Card If enable the function, the device can recognize the NFC card. You can present NFC card on the device. If enable the function, the device can recognize the M1 card. You can present M1 card on the device. 113 DS-K1T680 Series Face Recognition Terminal User Manual If enable the function, the device can recognize the EM card. You can present EM card on the device. Reserved. If enable the function, the device can recognize the CPU card. You can present CPU card on the device. Enable CPU Card Enable ID Card Reserved. If enable the function, the device can recognize the ID card. You can present ID card on the device. 4. Click OK. 5. Optional: Click Copy to, and then select the access control device(s) to copy the parameters in the page to the selected device(s). Configure Parameters for Door/Elevator After adding the access control device, you can configure its access point (door) parameters. Steps 1. Click Access Control Advanced Function Device Parameter . 2. Select an access control device on the left panel, and then click the selected device. 3. Select a door or floor to show its parameters on the right page. 4. Edit the door or floor parameters. to show the doors or floors of Note The displayed parameters may vary for different access control devices. Some of the following parameters are not listed in the Basic Information page, click More to edit the parameters. Name Door Contact Edit the card reader name as desired. You can set the door sensor as remaining closed or remaining open. Usually, it is remaining closed. You can set the exit button as remaining closed or remaining open. Usually, it is remaining open. After swiping the normal card and relay action, the timer for locking the door starts working. Exit Button Type Door Locked Time Extended Open Duration 114 DS-K1T680 Series Face Recognition Terminal User Manual The door contact can be enabled with appropriate delay after person with extended accesss needs swipes her/his card. Door Left Open Timeout Alarm The alarm can be triggered if the door has not been closed in a configured time period. If it is set as 0, no alarm will be triggered. The door can open by inputting the duress code when there is duress. At the same time, the client can report the duress event. The specific person can open the door by inputting the super password. The duress code and the super code should be different. The duress code and the super password should be different from the authentication The length of duress code and the super password is according the device, usually it should contains 4 to 8 digits. 5. Click OK. 6. Optional: Click Copy to , and then select the door to copy the parameters in the page to the Duress Code Super Password Note password. selected doors. Note The door's status duration settings will be copied to the selected door(s) as well. Configure Parameters for Card Reader After adding the access control device, you can configure its card reader parameters. Steps 1. Click Access Control Advanced Function Device Parameter . 2. In the device list on the left, click to expand the door, select a card reader and you can edit the card reader's parameters on the right. 3. Edit the card reader basic parameters in the Basic Information page. The displayed parameters may vary for different access control devices. There are part of parameters listed as follows. Refer to the user manual of the device for more details. Some of the following parameters are not listed in the Basic Information page, click Advanced Note to edit the parameters. Basic Information 115 DS-K1T680 Series Face Recognition Terminal User Manual Name Edit the card reader name as desired. Minimum Card Swiping Interval If the interval between card swiping of the same card is less than the set value, the card swiping is invalid. You can set it as 0 to 255. Alarm of Max. Failed Attempts Enable to report alarm when the card reading attempts reach the set value. Card Reader Type/Card Reader Description Get card reader type and description. They are read-only. Advanced Enable Card Reader Enable the function and e device can be used as an card reader. OK LED Polarity/Error LED Polarity/Buzzer Polarity Set OK LED Polarity/Error LED Polarity/Buzzer LED Polarity of main board according to the card reader parameters. Generally, adopts the default settings. Max. Interval When Entering PWD When you inputting the password on the card reader, if the interval between pressing two digits is larger than the set value, the digits you pressed before will be cleared automatically. Tampering Detection Enable the anti-tamper detection for the card reader. Max. Times of Card Failure Set the max. failure attempts of reading card. Face 1:N Mathcing Threshold Set the matching security level when authenticating via 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate when authentication. The time interval between two continuous face recognitions when authenticating. By default, it is 2s. Enable or disable the face anti-spoofing function. If enabling the function, the device can recognize whether the person is a live one or not. Face Recognition Interval Face Anti-spoofing Face 1:1 Matching Threshold 116 DS-K1T680 Series Face Recognition Terminal User Manual Set the matching threshold when authenticating via 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate when authentication. Application Mode You can select indoor or others application modes according to actual environment. Lock Authentication Failed Face After enabling the Live Face Detection function, the system will lock the user's face for 5 minutes if the live face detection is failed for more than the configured attempts. The same user cannot authenticate via the fake face within 5 minutes. Within the 5 minutes, the user can authenticate via the real face twice continuously to unlock. Liveness Detection Security Level After enabling Live Face Detection function, you can set the matching security level when performing live face authentication. 4. Click OK. 5. Optional: Click Copy to, and then select the card reader(s) to copy the parameters in the page to the selected card reader(s). 9.7.2 Configure Remaining Open/Closed You can set the status of the door as open or closed. For example, you can set the door remaining closed in the holiday, and set the door remaining open in the specified period of the work day. Before You Start Add the access control devices to the system. Steps 1. Click Access Control Advanced Function Remain Open/Closed to enter the Remain Open/
Closed page. 2. Select the door that need to be configured on the left panel. 3. To set the door status during the work day, click the Week Schedule and perform the following operations. 1) Click Remain Open or Remain Closed. 2) Drag the cursor to draw the time duration, which means in that duration of time, the configured access group is activated. Note Up to 8 time durations can be set to each day in the week schedule. 3) Optional: Perform the following operations to edit the time durations. 117 DS-K1T680 Series Face Recognition Terminal User Manual Move the cursor to the time duration and drag the time duration on the timeline bar to the desired position when the cursor turns to
. Click the time duration and directly edit the start/end time in the appeared dialog. Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration when the cursor turns to
. 4) Click Save. Related Operations Copy to Whole Week Select one duration on the time bar, click Copy to Whole Week to copy all the duration settings on this time bar to other week days. Delete Selected Select one duration on the time bar, click Delete Selected to delete this duration. Clear Click Clear to clear all the duration settings in the week schedule. 4. To set the door status during the holiday, click the Holiday and perform the following operations. 1) Click Remain Open or Remain Closed. 2) Click Add. 3) Enter the start date and end date. 4) Drag the cursor to draw the time duration, which means in that duration of time, the configured access group is activated. Note Up to 8 time durations can be set to one holiday period. 5) Perform the following operations to edit the time durations. Move the cursor to the time duration and drag the time duration on the timeline bar to the desired position when the cursor turns to
. Click the time duration and directly edit the start/end time in the appeared dialog. Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration when the cursor turns to
. 6) Optional: Select the time duration(s) that need to be deleted, and then click in the Operation column to delete the selected time duration(s). 7) Optional: Click 8) Optional: Click in the Operation column to clear all the time duration(s) in the time bar. in the Operation column to delete this added holiday period from the holiday list. 9) Click Save. 5. Optional: Click Copy to to copy the door status settings of this door to other door(s). 9.7.3 Configure Multi-Factor Authentication You can manage the persons by group and set the authentication for multiple persons of one access control point (door). 118 DS-K1T680 Series Face Recognition Terminal User Manual Before You Start Set access group and apply the access group to the access control device. For details, refer to Set Access Group to Assign Access Authorization to Persons . Perform this task when you want to set authentications for multiple cards of one access control point (door). Steps 1. Click Access Control Advanced Function Multi-Factor Auth . 2. Select an access control device in device list on the left panel. 3. Add a person/card group for the access control device. 1) Click Add on the right panel. 2) Create a name for the group as desired. 3) Specify the start time and end time of the effective period for the person/card group. 4) Select members(s) and card(s) in the Available list, and the selected member(s) and card(s) will be added to the Selected list. Note Make sure you have issue card to the person. Make sure you have set access group and apply the access group to the access control device successfully. 5) Click Save. 6) Optional: Select the person/card group(s), and then click Delete to delete it(them). 