all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 4 |
|
User Manual | Users Manual | 4.60 MiB | September 10 2017 | |||
1 2 3 4 | Cover Letter(s) | April 07 2018 | ||||||
1 2 3 4 | Cover Letter(s) | April 07 2018 | ||||||
1 2 3 4 | Internal Photos | April 07 2018 | ||||||
1 2 3 4 | RF Exposure Info | April 07 2018 | ||||||
1 2 3 4 | Test Report | April 07 2018 | ||||||
1 2 3 4 | Test Setup Photos | April 07 2018 | ||||||
1 2 3 4 | Cover Letter(s) | September 10 2017 | ||||||
1 2 3 4 | Cover Letter(s) | September 10 2017 | ||||||
1 2 3 4 | External Photos | September 10 2017 | ||||||
1 2 3 4 | ID Label/Location Info | September 10 2017 | ||||||
1 2 3 4 | RF Exposure Info | September 10 2017 | ||||||
1 2 3 4 | Test Setup Photos | September 10 2017 | ||||||
1 2 3 4 | Test Report | September 10 2017 | ||||||
1 2 3 4 | Test Report | September 10 2017 | ||||||
1 2 3 4 | Test Report | September 10 2017 |
1 2 3 4 | User Manual | Users Manual | 4.60 MiB | September 10 2017 |
Fingerprint Access Control Terminal User Manual V1.0 UD02842B Fingerprint Access Control Terminal User Manual This quick start guide is intended for users of the models below:
Name Fingerprint Access Control Terminal Model DS-K1T803F DS-K1T803MF DS-K1T803EF It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product. About this Manual This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision Digital Technology Co., Ltd. (Hikvision) reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision. Disclaimer REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS. Support Should you have any questions, please do not hesitate to contact your local dealer. i Regulatory Information Fingerprint Access Control Terminal FCC Information Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. FCC Conditions This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference. 2. This device must accept any interference received, including interference that may cause undesired operation EU Conformity Statement This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under the RE Directive 2014/53/EU, the EMC Directive 2014/30/EU, the RoHS Directive 2011/65/EU. 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.info. 2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see:
www.recyclethis.info. Industry Canada ICES-003 Compliance This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements. This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions:
(1) this device may not cause interference, and
(2) this device must accept any interference, including interference that may cause undesired operation of the device. ii Fingerprint Access Control Terminal Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radioexempts de licence. L'exploitation est autorise aux deux conditions suivantes :
(1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. Conformment la rglementation d'Industrie Canada, le prsent metteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou infrieur) approuv pour l'metteur par Industrie Canada. Dans le but de rduire les risques de brouillage radiolectrique l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonne quivalente (p.i.r.e.) ne dpasse pas l'intensit ncessaire l'tablissement d'une communication satisfaisante. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet quipement doit tre install et utilis une distance minimale de 20 cm entre le radiateur et votre corps. iii Fingerprint Access Control Terminal Safety Instruction These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions:
Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage. Cautions Follow these precautions to prevent potential injury or material damage. Warnings Follow these safeguards to prevent serious injury or death. Warnings All the electronic operation should be strictly compliance with the electrical safety regulations, fire prevention regulations and other related regulations in your local region. Please use the power adapter, which is provided by normal company. The power consumption cannot be less than the required value. Do not connect several devices to one power adapter as adapter overload may cause over-heat or fire hazard. Please make sure that the power has been disconnected before you wire, install or dismantle the device. When the product is installed on wall or ceiling, the device shall be firmly fixed. If smoke, odors or noise rise from the device, turn off the power at once and unplug the power cable, and then please contact the service center. If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.) Cautions Do not drop the device or subject it to physical shock, and do not expose it to high electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage). Do not place the device in extremely hot (refer to the specification of the device for the detailed operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation. The device cover for indoor use shall be kept from rain and moisture. Exposing the equipment to direct sun light, low ventilation or heat source such as heater or radiator is forbidden (ignorance can cause fire danger). Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise
(which is not a malfunction however), and affecting the endurance of sensor at the same time. Please use the provided glove when open up the device cover, avoid direct contact with the device cover, because the acidic sweat of the fingers may erode the surface coating of the device cover. Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do not use alkaline detergents. iv Fingerprint Access Control Terminal Please keep all wrappers after unpack them for future use. In case of any failure occurred, you need to return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs. Improper use or replacement of the battery may result in hazard of explosion. Replace with the same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer v Fingerprint Access Control Terminal Contents 4.4 4.1 4.2 4.3 3.1 3.2 1.1 1.2 1.3 1.4 Contents ............................................................................................................................................ 1 Chapter 1 Overview ........................................................................................................................ 3 Introduction ....................................................................................................................................... 3 Main Features .................................................................................................................................... 3 Appearance ........................................................................................................................................ 4 Keypad Description ............................................................................................................................ 