7) Optional: Select the person/card group(s), and then click Apply to re-apply access group that failed to be applied previously to the access control device. 4. Select an access control point (door) of selected device on the left panel. 5. Enter the maximum interval when entering password. 6. Add an authentication group for the selected access control point. 1) Click Add on the Authentication Groups panel. 2) Select a configured template as the authentication template from the drop-down list. Note For setting the template, refer to Configure Schedule and Template . 3) Select the authentication type as Local Authentication, Local Authentication and Remotely Open Door, or Local Authentication and Super Password from the drop-down list. Local Authentication Authentication by the access control device. Local Authentication and Remotely Open Door Authentication by the access control device and by the client. When the person swipes the card on the device, a window will pop up. You can unlock the door via the client. 119 DS-K1T680 Series Face Recognition Terminal User Manual Figure 9-7 Remotely Open Door Note You can check Offline Authentication to enable the super password authentication when the access control device is disconnected with the client. Local Authentication and Super Password Authentication by the access control device and by the super password. 4) Select the added person/card group in the left list below and it will be added to the Selected list on the right as the authentication group. 5) Click the added authentication group in the right list to set authentication times in the Auth The authentication times should be larger than 0 and smaller than the added personnel quantity in the personnel group. The maximum value of authentication times is 16. Times column. Note 6) Click Save. Note For each access control point (door), up to four authentication groups can be added. For the authentication group of which authentication type is Local Authentication, up to 8 person/card groups can be added to the authentication group. For the authentication group of which authentication type is Local Authentication and Super Password or Local Authentication and Remotely Open Door, up to 7 person/card groups can be added to the authentication group. 7. Click Save. 9.7.4 Configure Card Reader Authentication Mode and Schedule You can set the passing rules for the card reader of the access control device according to your actual needs. 120 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Click Access Control Advanced Function Authentication to enter the authentication mode configuration page. 2. Select a card reader on the left to configure. 3. Set card reader authentication mode. 1) Click Configuration. Figure 9-8 Select Card Reader Authentication Mode PIN refers to the PIN code set to open the door. Refer to Configure Access Control Information . 2) Check the modes in the Available Mode list and they will be added to the selected modes Note list. 3) Click OK. After selecting the modes, the selected modes will display as icons with different color. 4. Click the icon to select a card reader authentication mode, and drag the cursor to draw a color bar on the schedule, which means in that period of time, the card reader authentication is valid. 5. Repeat the above step to set other time periods. 121 DS-K1T680 Series Face Recognition Terminal User Manual Figure 9-9 Set Authentication Modes for Card Readers 6. Optional: Select a configured day and click Copy to Week to copy the same settings to the whole week. 7. Optional: Click Copy to to copy the settings to other card readers. 8. Click Save. 9.7.5 Configure First Person In You can set multiple first persons for one access control point. After the first person is authorized, it allows multiple persons access the door or other authentication actions. Before You Start Set the access group and apply the access group to the access control device. For details, refer to Set Access Group to Assign Access Authorization to Persons . Perform this task when you want to configure opening door with first person. Steps 1. Click Access Control Advanced Function First Person In to enter the First Person In page. 2. Select an access control device in the list on the left panel. 3. Select the current mode as Enable Remaining Open after First Person or Disable Remaining Open after First Person from the drop-down list for each access control point of the selected device. Enable Remaining Open after First Person The door remains open for the configured time duration after the first person is authorized until the remain open duration ends. If you select this mode, you should set the remain open duration. 122 DS-K1T680 Series Face Recognition Terminal User Manual The remain open duration should be between 0 and 1440 minutes. By default, the remain open duration is 10 minutes. Disable Remaining Open after First Person Disable the function of first person in, namely normal authentication. Note Note You can authenticate by the first person again to disable the first person mode. 4. Click Add on the First Person List panel. 5. Select person(s) in the left list and the person(s) will be add to the selected persons as the first person(s) of the doors. The added first person(s) will list in the First Person List 6. Optional: Select a first person from the list and click Delete to remove the person from the first person list. 7. Click Save. 9.7.6 Configure Anti-Passback You can set to only pass the access control point according to the specified path and only one person could pass the access control point after swiping the card. Before You Start Enable the anti-passing back function of the access control device. Perform this task when you want to configure the anti-passing back for the access control device. Steps Note Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. For the configuration of multi-door interlocking, refer to Configure Multi-door Interlocking . 1. Click Access Control Advanced Function Anti-Passback to enter the anti-passing back configuration page. 2. Select an access control device in the list. 3. Select a card reader as the beginning of the path in the First Card Reader field. 4. Click the text field of the selected first card reader in the Card Reader Afterward column to open Select Card Reader dialog. 5. Select the afterward card readers for the first card reader. 123 DS-K1T680 Series Face Recognition Terminal User Manual Note Note Up to four afterward card readers can be added for one card reader. 6. Click OK in the dialog to save the selections. 7. Click Save at the upper-right corner of Anti-Passback page to save the settings and take effect. Super credentials, such as super card, super password, super fingerprint, and so on, have the privilege of not following the anti-passback rules. Example Set Card Swiping Path If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked card readers. Then you can only get through the access control point by swiping the card in the order as Reader In_01, Reader In_02 and Reader Out_04. 9.7.7 Configure Multi-door Interlocking You can set the multi-door interlocking between multiple doors of the same access control device. To open one of the doors, other doors must keep closed. That means in the interlocking combined door group, up to one door can be opened at the same time. Before You Start Add access control device to the client, and make sure the device supports the multi-door interlocking function. Steps Note Multi-door Interlocking function is only supported by the access control device which has more than one access control points (doors). Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. For the configuration of anti-passing back function, refer to Configure Anti-Passback . 1. Click Access Control Advanced Function Multi-door Interlocking . 2. Select an access control device on the left panel. 3. Click Add on the Multi-door Interlocking List panel to open Add Access Control Point to open 4. Select at least two access control points(doors) from the list. the Add window. Note Up to four doors can be added in one multi-door interlocking combination. 124 DS-K1T680 Series Face Recognition Terminal User Manual 5. Click OK to add the selected access control point(s) for interlocking. The configured multi-door interlocking combination will list on the Multi-door Interlocking List panel. 6. Optional: Select an added multi-door interlocking combination from the list and click Delete to delete the combination. 7. Click Apply to apply the settings to the access control device. 9.7.8 Configure Device Parameters After adding the access control device, you can set its parameters such as network parameters. Set Multiple NIC Parameters If the device supports multiple network interfaces, you can set the network parameters of these NICs via the client, such as IP address, MAC address, port number, etc. Before You Start Add access control device to the client, and make sure the device supports multiple NICs. Steps 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and click NIC to enter Multiple NIC Settings 4. Select an NIC you want to configure from the drop-down list. 5. Set its network parameters such as IP address, default gateway, subnet mask, etc. A media access control address (MAC address) is a unique identifier assigned to the network interface for communications on the physical network segment. The maximum transmission unit (MTU) of the network interface. page. MAC Address MTU 6. Click Save. Set Network Parameters After adding the access control device, you can set the device log uploading mode, and create ISUP account via wired network. Set Log Uploading Mode You can set the mode for the device to upload logs via ISUP protocol. 125 DS-K1T680 Series Face Recognition Terminal User Manual Steps Note Make sure the device is not added by ISUP. 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and enter Network Uploading Mode . 4. Select the center group from the drop-down list. 5. Check Enable to enable to set the uploading mode. 6. Select the uploading mode from the drop-down list.
- Enable N1 or G1 for the main channel and the backup channel.
- Select Close to disable the main channel or the backup channel The main channel and the backup channel cannot enable N1 or G1 at the same time. N1 refers to wired network and G1 refers to GPRS. Create ISUP Account in Wired Communication Mode You can set the account for ISUP protocol in wired communication mode. Then you can add devices via ISUP protocol. Note 7. Click Save. Steps Note This function should be supported by the device. 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and enter Network Network Center . 4. Select the center group from the drop-down list. 5. Select the Address Type as IP Address or Domain Name. 6. Enter IP address or domain name according to the address type. 7. Enter the port number for the protocol. Note The port number of the wireless network and wired network should be consistent with the port number of ISUP. 8. Select the Protocol Type as ISUP. 9. Set an account name for the network center. 10. Click Save. 126 DS-K1T680 Series Face Recognition Terminal User Manual Set Device Capture Parameters You can configure the capture parameters of the access control device, including manual capture and event triggered capture. Note The capture function should be supported by the device. Before setting the capture parameters, you should set the picture storage first to define where the event triggered pictures are saved. For details, refer to Set Picture Storage in the user manual of the client software. Set Triggered Capture Parameters When an event occurs, the camera of the access control device can be triggered to capture picture(s) to record what happens when the event occurs. You can view the captured pictures when checking the event details in Event Center. Before that, you need to set the parameters for the capture such as number of pictures captured for one time. Before You Start Before setting the capture parameters, you should set the picture storage first to define where the captured pictures are saved. For details, refer to Set Picture Storage in the user manual of the client software. Steps Note This function should be supported by the device 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters Capture . 3. Select an access control device in the device list and select Linked Capture. 4. Set the picture size and quality. 5. Set the capture times once triggered which defines how many pictures will be captures for one time. 6. If the capture times is more than 1, set the interval for each capture. 7. Click Save. Set Manual Capture Parameters In Status Monitoring module, you can capture a picture manually the access control device's camera by clicking a button. Before that, you need to set the parameters for the capture such as picture quality. 127 DS-K1T680 Series Face Recognition Terminal User Manual Before You Start Before setting the capture parameters, you should set the saving path first to define where the captured pictures are saved. For details, refer to Set Picture Storage in the user manual of the client software. This function should be supported by the device 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters Capture . 3. Select an access control device in the device list and select Manual Capture. 4. Select the resolution of the captured pictures from the drop-down list. 5. Select the picture quality as High, Medium, or Low. The higher the picture quality is, the larger size the picture will be. 6. Click Save. Set Parameters for Face Recognition Terminal For face recognition terminal, you can set its parameters including face picture database, etc. Steps Note Steps Note This function should be supported by the device. 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and click Face Recognition Terminal. 4. Set the parameters. These parameters displayed vary according to different device models. Note Algorithm ECO Mode ECO Mode (1:1) Select Deep Learning as the face picture database. Save Authenticating Face Picture If enabled, the captured face picture when authenticating will be saved on the device. After enabling the ECO mode, the device can authenticate faces in the low light or dark environment. And you can set he ECO mode threshold, ECO mode (1:N), and ECO mode (1:1). 128 DS-K1T680 Series Face Recognition Terminal User Manual Set the matching threshold when authenticating via ECO mode 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. Set the matching threshold when authenticating via ECO mode 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. When enabling the ECO mode, you can set the ECO mode's threshold. The larger the value, the easier the device entering the ECO mode. Available range: 0 to 8. Set the device work mode as Access Control Mode. The access control mode is the device normal mode. You should authenticate your credential for accessing. ECO Mode (1:N) ECO Mode Threshold Work Mode 5. Click Save. Set RS-485 Parameters You can set the access control device's RS-485 parameters including the baud rate, data bit, the stop bit, parity type, flow control type, communication mode, work mode, and connection mode. Before You Start Add access control device to the client, and make sure the device supports RS-485 interface. Steps 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and click RS-485 to enter the RS-485 Settings 4. Select the serial port number from the drop-down list to set the RS-485 parameters. 5. Set the baud rate, data bit, the stop bit, parity type, communication mode, working mode, and connection mode in the drop-down list. When the connection mode is Connect Access Control Device, you can select Card No. or Person ID as the output type. The configured parameters will be applied to the device automatically. When you change the working mode or connection mode, the device will reboot automatically. page. Note 6. Click Save. 129 DS-K1T680 Series Face Recognition Terminal User Manual Set Wiegand Parameters You can set the access control device's Wiegand channel and the communication mode. After setting the Wiegand parameters, the device can connect to Wiegand card reader via Wiegand communication. Steps Note This function should be supported by the device. 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and click Wiegand to enter the Wiegand 4. Set the switch to on to enable the Wiegand function for the device. 5. Select the Wiegand channel No. and the communication mode from the drop-down list. Settings page. Note If you set Communication Direction as Sending, you are required to set the Wiegand Mode as Wiegand 26 or Wiegand 34. 6. Check Enable Wiegand to enable the Wiegand function. 7. Click Save. The configured parameters will be applied to the device automatically. After changing the communication direction, the device will reboot automatically. Enable M1 Card Encryption M1 card encryption can improve the security level of authentication. Steps Note The function should be supported by the access control device and the card reader. 1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function More Parameters . 3. Select an access control device in the device list and click M1 Card Encryption to enter the M1 Card Encryption page. 4. Set the switch to on to enable the M1 card encryption function. 5. Set the sector ID. 130 DS-K1T680 Series Face Recognition Terminal User Manual Note The sector ID ranges from 1 to 100. By default, Sector 13 is encrypted. It is recommended to encrypt sector 13. 6. Click Save to save the settings. 9.8 Configure Linkage Actions for Access Control You can configure different linkage actions for the event detected by the access control device. After that, linkage actions will be triggered once the event happens. This mechanism is used for notifying the security personnel the event, or triggering automatic access control in real time. Two types of linkage actions are supported:
Client Actions: When the event is detected, it will trigger the actions on the client, such as the client making an audible warning.. Device Actions: When the event is detected, it will trigger the actions of a specific device, such as buzzing of a card reader and, opening/closing of a door, .. 9.8.1 Configure Client Actions for Access Event Even if you are far away from an access point, you can still know what happens and how urgent the event is by configuring linked actions of access event on the client. You will be notified on the client once an event is triggered, so that you can response to the event instantly. You can also configure client actions of access points in a batch at a time. Steps Note The linkage actions here refer to the linkage of the client software's own actions such as audible warning, email linkage, etc. 1. Click Event Management Access Control Event . The added access control devices will display in the device list. 2. Select a resource (including device, alarm input, door/elevator, and card reader) from the device list. The event types which the selected resource supports will display. 3. Select the event(s) and click Edit Priority to define the priority for the event(s), which can be used to filter events in the Event Center. 4. Set the linkage actions of the event. Audible Warning 1) Select the event(s) and click Edit Linkage to set the client actions when the events triggered. 131 DS-K1T680 Series Face Recognition Terminal User Manual The client software gives an audible warning when alarm is triggered. You can select the alarm sound for audible warning. For setting the alarm sound, please refer to Set Alarm Sound in the user manual of client software.. Note Send Email Send an email notification of the alarm information to one or more receivers. For details about setting email parameters, refer to Set Email Parameters in the user manual of client software.. 5. Enable the event so that when the event is detected, en event will be sent to the client and the 6. Optional: Click Copy to... to copy the event settings to other access control device, alarm input, 2) Click OK. linkage actions will be triggered. door, or card reader. 9.8.2 Configure Device Actions for Access Event You can set the access control device's linkage actions for the access control device's triggered event. When the event is triggered, it can trigger the alarm output, host buzzer, and other actions on the same device. Steps Note It should be supported by the device. 1. Click Access Control Linkage Configuration . 2. Select the access control device from the list on the left. 3. Click Add button to add a new linkage. 4. Select the event source as Event Linkage. 5. select the event type and detailed event to set the linkage. 6. In the Linkage Target area, set the property target to enable this action. The audible warning of access control device will be triggered. Buzzer on Controller Capture Access Point The real-time capture will be triggered. The door status of open, close, remain open, and remain close will be triggered. 132 DS-K1T680 Series Face Recognition Terminal User Manual Note The target door and the source door cannot be the same one. 7. Click Save. 8. Optional: After adding the device linkage, you can do one or more of the following:
Edit Linkage Settings Select the configured linkage settings in the device list and you can edit its event source parameters, including event source and linkage target. Delete Linkage Settings Select the configured linkage settings in the device list and click Delete to delete it. 9.8.3 Configure Device Actions for Card Swiping You can set the access control device's linkage actions for the specified card swiping. When you swipe the specified card, it can trigger the host buzzer, and other actions on the same device. Steps Note It should be supported by the device. 1. Click Access Control Linkage Configuration . 2. Select the access control device from the list on the left. 3. Click Add button to add a new linkage. 4. Select the event source as Card Linkage. 5. Enter the card number or select the card from the drop-down list. 6. Select the card reader where the card swipes to trigger the linked actions. 7. In the Linkage Target area, set the property target to enable this action. Buzzer on Controller The audible warning of access control device will be triggered. The real-time capture will be triggered. Capture Access Point 8. Click Save. The door status of open, close, remain open, or remain closed will be triggered. When the card (configured in Step 5) swipes on the card reader (configured in Step 6), it can trigger the linked actions (configured in step 7). 9. Optional: After adding the device linkage, you can do one or more of the following:
Delete Linkage Settings Select the configured linkage settings in the device list and click Delete to delete it. 133 DS-K1T680 Series Face Recognition Terminal User Manual Edit Linkage Settings Select the configured linkage settings in the device list and you can edit its event source parameters, including event source and linkage target. 9.8.4 Configure Device Actions for Person ID You can set the access control device's linkage actions for the specified person ID. When access control device detects the specified person ID, it can trigger buzzer on card reader, and other actions. Steps Note It should be supported by the device. 1. Click Access Control Linkage Configuration . 2. Select the access control device from the list on the left. 3. Click Add to add a new linkage. 4. Select Person Linkage as the event source. 5. Enter the employee number or select the person from the drop-down list. 6. Select the card reader where the card swipes. 7. In the Linkage Target area, set the property target to enable this action. Buzzer on Controller Buzzer on Reader The audible warning of access control device will be triggered. The audible warning of card reader will be triggered. An event-related picture will be captured when the selected event happens. An event-related picture will be captured when the selected event happens. The device should support recording. Capture Recording Note Access Point The door status of open, close, remain open, or remain closed will be triggered. 8. Click Save. 9. Optional: After adding the device linkage, you can do one or more of the followings:
Delete Linkage Settings Select the configured linkage settings in the device list and click Delete to delete it. 134 DS-K1T680 Series Face Recognition Terminal User Manual Edit Linkage Settings Select the configured linkage settings in the device list and you can edit its event source parameters, including event source and linkage target. 9.9 Door Control In Monitoring module, you can view the real-time status of the doors managed by the added access control device. You can also control the doors such as open/close the door, or remain the door open/closed via the client remotely. The real-time access event are displayed in this module. You can view the access details and person details. Note For the user with door control permission, the user can enter the Monitoring module and control the door. Or the icons used for control will not show. For setting the user permission, refer to Person Management . 9.9.1 Control Door Status You can control the status for a single door, including opening door, closing door, remaining the door open, and remaining the door closed. Steps 1. Click Monitoring to enter the status monitoring page. 2. Select an access point group on the upper-right corner. Note Open Door Close Door Remain Open For managing the access point group, refer to Group Management in the user manual of the client software. The doors in the selected access control group will display. 3. Click a door icon to select a door, or press Ctrl and select multiple doors. 4. Click the following buttons to control the door. When the door is locked, unlock it and it will be open for once. After the open duration, the door will be closed and locked again automatically. When the door is unlocked, lock it and it will be closed. The person who has the access authorization can access the door with credentials. The door will be unlocked (no matter closed or open). All the persons can access the door with no credentials required. 135 DS-K1T680 Series Face Recognition Terminal User Manual The door will be closed and locked. No person can access the door even if he/she has the authorized credentials, except the super users. Remain Closed Capture Capture a picture manually. Note The Capture button is available when the device supports capture function. The picture is saved in the PC running the client. For setting the saving path, refer to Set File Saving Path in the user manual of the client software. Result The icon of the doors will change in real-time according to the operation if the operation is succeeded. 9.9.2 Check Real-Time Access Records The real-time access records can be displayed in the client, including card swiping records, face recognition records, skin-surface temperature information, etc. Also, you can view the person information and view the picture captured during access. Before You Start You have added person(s) and access control device(s) to the client. For details, refer to Person Management and Add Device . Steps 1. Click Monitoring to enter monitoring module. Real-time access records are displayed on the bottom of the page. You can view record details, including card No., person name, event time, door location, temperature, authentication type etc. Figure 9-10 Real-time Access Records 136 DS-K1T680 Series Face Recognition Terminal User Manual Note Note Note You can right click the column name of access event table to show or hide the column according to actual needs. 2. Optional: Select an access point group from the drop-down list in the upper-right corner to show the real time access records of the selected group. 3. Optional: Check the event type and event status. The detected events of checked type and status will be displayed in the list below. 4. Optional: Check Show Latest Event to view the latest access record. The record list will be listed reverse chronologically. 5. Optional: Check Enable Abnormal Temperature Prompt to enable abnormal skin-surface temperature prompt. When enabled, if there is abnormal temperature information, an Abnormal Temperature window pops up when you enter Monitoring module, displaying person's picture, skin-surface temperature, card No., person name, etc. 6. Optional: Click an event to view person pictures (including captured picture and profile). In Linked Capture Picture field, you can double click the captured picture to view an enlarged picture. 7. Optional: Click to view surveillance details (including person's detailed information and the In the pop-up window, you can click to view surveillance details in full screen. captured picture). Note 9.10 Event Center The event information (for example, device offline) received by the client displays. In the Event Center, you can check the detailed information of the real-time and historical events, view the event linked video, handle the events, and so on. Before the client can receive the event information from the device, you need to enable the events of the resource and arm the device first. For details, refer to Enable Receiving Event from Devices . 137 DS-K1T680 Series Face Recognition Terminal User Manual 9.10.1 Enable Receiving Event from Devices Before the client software can receive event notifications from the device, you need to arm the device first. Steps 1. Click Tool Device Arming Control to open Device Arming Control page. All the added devices appear on this page. 2. In the Auto-Arming column, turn on the switch to enable auto-arming. Figure 9-11 Arm Device After turned on, the device(s) will be armed. And notifications about the events triggered by the armed device(s) will be automatically sent to the client software in real-time. 9.10.2 View Real-Time Events The real-time event information received by the client of the connected resources are displayed. You can check the real-time event information, including event source, event time, priority, etc. Before You Start Enable receiving events from devices before the client can receive event from the device, see Enable Receiving Event from Devices for details. Steps 1. Click Event Center Real-time Event to enter the real-time event page and you can view the real-time events received by the client. Event Time For encoding device, event time is the client time when it receives the event. For other device types, event time is the time when the event is triggered. Priority 2. Filter the events. Priority represents the emergency degree of the event. 138 DS-K1T680 Series Face Recognition Terminal User Manual Filter by Device Type and (or) Priority Select device type(s) and (or) priorities to filter events. Filter by Keywords Enter the keywords to filter the events. 3. Optional: Right-click the table header of the event list to customize the event related items to be displayed in the event list. 4. View the event details. 1) Select an event in the event list. 2) Click Expand in the right-lower corner of the page. 3) View the detail description and handing records of the event. 5. Optional: Perform the following operations if necessary. Handle Single Event Click Handle to enter the processing suggestion, and then click Commit. Note After an event is handled, the Handle button will become Add Remark. Click Add Remark to add more remarks for this handled event. Handle Events in a Batch Select events that need to be processed, and then click Handle in Batch. Enter the processing suggestion, and then click Commit. Enable/Disable Alarm Audio Click Enable Audio/Disable Audio to enable/disable the audio of the event. Select the Latest Event Automatically Check Auto-Select Latest Event to select the latest event automatically and the event information details is displayed. Clear Events Send Email Click Clear to clear the all the events in the event list. Select an event and then click Send Email, and the information details of this event will be sent by email. Note You should configure the email parameters first, see for details. 9.10.3 Search Historical Events In the Event Search module of the event center page, you can search the historical events via time, device type, and other conditions according to the specified device type, and then process the events. Before You Start Enable receiving events from devices before the client can receive event information from the device,see Enable Receiving Event from Devices for details. 139 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Click Event Center Event Search to enter the event search page. 2. Set the filter conditions to display the required events only. Figure 9-12 Search History Event The client time when the event starts. Time Search by Device Type Group: Search the events occurred on the resources in the selected group. Device: Search the events occurred on the selected device. The type of device that occurred the event. All All the device types, and you can set the following filter conditions: group, priority, and status. Video Intercom For the events of video intercom, you need to select searching scope: All Record and Only Unlocking. All Records: You can filter the events from all the video intercom events, and you need to set the following filter conditions: device, priority, status. Only Unlocking: You can filter the events from all the video intercom unlocking events, and you need to set the following filter conditions: device, unlocking type. Access Control For the events of access control, you can set the following filter conditions: device, priority, status, event type, card reader type, person name, card no., organization. 140 DS-K1T680 Series Face Recognition Terminal User Manual Note Click Show More to set the event type, card reader type, person name, card no., organization. Group Device Priority Status The group of the device that occurred the event. You should set the group as condition only when you select the Device Type as All. The device that occurred the event. The priority including low, medium, high and uncategorized which indicates the urgent degree of the event. The handling status of the event. 3. Click Search to search the events according the conditions you set. 4. Optional: Right click the table header of the event list to customize the event related items to be displayed in the event list. Figure 9-13 Customize Event Related Items to be Displayed 5. Optional: Handle the event(s).
- Handle single event: Select one event that need to be processed, and then click Handle in the event information details page, and enter the processing suggestion.