5 Chapter 2 Installation ...................................................................................................................... 6 Chapter 3 Device Wiring .................................................................................................................. 7 Terminal Description .......................................................................................................................... 7 Device Wiring ..................................................................................................................................... 1 3.2.1 External Device Wiring Overview (Without Secure Door Control Unit) ...................................... 1 3.2.2 External Device Wiring Overview (With Secure Door Control Unit) ........................................... 2 Chapter 4 Basic Operation ............................................................................................................... 3 Device Activation ............................................................................................................................... 3 4.1.1 Activating via SADP Software ....................................................................................................... 3 4.1.2 Activating via Client Software ...................................................................................................... 5 Login ................................................................................................................................................... 8 Parameters Configuration .................................................................................................................. 8 4.3.1 Communication Settings .............................................................................................................. 8 4.3.2 System Settings .......................................................................................................................... 11 4.3.3 Setting Time ............................................................................................................................... 14 User Management ........................................................................................................................... 15 4.4.1 Adding User ............................................................................................................................... 15 4.4.2 Managing the User .................................................................................................................... 19 Access Control System Configuration .............................................................................................. 20 4.5.1 Configure Access Control Parameters ........................................................................................ 20 4.5.2 Configuring Holiday Group ........................................................................................................ 21 4.5.3 Configuring Week Plan ............................................................................................................... 24 4.5.4 Configuring Schedule Template ................................................................................................. 25 Attendance Configuration ................................................................................................................ 26 4.6.1 Configuring Department ............................................................................................................ 26 4.6.2 Configuring Shift ........................................................................................................................ 28 4.6.3 Configuring Holiday ................................................................................................................... 31 4.6.4 Configuring Shift Schedule ......................................................................................................... 33 4.6.5 Report Management .................................................................................................................. 37 Other Management ......................................................................................................................... 38 4.7.1 Transferring Data........................................................................................................................ 38 4.7.2 Searching Log ............................................................................................................................. 39 4.7.3 Testing ........................................................................................................................................ 40 4.7.4 System Information .................................................................................................................... 40 Chapter 5 Client Operation ............................................................................................................ 42 Overview of Access Control System ................................................................................................. 42 5.1.1 Description ................................................................................................................................. 42 5.1.2 Configuration Flow ..................................................................................................................... 42 Device Management ........................................................................................................................ 43 4.5 4.6 4.7 5.1 5.2 1 Fingerprint Access Control Terminal 5.4 5.3 5.2.1 Controller Management ............................................................................................................ 43 5.2.2 Access Control Point Management ............................................................................................ 57 Permission Management ................................................................................................................. 59 5.3.1 Person Management .................................................................................................................. 59 5.3.2 Card Management ..................................................................................................................... 61 5.3.3 Schedule Template ..................................................................................................................... 64 5.3.4 Door Status Management .......................................................................................................... 68 5.3.5 Interact Configuration ................................................................................................................ 71 5.3.6 Access Permission Configuration ............................................................................................... 