- Handle events in a batch: Select the events which need to be processed, and then click Handle in Batch, and enter the processing suggestion. 141 DS-K1T680 Series Face Recognition Terminal User Manual Note Note After an event is handled, the Handle button will become Add Remark, click Add Remark to add more remarks for this handled event. 6. Optional: Select an event and then click Send Email, and the information details of this event will be sent by email. You should configure the email parameters first, see Set Email Parameters in the user manual of client software for details. 7. Optional: Click Export to export the event log or event pictures to the local PC in CSV format. You can set the saving path manually. 8. Hover the cursor on the related picture, and then click the download icon on the upper-right corner of the picture to download it to the local PC. You can set the saving path manually. 9.11 Time and Attendance The Time and Attendance module provides multiple functionalities to track and monitor when employees start and stop work, and full control of employees working hours such as late arrivals, early departures, time taken on breaks and absenteeism. Note In this section, we introduce the configurations before you can getting the attendance reports. The access records recorded after these configurations will be calculated in the statistics. 9.11.1 Configure Attendance Parameters You can configure the attendance parameters, including the general rule, overtime parameters, attendance check point, holiday, leave type, etc. Set Weekend Steps Note The days of weekends may vary in different countries and regions. The client provides weekends definition function. You can select one or more days as the weekends according to actual requirements, and set different attendance rules for weekends from workdays. The parameters configured here will be set as default for the newly added time period. It will not affect the existed one(s). 142 DS-K1T680 Series Face Recognition Terminal User Manual 1. Enter Time & Attendance module. 2. Click Attendance Settings General Rule . 3. Select the day(s) as weekend, such as Saturday and Sunday. 4. Click Save. Configure Overtime Parameters You can configure the overtime parameters for workday and weekend, including overtime level, work hour rate, attendance status for overtime, etc. Steps 1. Click Time & Attendance Attendance Settings Overtime . 2. Set required information. Overtime Level for Workday When you work for a certain period after end-work time on workday, you will reach different overtime level: overtime level 1, overtime level 2 and overtime level 3. You can set different work hour rate for three overtime levels, respectively. Work Hour Rate Work Hour Rate is used to calculate work hours by multiplying it by overtime. When you work for a certain period after end-work time on workday, you will reach different overtime level. You can set different work hour rates (1-10, can be a decimal) for three overtime levels. For example, your valid overtime is one hour (in overtime level 1), and the work hour rate of overtime level 1 is set as 2, then the work hours in the period will be calculated as 2 hours. Overtime Rule for Weekend You can enable overtime rule for weekend and set calculation mode. 3. Click Save. Configure Attendance Check Point You can set the card reader(s) of the access point as the attendance check point, so that the authentication on the card readers will be recorded for attendance . Before You Start You should add access control device before configuring attendance check point. For details, refer to Add Device . Steps Note By default, all card readers of the added access control devices are set as attendance checkpoint. 1. Enter the Time & Attendance module. 143 DS-K1T680 Series Face Recognition Terminal User Manual 2. Click Attendance Settings Attendance Check Point to enter the Attendance Check Point Settings page. 3. Optional: Set Set All Card Readers as Check Points switch to off. Only the card readers in the list will be set as the attendance check points. 4. Check the desired card reader(s) in the device list as attendance check point(s). 5. Set check point function as Start/End-Work, Start-Work or End-Work. 6. Click Set as Check Point. The configured attendance check point displays on the right list. You can add the holiday during which the check-in or check-out will not be recorded. Configure Holiday Add Regular Holiday You can configure a holiday which will take effect annually on regular days during the effective period, such as New Year's Day, Independence Day, Christmas Day, etc. Steps 1. Enter the Time & Attendance module. 2. Click Attendance Settings Holiday to enter the Holiday Settings page. 3. Check Regular Holiday as holiday type. 4. Custom a name for the holiday. 5. Set the first day of the holiday. 6. Enter the number of the holiday days. 7. Set the attendance status if the employee works on holiday. 8. Optional: Check Repeat Annually to make this holiday setting effective every year. 9. Click OK. The added holiday will display in the holiday list and calendar. If the date is selected as different holidays, it will be recorded as the first-added holiday. 10. Optional: After adding the holiday, perform one of the following operations. Edit Holiday Click to edit the holiday information. Delete Holiday Select one or more added holidays, and click Delete to delete the holiday(s) from the holiday list. Add Irregular Holiday You can configure a holiday which will take effect annually on irregular days during the effective period, such as Bank Holiday. 144 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Enter the Time & Attendance module. 2. Click Attendance Settings Holiday to enter the Holiday Settings page. 3. Click Add to open the Add Holiday page. 4. Check Irregular Holiday as holiday type. 5. Custom a name for the holiday. 6. Set the start date of the holiday. Example If you want to set the forth Thursday in November, 2019 as the Thanksgiving Day holiday, you should select 2019, November, 4th, and Thursday from the four drop-down lists. 7. Enter the number of the holiday days. 8. Set the attendance status if the employee works on holiday. 9. Optional: Check Repeat Annually to make this holiday setting effective every year 10. Click OK. The added holiday will display in the holiday list and calendar. If the date is selected as different holidays, it will be recorded as the first-added holiday. 11. Optional: After adding the holiday, perform one of the following operations. Edit Holiday Click to edit the holiday information. Delete Holiday Select one or more added holidays, and click Delete to delete the holiday(s) from the holiday list. Configure Leave Type You can customize the leave type (major leave type and minor leave type) according to actual needs. You can also edit or delete the leave type. Steps 1. Enter the Time & Attendance module. 2. Click Attendance Settings Leave Type to enter the Leave Type Settings page. 3. Click Add on the left to add a major leave type. 4. Optional: Perform one of the following operations for major leave type. Edit Move the cursor over the major leave type and click type. to edit the major leave Delete Select one major leave type and click Delete on the left to delete the major leave type. 5. Click Add on the right to add a minor leave type. 6. Optional: Perform one of the following operations for minor leave type. Edit Move the cursor over the minor leave type and click type. to edit the minor leave 145 DS-K1T680 Series Face Recognition Terminal User Manual Delete Select one or multiple major leave types and click Delete on the right to delete the selected minor leave type(s). Synchronize Authentication Record to Third-Party Database The attendance data recorded in client software can be used by other system for calculation or some other operations. You can enable synchronization function to apply the authentication record from client software to the third-party database automatically. Steps 1. Enter Time & Attendance module. 2. Click Attendance Settings Third-Party Database . 3. Set Apply to Database switch to on to enable synchronization function. 4. Select database Type as SQLServer or MySql. Note If you select MySql, you should import the configuration file (libmysql.dll) from local PC. 5. Set the other required parameters of the third-party database, including server IP address, database name, user name and password. 6. Set table parameters of database according to the actual configuration. 1) Enter the table name of the third-party database. 2) Set the mapped table fields between the client software and the third-party database. 7. Click Save to test whether database can be connected and save the settings for the successful connection. The attendance data will be written to the third-party database. During synchronization, if the client disconnects with the third-party database, the client will start reconnection every 30 mins. After being reconnected, the client will synchronize the data recorded during the disconnected time period to the third-party database. Configure Break Time You can add break time and set start time, end time, duration, calculation mode and other parameters for the break. The added break time can also be edited or deleted. Steps 1. Click Time & Attendance Timetable . The added timetables are displayed in the list. 2. Select an added timetable or click Add to enter setting timetable page. 3. Click Break Time to enter Break Time page. 4. Click Break Time Settings. 5. Add break time. 1) Click Add. 146 DS-K1T680 Series Face Recognition Terminal User Manual 2) Enter a name for the break time. 3) Set related parameters for the break time. Start Time / End Time Set the time when the break starts and ends. No Earlier Than / No Later Than Set the earliest swiping time for starting break and the latest swiping time for ending break. The duration from start time to end time of the break. Break Duration Calculation Auto Deduct Must Check Note The fixed break duration will be excluded from work hours. The break duration will be calculated and excluded from work hours according to actual check-in and check-out time. If you select Must Check as calculation method, you need to set attendance status for late or early returning from break. You can configure display contents displayed in the attendance report, such as the company name, logo, date format, time format, and mark. 6. Click Save to save the settings. 7. Optional: Click Add to continue adding break time. Configure Report Display Steps 1. Enter Time & Attendance module. 2. Click Attendance Statistics Report Display . 3. Set the display settings for attendance report. Company Name Enter a company name to display the name in the report. Attendance Status Mark Enter the mark and select the color. The related fields of attendance status in the report will display with the mark and color. Weekend Mark Enter the mark and select the color. The weekend fields in the report will display with the mark and color. 147 DS-K1T680 Series Face Recognition Terminal User Manual 4. Click Save. 9.11.2 Add General Timetable On the timetable page, you can add general timetable for employees, which requires the fixed start-work time and end-work time. Also, you can set valid check-in/out time, allowable timetable for being late and leaving early. Steps 1. Click Time and Attendance Timetable to enter the timetable settings page. 2. Click Add to enter add timetable page. Figure 9-14 Add Timetable 3. Create a name for the timetable. Note 4. Select the timetable type as general. 5. Select calculation method. First In & Last Out You can click the color icon beside the name to customize the color for the valid timetable on the time bar in the Configuration Result area. 148 DS-K1T680 Series Face Recognition Terminal User Manual The first check-in time is recorded as start work time and the last check-out time is recorded as the end-work time. Each Check-In/Out Each check-in time and check-out time is valid and the sum of all periods between adjacent check-in and check-out time will be recorded as the valid working duration. You need to set Valid Authentication Interval for this calculation method. For example, if the interval between card swiping of the same card is less than the set value, the card swiping is invalid. 6. Optional: Set Enable T&A Status switch to on to calculate according to attendance status of the device. Note This function should be supported by the device. 7. Set the related attendance time parameters as the following:
Start/End-Work Time Set the start-work time and end-work-time. Valid Check-in/out Time Calculated as Set the duration calculated as the actual work duration. Late/Early Leave Allowable Set the timetable for late or early leave. 8. Set absence related parameters. Check-In, Late for On the time bar, adjust the yellow bar to set the timetable during which the check-in or check-out is valid. You can set the late time duration for the employee who has checked in but is late for work. If the employee exceeds the required time period, his/her attendance data will be marked as absent. Check-Out, Early Leave for You can set the early leave time duration for the employee who checks out earlier than the normal leave time, and his/her attendance data will be marked as absent. If the employee does not check in, his/her attendance data may be marked as absent or late. No Check-in No Check-Out If the employee does not check out, his/her attendance data may be marked as absent or early leave. 9. Click Save to add the timetable. 149 DS-K1T680 Series Face Recognition Terminal User Manual 10. Optional: Perform one or more following operations after adding timetable. Edit Timetable Select a timetable from the list to edit related information. Delete Timetable Select a timetable from the list and click Delete to delete it. 9.11.3 Add Shift You can add shift for employees including setting shift period (day, week, month) and the effective attendance time. According to the actual requirements, you can adding multiple timetables in one shift for employees, which requires them to check in and check out for each timetable. Before You Start Add a timetable first. See Add General Timetable for details. Steps 1. Click Time & Attendance Shift to enter shift settings page. 2. Click Add to enter Add Shift page. 3. Enter the name for shift. 4. Select the shift period from the drop-down list. 5. Select the added timetable and click on the time bar to apply the timetable. Figure 9-15 Add Shift 150 DS-K1T680 Series Face Recognition Terminal User Manual Note You can select more than one timetables. The start and end work time and the valid check-in and out time in different time tables can not be overlapped. 6. Click Save. Figure 9-16 Add Multiple Timetables The added shift lists on the left panel of the page. At most 64 shifts can be added. 7. Optional: Assign the shift to organization or person for a quick shift schedule. 1) Click Assign. 2) Select Organization or Person tab and check the desired organization(s) or person(s) box. The selected organizations or persons will list on the right page. 3) Set the Expire Date for the shift schedule. 4) Set other parameters for the schedule. Check-in Not Required Persons in this schedule do not need to check-in when they come to work. Check-out Not Required Scheduled on Holidays Persons in this schedule do not need to check-out when they end work. On the holidays, this schedule is still effective and the persons needs to go to work according to the schedule. 151 DS-K1T680 Series Face Recognition Terminal User Manual Effective for Overtime The persons' overtime will be recorded for this schedule. 5) Click Save to save the quick shift schedule. 9.11.4 Manage Shift Schedule Shift work is an employment practice designed to make use of all 24 hours of the clock each day of the week. The practice typically sees the day divided into shifts, set periods of time during which different shifts perform their duties. You can set department schedule, person schedule, and temporary schedule. Set Department Schedule You can set the shift schedule for one department, and all the persons in the department will be assigned with the shift schedule. Before You Start In Time & Attendance module, the department list is the same with the organization. You should add organization and persons in Person module first. See Person Management for details. Steps 1. Click Time & Attendance Shift Schedule to enter the Shift Schedule Management page. 2. Click Department Schedule to enter Department Schedule page. 3. Select the department from the organization list on the left. If Include Sub Organization is checked, when selecting the organization, its sub organizations are selected at the same time. 4. Select the shift from the drop-down list. 5. Optional: Enable Multiple Shift Schedules and select the effective time period(s) from the added timetables for the persons. Note Note This is only available for shift with only one timetable. Multiple Shift Schedules It contains more than one timetables. The person can check in/out in any of the timetables and the attendance will be effective. If the multiple shift schedules contains three timetables: 00:00 to 07:00, 08:00 to 15:00 and 16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be effective in any of the three timetables. If the person checks in at 07:50, it will apply the nearest timetable 08:00 to 15:00 to the person's attendance. 152 Check-out Not Required Scheduled on Holidays Effective for Overtime 8. Click Save. Set Person Schedule Steps Note DS-K1T680 Series Face Recognition Terminal User Manual 6. Set the start date and end date. 7. Set other parameters for the schedule. Check-in Not Required Persons in this schedule do not need to check-in when they come to work. Persons in this schedule do not need to check-out when they end work. On the holidays, this schedule is still effective and the persons needs to go to work according to the schedule. The persons' overtime will be recorded for this schedule. You can assign the shift schedule to one or more persons. You can also view and edit the person schedule details. Before You Start Add department and person in Person module. See Person Management for details. The person schedule has the higher priority than department schedule. 1. Click Time & Attendance Shift Schedule to enter the Shift Schedule page. 2. Click Person Schedule to enter Person Schedule page. 3. Select the organization and select the person(s). 4. Select the shift from the drop-down list. 5. Optional: Enable Multiple Shift Schedules and select the effective time period(s) from the added timetables for the persons. Note This is only available for shift with only one timetable. Multiple Shift Schedules It contains more than one timetables. The person can check in/out in any of the timetables and the attendance will be effective. If the multiple shift schedules contains three timetables: 00:00 to 07:00, 08:00 to 15:00 and 16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be 153 Check-out Not Required Scheduled on Holidays Effective for Overtime 8. Click Save. Set Temporary Schedule Steps Note DS-K1T680 Series Face Recognition Terminal User Manual effective in any of the three timetables. If the person checks in at 07:50, it will apply the nearest timetable 08:00 to 15:00 to the person's attendance. 6. Set the start date and end date. 7. Set other parameters for the schedule. Check-in Not Required Persons in this schedule do not need to check-in when they come to work. Persons in this schedule do not need to check-out when they end work. On the holidays, this schedule is still effective and the persons needs to go to work according to the schedule. The persons' overtime will be recorded for this schedule. You can add a temporary schedule for the person and the person will be assigned with the shift schedule temporarily. You can also view and edit the temporary schedule details. Before You Start Add department and person in Person module. See Person Management for details. The temporary schedule has higher priority than department schedule and person schedule. 1. Click Time & Attendance Shift Schedule to enter the Shift Schedule Management page. 2. Click Temporary Schedule to enter Temporary Schedule page. 3. Select the organization and select the person(s). 4. Click one date or click and drag to select multiple dates for the temporary schedule. 5. Select Workday or Non-Workday from drop-down list. If Non-Workday is selected, you need to set the following parameters. Calculated as Select normal or overtime level to mark the attendance status for temporary schedule. Timetable Select a timetable from drop-down list. Multiple Shift Schedule 154 DS-K1T680 Series Face Recognition Terminal User Manual It contains more than one timetables. The person can check in/out in any of the timetables and the attendance will be effective. If the multiple shift schedules contains three timetables: 00:00 to 07:00, 08:00 to 15:00 and 16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be effective in any of the three timetables. If the person checks in at 07:50, it will apply the nearest timetable 08:00 to 15:00 to the person's attendance. Set other rule for the schedule, such as Check-in Not Required, andCheck-out Not Required. Rule 6. Click Save. Check Shift Schedule You can check the shift schedule in calendar or list mode. You ca also edit or delete the shift schedule. Steps 1. Click Time & Attendance Shift Schedule to enter the Shift Schedule Management page. 2. Select the organization and corresponding person(s). 3. Click to view the shift schedule in calendar or list mode. or Calendar List In calendar mode, you can view the shift schedule for each day in one month. You can click the temporary schedule for one day to edit or delete it. In list mode, you can view the shift schedule details about one person or organization, such as shift name, type, effective period and so on. Check the shift schedule(s), and click Delete to delete the selected shift schedule(s). 9.11.5 Manually Correct Check-in/out Record If the attendance status is not correct, you can manually correct the check-in or check out record. You can also edit, delete, search, or export the check-in or check-out record. Before You Start You should add organizations and persons in Person module. For details, refer to Person Management . The person's attendance status is incorrect. Steps 1. Click Time & Attendance Attendance Handling to enter attendance handling page. 2. Click Correct Check-In/Out to enter adding the check-in/out correction page. 3. Select person from left list for correction. 4. Select the correction date. 155 DS-K1T680 Series Face Recognition Terminal User Manual 5. Set the check-in/out correction parameters.
- Select Check-in and set the actual start-work time.