74 5.3.7 Advanced Functions ................................................................................................................... 78 Attendance Management ................................................................................................................ 82 5.4.1 Shift Group Management .......................................................................................................... 82 5.4.2 Shift Management ..................................................................................................................... 84 5.4.3 Holiday Management ................................................................................................................ 86 5.4.4 Shift Schedule Management ...................................................................................................... 87 5.4.5 Attendance Check Point Management ...................................................................................... 88 5.4.6 Adjustment Management .......................................................................................................... 89 5.4.7 Card Swiping Log Query ............................................................................................................. 94 5.4.8 Statistic Analysis ......................................................................................................................... 94 5.4.9 Parameters Configuration .......................................................................................................... 96 5.4.10 Data Management .................................................................................................................. 96 Checking Status and Event ............................................................................................................... 96 5.5.1 Status Monitor ........................................................................................................................... 96 5.5.2 Access Control Event .................................................................................................................. 98 5.5.3 Event Search............................................................................................................................... 99 System Maintenance ..................................................................................................................... 100 5.6.1 Log Management ..................................................................................................................... 100 5.6.2 System Configuration ............................................................................................................... 103 Chapter 6 Appendix .................................................................................................................... 107 Tips for Scanning Fingerprint ......................................................................................................... 107 Attendance Record Delete Rule ..................................................................................................... 108 6.2.1 Enabling Record Delete ............................................................................................................ 108 6.2.2 Disabling Record Delete ........................................................................................................... 108 Device Performance ....................................................................................................................... 109 6.3.1 Access Control .......................................................................................................................... 109 6.3.2 Attendance ............................................................................................................................... 109 Attendance Report Table ............................................................................................................... 110 6.4.1 Description of Attendance Report File Name .......................................................................... 110 6.4.2 Attendance Report Table Description ...................................................................................... 111 6.1 6.2 5.5 5.6 6.3 6.4 2 Fingerprint Access Control Terminal Chapter 1 Overview 1.1 Introduction DS-K1T803 Series Fingerprint Access Control Terminal is designed with a 2.4-inch LCD display screen. Offline operation, wired network (TCP/IP) and wireless network transmission modes are supported as well. 1.2 Main Features Doorbell ringtone settings function 2.4-inch LCD display screen Transmission modes of wired network (TCP/IP) and wireless network Max. 3,000 users, 3,000 fingerprints and 100,000 access control events records storage Export the report and upgrade the device via the USB disk. Adopts the optical fingerprint module, supporting 1:N mode (fingerprint, card + fingerprint) and 1:1 mode (card + fingerprint) Terminal can be set as card reader and connect to the access controller when the Wiegand mode is selected as exporting Supports multiple authentication modes (card, fingerprint, card + fingerprint, card + password, fingerprint + password, card + fingerprint + password, terminal authentication, user authentication and so on.) Supports EM card reading (DS-K1T803EF) Supports Mifare card reading, including card No. reading (DS-K1T803MF) Support CPU card reading, including CPU card serial No. (DS-K1T803MF needs to be configured in the client software) Supports secure door control unit accessing via RS-485 connection Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm, duress card alarm, and so on 3 Fingerprint Access Control Terminal 1.3 Appearance Figure 1. 1 Table 1. 1 Appearance of DS-K1T803 Series model Description of DS-K1T803 Series Model No. 1 2 3 4 5 6 7 8 9 10 11 Description Keypad Door Bell Button Fingerprint Reading Module 2.4-inch LCD Display Screen Indicator USB Interface/Reset Button (Inside of the Cover) Tamper-proof Button Ethernet Port RS-485/Wiegand Wiring Terminal 12V Power Interface Door Lock Wiring Terminal Alarm Wiring Terminal 4 Fingerprint Access Control Terminal 1.4 Keypad Description Figure 1. 2 Table 1. 2 Keypad Appearance Keypad Description Description Exiting Key: Press the button to exit the menu. Direction Keys: Use to move the cursor in the menu. Numeric Keys/Letter Keys: Press to input numbers or letters. Confirming Key: Press to confirm operations. Press and hold the key for 3s to login the main interface. Deleting Key: Delete the contents in the textbox. Editing Key: Press to enter the editing status. Press to shift among Chinese, numbers/lowercases, numbers/uppercases and symbols. No. 1 2 3 4 5 6 5 Fingerprint Access Control Terminal Chapter 2 Installation Before You Start:
Make sure that the device in the package is in good condition and all the assembly parts are included. Make sure that the wall is strong enough to withstand three times the weight of the device. Steps:
1. Install 120 gang box into the wall. 2. Secure the device mounting plate on the gang box with two screws (supplied). Figure 2. 1 Install the 120 gang box Figure 2. 2 Secure the mounting plate 3. Align the terminal with mounting plate. Push the terminal in the mounting plate from bottom up. Fasten the terminal with the buckles on the plate. 4. Tighten the screws to fix the terminal on the mounting plate and complete the installation. Figure 2. 3 Install the Terminal Figure 2. 4 Secure the mounting Screw 6 Fingerprint Access Control Terminal Chapter 3 Device Wiring 3.1 Terminal Description Figure 3. 1 Terminal Diagram of Access Control Terminal 7 Fingerprint Access Control Terminal Table 3. 1 Terminal Description No. Function Color Power Input Red Terminal Name
+12V Description 12V DC Power Supply Alarm Input Alarm Output RS-485 Communication Port Wiegand Black Yellow/Blue Yellow/Black GND IN1 GND Yellow/Purple NC Yellow/Brown Yellow/Red Yellow Blue COM NO 485 +
485 -
GND Alarm Input 1 GND Alarm Output Wiring RS-485 Wiring Green White W0 W1 Wiegand Wiring 0 Wiegand Wiring 1 Orange WG_OK Wiegand Authenticated Purple WG_ERR Wiegand Brown Grey Black WG_ BEEP Tampering Authentication Failed Alarm WG_TAMP ER GND Wiring Buzzer Wiring GND Lock White/Purple NC Lock Wiring White/Yellow COM White/Red Yellow/Green NO SENSOR White/Black GND Door Contact Signal Input GND Yellow/Grey BUTTON Exit Door Wiring Door Bell White/Brown BELL+
Door Bell Wiring White/Blue BELL-
8 A1 A2 B1 B2 B3 B4 B5 C1 C2 C3 C4 C5 C6 C7 C8 C9 D1 D2 D3 D4 D5 D6 E1 E2 Line Group Line Group A Line Group B Line Group C Line Group D Line Group E Fingerprint Access Control Terminal 3.2 Device Wiring 3.2.1 External Device Wiring Overview (Without Secure Door Control Unit) Note: The external power supply and the access control terminal should use the same GND cable. 1 Fingerprint Access Control Terminal 3.2.2 External Device Wiring Overview (With Secure Door Control Unit) Note: The external power supply and the secure door control unit should use the same GND cable. 2 Fingerprint Access Control Terminal Chapter 4 Basic Operation Suggested working flow:
Figure 4. 1 Working Flow Device Activation: Activate the device before first using. Login: Hold the OK button for 3s to login the device main interface. Parameters Configuration: Configure the communication, the system, and the time. User Management: Add, edit and delete the users in the fingerprint access control terminal. You are able to set the user ID No. name, card number fingerprint, password, department, etc. Access Control Configuration: Configure the access control parameters and control the door status. Attendance Configuration: Configure the attendance parameters and control the users attendance. Note: The device has configured the default department, the default shift, the default shift schedule and the default system information. You are able to use the device directly after adding the user. 4.1 Purpose:
You should activate the device before the first login. After powering on, the system will switch to activate notifying interface. Device Activation Figure 4. 2 Activation Notifying Interface Activation via SADP and activation via the iVMS-4200 Client Software are supported. The default values of the terminal are as follows:
The default IP address: 192.0.0.64 The default port No.: 8000 The default user name: admin 4.1.1 Activating via SADP Software Purpose:
SADP software is used for detecting the online device, activating the device, and resetting the device password. 3 Fingerprint Access Control Terminal Steps:
1. Get the SADP software from the supplied disk or the official website. Install and run the software. Note: Go to http://www.hikvision.com/en/tools_82.html to download the SADP software. 2. Check the inactive device from the device list. 3. Create a password in the right side of the interface and confirm the password. Figure 4. 3 SADP Software Interface STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4 Fingerprint Access Control Terminal 4. Click Activate. The device will be active. Or click Fresh to fresh the device status. Figure 4. 4 Activate the Device 5. Check the device and manually edit the device IP address, Port No., Subnet Mask, Gateway, etc. Or check DHCP to enable DHCP. 6. Input the password and click Modify to apply the settings. Note: The device IP address should be the same with the PCs. Figure 4. 5 Edit Device Parameters 4.1.2 Activating via Client Software Purpose:
The client software is versatile video management software for multiple kinds of devices. Steps:
5 Fingerprint Access Control Terminal 1. Get the client software from the supplied disk or the official website. Install and run the client software. Note: Go to http://www.hikvision.com/en/Tools_84.html to download the client software. 2. Click Switch System -> Access Control System at the upper left corner of the interface to enter the Access Control System interface. 3. Click Controller Management to enter the Controller Management interface. You can check the online device, as shown in Figure 4. 7 Figure 4. 6 Control Panel Interface 4. Select an inactive device from the device list. Figure 4. 7 Device List 6 5. Click Activate to pop up the Activation interface. Fingerprint Access Control Terminal 6. Create a password and confirm the new password. Figure 4. 8 Select Inactive Device STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. Figure 4. 9 Activate the Device 7. Click OK to start activate. 8. Click 9. Input the password and click OK to apply. to configure the device IP address, mask address, gateway address, port No. Note: The device IP address should be the same with the PC. The device will switch to the initial interface:
Figure 4. 10 Initial Interface 7 Fingerprint Access Control Terminal Login 4.2 Steps:
1. For the first time login, hold the OK key for 3s to enter the main interface. You can manage the user, the access control, the attendance, the communication, the system, etc. Main Interface If you have configured the admin in the User interface:
1) Long-press the OK key to enter the Admin Login interface. 2) Enter the admin ID No. and password, scan the fingerprint or swipe the card to enter the Figure 4. 11 main interface. Figure 4. 12 Admin Login Interface Parameters Configuration 4.3 4.3.1 Communication Settings Purpose:
You can set the network parameters, the Wiegand parameters and the Wi-Fi. 8 Fingerprint Access Control Terminal Figure 4. 13 Communication Settings Interface 4.3.1.1 Setting Network You can set the device network parameters, including the IP address, the subnet mask and the gateway address. Steps:
1. Move the cursor to the Network and press the OK key to enter the Network interface. 2. Edit the IP address, the subnet mask and the gateway. Note: The IP address should be the same with the PCs. Network Interface 3. Press the ESC key and select Yes to save the parameters. Figure 4. 14 4.3.1.2 Setting Wiegand Parameters Purpose:
Figure 4. 15 Prompt Interface 9 Fingerprint Access Control Terminal You are able to set the Wiegand Direction (Send/Receive) and the Wiegand mode (Wiegand 26/Wiegand 34). Steps:
1. Move the cursor to Wiegand, and press the OK key to enter the Wieagand interface. Figure 4. 16 Wiegand Setting Interface 2. Edit the Wiegand parameters, including the Wiegand direction and the Wiegand mode. Wiegand Direction:
If select Send, the terminal can connect to the access controller to upload the card No. bia the Wiegand 26 or the Wiegand 34 mode. If select Receive, the terminal can connect to the Wiegand card readers. No need to configure the Wiegand mode. The default mode contains Wiegand 26/34 and the Hikvision private Wiegand protocol. Wiegand Mode:
Wiegand 26 and Wiegand 34 can be selected. The default Wiegand mode is Wiegand 34. 4.3.1.3 Setting Wi-Fi Purpose:
You can enable the Wi-Fi and configure the Wi-Fi parameter. Steps:
1. Move the cursor to Wi-Fi, and press the OK key to enter the Wi-Fi interface. 2. Move the cursor to the icon and press the OK key to enable the WLAN. Figure 4. 17 Wi-Fi Enabling 10 Fingerprint Access Control Terminal Figure 4. 18 Wi-Fi Selection 3. Select a network and press the OK key to enter the Wi-Fi Setting interface. 4. Input the Wi-Fi password, and configure the IP mode the IP address, the subnet mask and the gateway. Note: The password supports numbers, uppercase letters, lowercase letters and symbols. Figure 4. 19 Wi-Fi Setting Interface 5. Press the ESC key and select Yes to save the parameters and exit the interface. 4.3.2 System Settings Purpose:
You are able to set the system parameters, manage the data, restore default parameters and upgrade the device. 4.3.2.1 Setting System Parameters Purpose:
Set the system parameters, including the device time format, the keypad audio, the voice prompt, the voice volume, the sleeping, the attendance repeating time interval, the attendance record over threshold prompt, the secure door control panel and the record delete. 11 Fingerprint Access Control Terminal Time Format:
Figure 4. 20 System Configuration Interface MM/DD/YYYYMM.DD.YYYYDD-MM-YYYYDD/MM/YYYY DD.MM.YYYYYYYYMMDDYYYY-MM-DDYYYY/MM/DD YYYY.MM.DD and MM-DD-YYYY are available. Keypad Sound: Move the cursor to disable the keypad sound. or and press the OK key to enable or Move the cursor to disable the prompt audio. or and press the OK key to enable or Note: The icon represents the keypad sound is enabled. The represents the keypad sound is disabled. icon High, Medium and low can be selected. Set the device sleeping waiting time (Minute). If you set the sleeping time to 30min, the device will sleep after 30 min without any operation. Note: If you set the sleeping time to 0, the function is disabled. Set the attendance repeating time interval (Second) of a person. The attendance will be invalid, the authentication will be failed, and the door will not be open if the user swipe the card repeatedly within the time interval. (Set the authentication mode to Card). Note: The time interval should be between 0 and 255s. If the attendance record memory reaches the configured value, the system will pop up a prompt to remind you. Enable/disable the secure door control panel. The terminal connects to the secure door control panel via the RS-485. And the terminal will receive the magnetic signals, the door opening button signal and 12 Voice Prompt:
Voice Volume:
Sleeping:
Time Interval:
Attendance Record Prompt:
Secure Door Control Panel:
Fingerprint Access Control Terminal the input/output alarm signals via the secure door control panel. When disabling the function, the terminal can control these signals directly. When enabling the function, the terminal will delete the first 3000 attendance records, if the memory is full, to save the new attendance records. By default, the function is enabled. For detailed information, see Section 6.2 Attendance Record Delete Rule. Record Delete:
4.3.2.2 Managing Data Purpose:
You are able to delete the storage data of the device, including the event, the attendance data, the user, and the permission. Steps:
1. Move the cursor to Data and press the OK key to enter the Data interface. 2. Select a data type and press the OK key to delete. Figure 4. 21 Data Management Interface Delete Event Only: Delete all recorded events in the device. Delete Attendance Data Only:
Delete all attendance data in the device or delete attendance data by time. Figure 4. 22 Delete Attendance Data Interface Delete User Only: Delete all user data in the device, including the attendance Clear Permission:
records. Clear the admin management permission. The admin will turn to the normal user. The user will not be deleted. 4.3.2.3 Restoring Settings Purpose:
You can restore Factory Defaults or Default Settings. 13 Fingerprint Access Control Terminal Steps:
1. Move the cursor to Reset and press the OK key to enter the Reset interface. Figure 4. 23 Reset Interface 2. Select Factory Defaults or Default Settings. Factory Defaults: All parameters of the device will restore to the factory condition. Default Settings: All parameters, excluding the communication parameters and the remote user management, will restore to the factory condition. 4.3.2.4 Upgrading Device The system can automatically read the upgrading file from the plugged USB disk to upgrade the device. Notes:
The upgrading file should be put in the root directory. The upgrading file name should be digicap.dav. 4.3.3 Setting Time Purpose:
You are able to set the device time and the DST. Steps:
1. Move the cursor to Time in the main interface and press the OK key to enter the Time interface. 2. Edit the parameters. Date: The displayed date on the device. Time: The displayed time on the device. DST:
Select to enable or disable the DST. When the DST is enabled, you can set the DST bias time, the start time and the end time. DST Bias: you can select 30min, 60min, 90min and 120min. Start: Set the start time of the DST. End: Set the end time of the DST. 14 Fingerprint Access Control Terminal Figure 4. 24 Time Settings Interface 3. Press the ESC key and select Yes to save the settings and exit the interface. User Management 4.4 Purpose:
You are able to add, edit, delete and search the user. Move the cursor to User in the main interface and press the OK key to enter the User List interface. Figure 4. 25 User List Interface 4.4.1 Adding User You can add users by editing the ID No., the user name, the card No. You can also scan the user fingerprint, set the password, the department, the role, the schedule template, the authentication mode and the duress card. Steps:
1. Press the key to enter the New (new user) interface and input the ID No. Notes:
The ID No. refers to the user attendance serial No. The ID No. should be between 1 and 99999999 and should not start with 0. The ID No. can be used for once. By default, the ID No. will be increased in sequence. 15 Fingerprint Access Control Terminal 2. Enter the new user name. Figure 4. 26 Adding User Interface 1) Press key to enter the editing interface. Press key to shift input mode. Chinese, Number/Lowercase Letters, Number/Uppercase Letters and symbols are supported. 2) Enter the use name and press the OK key to confirm and exit the interface. Figure 4. 27 Editing Interface Notes:
Numbers, uppercase letters, lowercase letters, Chinese characters and symbols are supported. The user name supports up to 32 characters. Each user name can be used for once. 3. Enter the card No. Notes:
The card No. is required. The card No. can start with 0 when it contains more than one numbers. E.g. 012345. 16 Fingerprint Access Control Terminal The card No. can be used for once. The device of DS-K1A801F model supports manually entering the card No. The device of DS-K1A801MF and DS-K1A801EF model supports manually entering card No. and swiping card to get the card No. 4. Move the cursor to Register and press the OK key scan the fingerprint. Place the finger on the scanner, rise and confirm your fingerprint by following the voice prompt. Notes:
The same fingerprint cannot be repeatedly registered. The same ID No. supports adding up to 10 fingerprints. The device supports the optical fingerprint recording. You can also scan the fingerprint via the external device and apply the fingerprint to the device by the client software. For detailed information about scanning the fingerprint, see Section 6.1 Tips for Scanning Fingerprint. Figure 4. 28 Fingerprint Registration Interface 5. Move the cursor to Set and press the OK key to edit the user password. 1) Enter the password and confirm the password in the Set Password interface. Set Password Interface 2) Press the ESC key and select Yes to save the password. Figure 4. 29 Note: Up to 8 numbers can be entered. 6. Move the cursor to Select and press the OK key to select a department. 17 Fingerprint Access Control Terminal Figure 4. 30 Select Department Interface Note: For detailed information about editing the department, see Section 4.6.1 Configuring Department. 7. Move the cursor and press the OK key to select the user role. Admin: The admin has all permissions to operate the device. User: The user can check attendance in the initial interface. Notes:
All people can enter the main interface to operate if there is no Admin configured. After configuring the admin, you have to authorize the admin ID to enter the main interface. You can user the USB interface to import the user information. For details, see Section 4.7.1.2 Importing Data. 8. Move the cursor to Select Template and press the OK key to enter the Select Template interface. Select a template. Figure 4. 31 Select Template Interface Notes:
For details about configuring Schedule Template, see Section 4.5.4 Configuring Schedule Template. By default, the terminal selects Template 1. 9. Move the cursor to select an authorize mode. You can select Card/Fingerprint, Card, Fingerprint, Card &Password, Card and Fingerprint, Fingerprint &Password, Card & Fingerprint & Password, Card/Password (The password here refers to the card ID No. and the user password.), and Controller. 18 Fingerprint Access Control Terminal Note: By default, the terminal selects Controller. Configure the Terminal Authentication in the Access Control System module. For details, see Section 4.5.1 Configure Access Control Parameters. 10. Select to enable/disable Duress Card function. When the function is enabled, the user linked card will be a duress card. You are able to use the duress card to open the door and report a duress event. 11. Press the ESC key and select Yes to save the settings and exit the interface. 4.4.2 Managing the User 4.4.2.1 Searching the User Purpose:
Enter the user ID No. or the user name to search the target user. Steps:
1. Enter the user ID or the user name in the searching bar of the user list interface, 2. Press the OK key to search. Figure 4. 32 User List Interface 4.4.2.2 Editing the User Steps:
1. Select a target user in the user list and press the OK key. 2. Select Edit User in the User Configuration interface. User Configuration interface 3. Follow Section 4.4.1 Adding User to edit the user information. 4. Press the ESC key and select Yes to save the settings and exit the interface. Figure 4. 33 Note: The user ID No. cannot be edited. 19 Fingerprint Access Control Terminal 4.4.2.3 Deleting the User Select Delete User and press the OK key to delete the target user and its information. Or press Delete Password and press the OK key to delete the target user password. Or press Clear FP (Fingerprint) and press the OK key to clear the target user fingerprint. Or press Clear Card and press the OK key to delete the user card No. 4.5 Purpose:
Configure the access control permission, including the access control parameters, the holiday group, the week plan and the schedule template. Access Control System Configuration The suggested configuration flow is as follows:
Figure 4. 34 Access Control System Interface Access Control Parameters:
Holiday Group:
Week Plan:
Schedule Template:
Figure 4. 35 Access Control Configuration Flow Configure the terminal access control parameters, including the terminal authentication, the sub reader authentication, the door magnetic status, the lock action time duration, the door-open timeout alarm, the authentication times exceeded alarm and the anti-passback. Configure the holiday group for the access control function. In the setting duration, the door cannot be controlled. Configure the week plan for the access control function. The door can be controlled during the configured time. Set the configured week plan and the holiday group. The door can be controlled in the configured time duration. 4.5.1 Configure Access Control Parameters Steps:
1. Select ACS (Access Control System) in the access control system interface to enter the parameters setting interface. 20 Fingerprint Access Control Terminal 2. Edit the parameters. Figure 4. 36 Access Control System Parameters Interface Terminal Authentication:
Sub Reader Authentication:
the
(Password), Card and FP terminal authentication mode, Configure including Card/FP (Fingerprint), Card, Fingerprint, Card and PW
(Password), Card and FP (Fingerprint), FP (Fingerprint) and PW
(Fingerprint) and PW
(Password), and Card/PW (Password) (The password here refers to the card ID No. and the user password). Configure the sub reader authentication mode, including Card/FP (Fingerprint), Card, Fingerprint, Card and PW
(Password), Card and FP (Fingerprint), FP (Fingerprint) and PW
(Fingerprint) and PW
(Password), and Card/PW (Password) (The password here refers to the card ID No. and the user password).
(Password), Card and FP Door Magnetic: Configure the door magnetic status, including Remain Closed Lock Action Time:
Door-Open Timeout Alarm:
Auth Times Exceeded Alarm Anti-passback:
and Remain Open. Note: By default, the magnetic status is Remain Closed. Configure the action time after the door opening. After the action time, the door will be locked. Note: Available lock action time duration is from 1 to 255s. Configure the maximum time duration for door opening. If the door-open time has exceeded the configured value, it will trigger an alarm. Configure the maximum times for authentication. Enable the Anti-passback function and configure the anti-
passing back path via the client software. Follow the configured path to open/close the door. Note: The Wiegand direction should be Receive. 3. Press the ESC key and select Yes to save the settings and exit the interface. 4.5.2 Configuring Holiday Group Purpose:
Configure the access control system holiday schedule. The door can be open during the holiday. 4.5.2.1 Adding Holiday Group Steps:
21 1. Select Holiday and press the OK key to enter the Holiday Group list interface. Fingerprint Access Control Terminal Figure 4. 37 Holiday Group List Interface 2. Press the key to enter the Holiday Group interface. 3. Edit the holiday group name. 4. Select New ACS Holiday to enter the New (New Holiday) interface. Figure 4. 38 Holiday Group Interface Figure 4. 39 Add New Holiday Interface 5. Configure the holiday parameters, including the holiday No. the holiday name, the holiday start time and the end time and the holiday period for the access control devices. Notes:
Up to 8 periods can be configured. Press the ESC key and select Yes to save the parameters and exit the interface. 22 6. Press the ESC key and select Yes to save the parameters and exit the interface. The configured Fingerprint Access Control Terminal holiday group will be displayed in the holiday group list. 4.5.2.2 Searching Holiday Group Purpose:
Search the target holiday group by entering the holiday group name. Steps:
1. Enter the target holiday group name in the searching bar. 2. Press the OK key to search. 4.5.2.3 Editing and Deleting Holiday Group Steps:
1. Select a holiday group and select Edit in the Holiday Group Manage configuration interface. Or select a holiday group and select Delete in the Holiday Group Manage configuration interface. Figure 4. 40 Holiday Group Manage Interface 2. Edit the holiday group name. Or select New ACS Holiday to add new holiday schedules. Figure 4. 41 Holiday Group Interface 3. Press the ESC key and select Yes to save the settings and exit the interface. Or 1) Select a holiday in the holiday list and select Edit in the Holiday Settings interface. Or select Delete to delete the select holiday. 2) Edit the select holiday according to Section 4.5.2.1 Adding Holiday Group. 3) Press the ESC key and select Yes to save the settings and exit the interface. 23 Fingerprint Access Control Terminal 4.5.3 Configuring Week Plan 4.5.3.1 Adding Week Plan Steps:
1. Select Week Plan and press the OK key to enter the Week Plan list interface. Note: By default, the system contains one week plan, named Week Plan 1. Figure 4. 42 Week Plan List Interface 2. Press the key to enter the New (New Week Plan) interface. Figure 4. 43 Week Plan Configuration Interface 3. Configure the week plan parameters, including the week plan No., the week plan name, the week plan time and its corresponding periods. Note: Up to 8 periods can be configured each day. 4. Press the ESC key and select Yes to save the settings and exit the interface. 4.5.3.2 Searching Week Plan Purpose:
Search the target week plan by entering the week plan name. Steps:
1. Enter the week plan name in the WK. Plan (Week Plan) list interface. 2. Press the OK key to search. 4.5.3.3 Editing and Deleting Week Plan Steps:
1. Select a week plan and select Edit in the WK. Plan configuration interface. Or select a week plan and select Delete in the WK. Plan configuration interface. 24 Fingerprint Access Control Terminal Figure 4. 44 WK. Plan Configuration Interface 2. Edit the select week plan according to Section 4.5.3.1 Adding Week Plan. 3. Press the ESC key and select Yes to save the settings and exit the interface. 4.5.4 Configuring Schedule Template 4.5.4.1 Adding Schedule Template Steps:
1. Select Template (Schedule Template) and press the OK key to enter the Template (Schedule Template) list interface. Note: By default, the system contains one template, named Template 1. Figure 4. 45 Template List Interface 2. Press the key to enter the New (New Schedule Template) interface. Figure 4. 46 New Schedule Template Interface 25 Fingerprint Access Control Terminal 3. Configure the schedule template parameters, including the template No., the template name, the week plan and the holiday group. For details about configuring the week plan and the holiday, see Section 4.5.2 Configuring Holiday Group and Section 4.5.3 Configuring Week Plan. 4. Press the ESC key and select Yes to save the settings and exit the interface. The configured schedule template will be displayed in the template list interface. 4.5.4.2 Searching Schedule Template Purpose:
Search the target schedule template by entering the schedule template name. Steps:
1. Enter the schedule template name in the Template (Schedule Template) list interface. 2. Press the OK key to search. 4.5.4.3 Editing and Deleting Schedule Template Steps:
1. Select a schedule template and select Edit in the Template configuration interface. Or select a schedule template and select Delete in the Template configuration interface. Figure 4. 47 Template Configuration Interface 2. Edit the select week plan according to Section 4.5.4 Configuring Schedule Template. 3. Press the ESC key and select Yes to save the settings and exit the interface. Attendance Configuration 4.6 The suggested configuration flow is as follows:
Figure 4. 48 Attendance Configuration Flow 4.6.1 Configuring Department Purpose:
Editing, searching and resetting the department are available. 26 Fingerprint Access Control Terminal Figure 4. 49 Attendance Menu 4.6.1.1 Editing and Resetting Department Steps:
1. Select a target department to edit. 2. Press the OK key to enter the configuration interface. Figure 4. 50 Department List Interface Figure 4. 51 Configuration Interface 3. Select Edit and press the OK key. 4. Edit the department name, the shift type and the shift name. 5. Press the ESC key and select Yes to save the settings and exit the interface. Notes:
The department name supports numbers, uppercase letters, lowercase letters, Chinese characters and symbols. 27 Fingerprint Access Control Terminal The department name supports up to 32 characters. You can configure the shift in the Configuring Shift. For detailed information, see Section 4.6.1 Configuring Department. By default, the system contains 32 departments. You can also select Reset to reset the settings. 4.6.1.2 Searching Department Purpose:
Search the target department by entering the department name. Steps:
1. Enter the target department name in the searching bar of the department list interface. 2. Press the OK key to search. Figure 4. 52 Department List Interface 4.6.2 Configuring Shift Purpose:
The normal shift and the man-hour shift are available to be configured. You can set the attendance rule and the attendance checking times in the normal shift. You can also set the working hours per day in the man-
hour shift. The normal shift can be applied to the normal attendance situation, while the man-hour shift can be applied to the situation with flexible working hours. Note: Support up to 32 normal shifts and 32 man-hour shifts. 4.6.2.1 Normal Shift Setting the Attendance Rule Steps:
1. In the Normal (Normal Shift) interface, select Rule. 28 Fingerprint Access Control Terminal Figure 4. 53 Normal Shift List 2. Configure the attendance rule. On-work Advanced Time: The allowable early duration to go to work. Latest On-Work Check Time: The allowable late duration to go to work. Absence Time (Late): The late arrival threshold duration. Off-Work Early Time: The allowable early duration to get off work. Latest Off-Work Check Time: The allowable late duration to get off work. Absence Time (Early Leave): The early leave threshold duration. Figure 4. 54 Attendance Rule Interface 3. Press the ESC key and select Yes to save the settings and exit the interface. Notes:
The unit is minute. The available time range is from 0 to 1440 minutes. Setting Normal Shift Attendance Steps:
1. Select an attendance type in the Normal (Normal Shift) interface. Notes:
By default, the normal shift type includes 2/Day (2 times per day), 4/Day (4 times per day), and 30 custom types. The following steps will take Custom 1 as an example. 2. Select Edit and press the OK key to enter the Edit Shift interface. 29 Fingerprint Access Control Terminal Figure 4. 55 Normal Shift Configuration Interface 3. Edit the shift name, and the period in order. Notes:
The shift No. cannot be edited. The shift name supports numbers, uppercase letters, lowercase letters, Chinese characters and symbols. The shift name supports up to 32 characters. Up to 4 time periods can be edited. You can also select Reset to reset the settings. 4. Press the ESC key and select Yes to save the settings and exit the interface. 4.6.2.2 Man-hour Shift Steps:
1. Press the key to enter the Man-Hour interface. Figure 4. 56 Man-hour Shift List Interface 2. Select a man-hour shift type in the list. Notes:
By default, the man-hour shift type includes 6H/Day (6 hours per day), 4H/Day (4 hours per day), and 30 custom types. The following steps will take Custom 1 as an example. 3. Press the OK key to enter the Man-Hour Shift configuration interface. 30 Fingerprint Access Control Terminal Figure 4. 57 Man-hour Shift Configuration Interface 4. Select Edit to enter the Edit Shift interface. You can edit the shift name, the shift duration, the latest time on-work and the break time. Figure 4. 58 Edit Shift Interface Notes:
The shift No. cannot be edited. The break time will not be counted into the working hour. If set the Latest Time (On-Work) to 0, the function is disabled by default. You can also select Reset and press the OK key to reset the settings. 5. Press the ESC key and select Yes to save the settings and exit the interface. 4.6.3 Configuring Holiday Purpose:
Configure the attendance holiday. The device will not take attendance during the holiday. 4.6.3.1 Adding Holiday Steps:
1. In the Holiday interface, press the key to enter the New (New Holiday) interface. 31 Fingerprint Access Control Terminal Figure 4. 59 New Holiday Interface 2. Enter the holiday No., the holiday name, the holiday start time and the end time. 3. Press the ESC key and select Yes to save the settings and exit the interface. The added holiday will be displayed in the Holiday list. Figure 4. 60 Holiday List 4.6.3.2 Searching Holiday Steps:
1. In the Holiday List interface, enter the target holiday name. 2. Press the OK key to search. 4.6.3.3 Editing and Deleting Holiday Steps:
1. Select a target holiday in the Holiday List interface to enter the Holiday Settings interface. Figure 4. 61 Holiday