- Select Check-out and set the actual end-work time. Note You can click supported. to add multiple check in/out items. At most 8 check-in/out items can be 6. Optional: Enter the remark information as desired. 7. Click Save. 8. Optional: After adding the check-in/out correction, perform one of the following operations. View or to view the added attendance handling information in calendar or list Click mode. Note In calendar mode, you need to click Calculate to get the attendance status of the person in one month. Edit In calendar mode, click the related label on date to edit the details. In list mode, double-click the related filed in Date, Handling Type, Time, or Remark column to edit the information. Delete Delete the selected items. Export Export the attendance handling details to local PC. Note The exported details are saved in CSV format. 9.11.6 Add Leave and Business Trip You can add leave and business trip when the employee want to ask for leave or go on a business trip. Before You Start You should add organizations and persons in the Person module. For details, refer to Person Management . Steps 1. Click Time & Attendance Attendance Handling to enter attendance handling page. 2. Click Apply for Leave/Business Trip to enter adding the leave/business trip page. 3. Select person from left list. 4. Set the date(s) for your leave or business trip. 5. Select the major leave type and minor leave type from the drop-down list. 156 DS-K1T680 Series Face Recognition Terminal User Manual Note You can set the leave type in Attendance Settings. For details, refer to Configure Leave Type . 6. Set the time for leave. 7. Optional: Enter the remark information as desired. 8. Click Save. 9. Optional: After adding the leave and business trip, perform one of the following operations. View or to view the added attendance handling information in calendar or list Click mode. Note In calendar mode, you need to click Calculate to get the attendance status of the person in one month. Edit In calendar mode, click the related label on date to edit the details. In list mode, double-click the filed in Date, Handling Type, Time, or Remark column to edit the related information. Delete Delete the selected items. Export Export the attendance handling details to local PC. Note The exported details are saved in CSV format. 9.11.7 Calculate Attendance Data You need to calculate the attendance data before searching and viewing the overview of the attendance data, employees' detailed attendance data, employees' abnormal attendance data, the employees' overtime working data, and card swiping log. Automatically Calculate Attendance Data You can set a schedule so that the client can automatically calculate attendance data of the previous day at the time you configured every day. Steps Note 1. Enter the Time & Attendance module. 2. Click Attendance Settings General Rule . 157 DS-K1T680 Series Face Recognition Terminal User Manual 3. In the Auto-Calculate Attendance area, set the time that you want the client to calculate the data. 4. Click Save. The client will calculate the attendance data of the previous day from the time you have configured. Manually Calculate Attendance Data You can calculate the attendance data manually by setting the data range. Steps 1. Enter the Time & Attendance module. 2. Click Attendance Statistics Calculation . 3. Set the start time and end time to define the attendance data range. 4. Set other conditions, including department, name, person ID and attendance status. 5. Click Calculate. Note It can only calculate the attendance data within three months. 6. Perform one of the following operations. Correct Check-in/out Click Correct Check-in/out to add check-in/out correction. Select Items to Display Click be displayed in the report.
, or right-click the titles of different items to select items to Generate Report Click Report to generate the attendance report. Export Report Click Export to export attendance data to local PC. Note The exported details are saved in .CSV format. 9.11.8 Attendance Statistics You can check the original attendance record, generate and export the attendance report based on the calculated attendance data. Get an Overview of Employees' Attendance Data You can search and view the employee's attendance records on the client, including attendance time, attendance status, check point, etc. 158 DS-K1T680 Series Face Recognition Terminal User Manual Before You Start You should add organizations and persons in Person module and the persons have swiped cards. For details, refer to Person Management . Calculate the attendance data. Note next day. The client will automatically calculate the previous day's attendance data at 1:00 am on the Keep the client running at 1:00 am or it cannot calculate the previous day's attendance data automatically. If not calculated automatically, you can calculate the attendance data manually. For details, refer to Manually Calculate Attendance Data . Steps 1. Enter the Time & Attendance module. 2. Click Attendance Statistics Attendance Record . 3. Set the attendance start time and end time that you want to search. 4. Set other search conditions, including department, name, and person ID. 5. Select data source as Original Records on Device or Manual Handling Records. 6. Optional: Click Get Events from Device to get the attendance data from the device. 7. Optional: Click Reset to reset all the search conditions and edit the search conditions again. 8. Click Search. The result displays on the page. You can view the employee's required attendance status and check point. 9. Optional: After searching the result, perform one of the following operations. Generate Report Click Report to generate the attendance report. Export Report Click Export to export the results to the local PC. Custom Export Click Custom Report and set conditions to export attendance records according to actual needs. It supports to generate the a series of attendance reports manually to view the employees'
attendance results. Generate Instant Report Before You Start Calculate the attendance data. Note You can calculate the attendance data manually, or set the schedule so that the client can calculate the data automatically every day. For details, refer to Calculate Attendance Data . 159 DS-K1T680 Series Face Recognition Terminal User Manual Steps 1. Enter the Time & Attendance module. 2. Click Attendance Statistics Report . 3. Select a report type. 4. Select the department or person to view the attendance report. 5. Set the start time and end time during which the attendance data will be displayed in the report. 6. Click Report to generate the statistics report and open it. Custom Attendance Report The client supports multiple report types and you can pre-define the report content and it can send the report automatically to the email address you configured. Set the email parameters before you want to enable auto-sending email functions. For details, refer to Set Email Parameters in the user manual of the client software. Steps Note Report Name Report Type Report Time Person 1. Enter the Time & Attendance module. 2. Click Attendance Statistics Custom Report . 3. Click Add to pre-define a report. 4. Set the report content. Enter a name for the report. Select one report type and this report will be generated. The time to be selected may vary for different report type. Select the added person(s) whose attendance records will be generated for the report. 5. Optional: Set the schedule to send the report to the email address(es) automatically. 1) Check the Auto-Sending Email to enable this function. 2) Set the effective period during which the client will send the report on the selected sending date(s). 3) Select the date(s) on which the client will send the report. 4) Set the time at which the client will send the report. 160 DS-K1T680 Series Face Recognition Terminal User Manual Example If you set the effective period as 2018/3/10 to 2018/4/10, select Friday as the sending date, and set the sending time as 20:00:00, the client will send the report at 8 p.m. on Fridays during 2018/3/10 to 2018/4/10. Make sure the attendance records are calculated before the sending time. You can calculate the attendance data manually, or set the schedule so that the client can calculate the data automatically every day. For details, refer to Calculate Attendance Data . 5) Enter the receiver email address(es). Note Note You can click + to add a new email address. Up to 5 email addresses are allowed. 6) Optional: Click Preview to view the email details. 6. Click OK. 7. Optional: After adding the custom report, you can do one or more of the followings:
Edit Report Select one added report and click Edit to edit its settings. Delete Report Select one added report and click Delete to delete it. Generate Report Select one added report and click Report to generate the report instantly and you can view the report details. 161 DS-K1T680 Series Face Recognition Terminal User Manual Appendix A. Tips for Scanning Fingerprint Recommended Finger Forefinger, middle finger or the third finger. Correct Scanning The figure displayed below is the correct way to scan your finger:
You should press your finger on the scanner horizontally. The center of your scanned finger should align with the scanner center. Incorrect Scanning The figures of scanning fingerprint displayed below are incorrect:
Environment The scanner should avoid direct sun light, high temperature, humid conditions and rain. When it is dry, the scanner may not recognize your fingerprint successfully. You can blow your finger and scan again. 162 DS-K1T680 Series Face Recognition Terminal User Manual Others If your fingerprint is shallow, or it is hard to scan your fingerprint, we recommend you to use other authentication methods. If you have injuries on the scanned finger, the scanner may not recognize. You can change another finger and try again. 163 DS-K1T680 Series Face Recognition Terminal User Manual Appendix B. Tips When Collecting/Comparing Face Picture The position when collecting or comparing face picture is as below:
Positions (Recommended Distance: 0.5 m) Expression Keep your expression naturally when collecting or comparing face pictures, just like the expression in the picture below. Do not wear hat, sunglasses, or other accessories that can affect the facial recognition function. Do not make your hair cover your eyes, ears, etc. and heavy makeup is not allowed. Posture In order to get a good quality and accurate face picture, position your face looking at the camera when collecting or comparing face pictures. Size Make sure your face is in the middle of the collecting window. 164 DS-K1T680 Series Face Recognition Terminal User Manual 165 DS-K1T680 Series Face Recognition Terminal User Manual Appendix C. Tips for Installation Environment 1. Light Source Illumination Reference Value Candle: 10Lux Bulb: 100~850Lux Sunlight: More than 1200Lux 2. Install the device at least 2 meters away from the light, and at least 3 meters away from the window or door. 3.Avoid backlight, direct and indirect sunlight 166 DS-K1T680 Series Face Recognition Terminal User Manual Appendix D. Dimension Figure D-1 Dimension 167 DS-K1T680 Series Face Recognition Terminal User Manual Figure D-2 Dimension with Bracket 168 DS-K1T680 Series Face Recognition Terminal User Manual Appendix E. Function Differences Model K1T680D K1T680D K1T680D K1T680D K1T680D K1T680D K1T680D K1T680D DS-
FG DS-
F DS-
FW DS-
F-E1 DS-
G DS-
W DS-
Wi-Fi PoE Not Support Not Support Not Support Not Support Support Support Not Not Support Support Support Not Support Not 3G/4G Support Not Support Not Support Support Not Support Not Support Not Support Not Support Support Not Support Not Support DS-
-E1 Not Support Support Not Support 169 DS-K1T680 Series Face Recognition Terminal User Manual Appendix F. Communication Matrix and Device Command Communication Matrix Scan the following QR code to get the device communication matrix. Note that the matrix contains all communication ports of Hikvision access control and video intercom devices. Figure F-1 QR Code of Communication Matrix Device Command Scan the following QR code to get the device common serial port commands. Note that the command list contains all commonly used serial ports commands for all Hikvision access control and video intercom devices. Figure F-2 Device Command 170 UD21056B-A
1 | Label | ID Label/Location Info | 459.55 KiB | November 06 2020 |
HIKVISION Face Recognition Terminal Model: DS-K1T680DFG1 UP: 12-24V==38 SN: AB1234567 Date: 10/2020 Contains FCC ID: XMR201805EC25AU Made in China FCC ID:2ADTD-K1T680DFG1 This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
({)this device may not cause harmful interference, and
(Qithis device must accept any interference received, including interference that may cause undesired operation. Manufacturer: Hangzhou Hikvision Digital Technology Co.,Ltd. Address: No.555 Qianmo Road, Binjiang District, Hangzhou 310052, China
1 | Applicant Declaration Letter | Cover Letter(s) | 135.33 KiB | November 06 2020 |
SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia 30024 United States Applicant Declaration Applicant Legal Business Name Hangzhou Hikvision Digital Technology Co., Ltd. No. 555 Qianmo Road, Binjiang District Hangzhou 310052, China Address Grantee Code FCC ID Contact Email Contact Phone Authorized Contact Name Xiuying Zhang 2ADTD 2ADTD-K1T680DFG1 zhangxiuying@hikvision.com
+86-571-88075998 a) b) c) d) e) I, the undersigned, certify that I am an authorized signatory for the Applicant and therefore declare;
in accordance with 47CFR2.911(d), all of the statements herein and the exhibits attached hereto are true and correct to the best of my knowledge and belief. in accepting a Grant of Equipment Authorization issued by a TCB, under the authority of the FCC, as a result of the representations made in this application, the Applicant is responsible for:
(1)
(2)
(3) labeling the equipment with the exact FCC ID as specified in this application, compliance statement labeling pursuant to the applicable rules, compliance of the equipment with the applicable technical rules, if the Applicant is not the actual manufacturer of the equipment, appropriate arrangements have been made with the manufacturer to ensure that production units of this equipment will continue to comply with the FCCs technical requirements. in accordance with 47 CFR 2.909 and KDB394321, the Applicant has read, understood and agrees to accept that they are the responsible party and agree to abide by their responsibilities as specified under 47 CFR 2.909 and KDB394321. in accordance with ISO17065, FCC KDB641163, FCC KDB610077, KDB394321 and RSP-100, the Applicant has read, understood, accepts and agrees to abide by the post market surveillance requirements.
(1)
(2)
(3) the Applicant understands, accepts and agrees that a sample may be requested for surveillance testing. the Applicant shall make provisions to always have a production sample available upon request by SGS, FCC and/or ISED. the Applicant shall, upon request by SGS, at the Applicants expense, provide a production sample of the requested product to SGS, FCC and/or ISED as instructed. The sample shall include all support devices, cables, software, accessories or other hardware or software required for evaluation, review, certification and audit surveillance of products certified by SGS. f) neither the Applicant nor any party to the application is subject to a denial of Federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 862 because of a conviction for possession or distribution of a controlled substance. See 47CFR 1.2002(b) for the definition of a party for these purposes. g) the Applicant has read, understood, accepts and agrees to abide by the SGS North America, Inc.(TCB) terms and conditions. Link to CFRs: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-regulations-title-47 Link to KDBs: https://apps.fcc.gov/oetcf/kdb/index.cfm Link to RSP-100: https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf01130.html Date:2020/09/30 Applicant Signature:
Print Name:
Xiuying Zhang Title:
Senior Certification engineer
*NOTE: This declaration cannot be signed by an Agent, it shall be signed by an authorized person listed in the FCC database Applicant Declaration Rev:0.0
1 | Auth letter FCC | Cover Letter(s) | 107.34 KiB | November 06 2020 |
Hangzhou Hikvision Digital Technology Co., Ltd. TO:
Federal Communication Commission Equipment Authorization Branch 7435 Oakland Mills Road Columbia, MID 21046 Regarding: FCC ID: 2ADTD-K1T680DFG1 To whom it may concern:
Date: 2020-09-30 We, the undersigned, hereby authorize Parlam Zhan to act on our behalf in all manners relating to application for equipment authorization with respect to the FCC ID above, including signing of all documents relating to these matters. Any and all acts carried out by the agent on our behalf shall have the same effect as acts of our own. We, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). Where our agent signs the application for certification on our behalf, I acknowledge that all responsibility for complying with the terms and conditions for Certification, as specified by SGS North America, Inc., still resides with Hangzhou Hikvision Digital Technology Co., Ltd. This authorization is valid until further written notice from the applicant. Name (Printed): Xiuying Zhang Title: Senior Certification engineer Signature:
On behalf of Company: Hangzhou Hikvision Digital Technology Co., Ltd. Telephone: +86-0571-88075998-62460
1 | MCL | Cover Letter(s) | 186.71 KiB | November 06 2020 |
Hangzhou Hikvision Digital Technology Co., Ltd. Current Date : 2020-0 9 - 3 0 To:
SGS-CSTC Standards Technical Services (Shanghai) Co., Ltd. No. 588 West Jindu Road, Songjiang District, Shanghai, China. 201612 Dear Sir/Madam, Subject: Declaration Letter about Identity of Products
*WE (Hangzhou Hikvision Digital Technology Co., Ltd.) HEREBY DECLARED THAT Product Description Face Recognition Terminal Model No. DS-K1T680DG1,DS-K1T680DFG1UHK,DS-K1T680DFG1CKV,DS-K1T680DFG1UVS,DS-
K1T680DFG1KVO,DS-K1T680DFG1HUN,DS-K1T680DG1UHK,DS-K1T680DG1CKV,DS-
K1T680DG1UVS,DS-K1T680DG1KVO,DS-K1T680DG1HUN Manufacturers Name Hangzhou Hikvision Digital Technology Co., Ltd. Manufacturers Address No.555 Qianmo Road, Binjiang District, Hangzhou 310052, China
*Except that the model number, trade name and appearance deviation, are identical with the original product as follows:
Note: The definition of identical should be electrically identical. A device will be considered to be electrically identical if no changes are made to the devices schematics, board layouts, component layouts, chip sets, resistors and all other electrical aspects of the device are identical. Model No. ():
DS-K1T680DFG1 Manufacturers Name ():
Hangzhou Hikvision Digital Technology Co., Ltd. Manufacturers Address): No.555 Qianmo Road, Binjiang District, Hangzhou 310052, China Sincerely, Signature ():
Printed Name ():
Xiuying Zhang Position/Title ():
Senior Certification engineer Contact Number ():
+86-571-88075998
1 | confidentiality letter | Cover Letter(s) | 78.52 KiB | November 06 2020 |
Hangzhou Hikvision Digital Technology Co., Ltd. To:
SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia United States From: Hangzhou Hikvision Digital Technology Co., Ltd. No. 555 Qianmo Road, Binjiang District, Hangzhou 310052, China Confidentiality Request regarding application for FCC ID: 2ADTD-K1T680DFG1 Regarding:
LONG TERM CONFIDENTIALITY Pursuant to 47 CFR Section 0.459 and 0.457 of the commissions rules, the applicant hereby request confidential treatment of the documents listed below, associated with the certification application referenced above. The documents above contain proprietary information not released to the public. Public disclosure of this information may prove harmful to the business of the applicant. Schematic(s) Block Diagrams Operational Descriptions Sincerely, Signature:
Printed Name (on file with the FCC associated with the Grantee Code): Xiuying Zhang Title: Senior Certification engineer Company Name: Hangzhou Hikvision Digital Technology Co., Ltd.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2020-11-06 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2020-11-06
|
||||
1 | Applicant's complete, legal business name |
Hangzhou Hikvision Digital Technology Co., Ltd.
|
||||
1 | FCC Registration Number (FRN) |
0024149825
|
||||
1 | Physical Address |
No. 555 Qianmo Road, Binjiang District
|
||||
1 |
Hangzhou, N/A
|
|||||
1 |
China
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 | TCB Scope |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
2ADTD
|
||||
1 | Equipment Product Code |
K1T680DFG1
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
X****** Z****
|
||||
1 | Telephone Number |
+86-5********
|
||||
1 | Fax Number |
+86-5********
|
||||
1 |
z******@hikvision.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P**** Z********
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
86 21********
|
||||
1 | Fax Number |
86 21********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P******** Z********
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
86 21********
|
||||
1 | Fax Number |
86 21********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DXX - Part 15 Low Power Communication Device Transmitter | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Face Recognition Terminal | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Compliance Certification Services (Kunshan) Inc.
|
||||
1 | Name |
M******** C********
|
||||
1 | Telephone Number |
+ 86-******** Extension:
|
||||
1 |
J******@ccsrf.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 13.56000000 | 13.56000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC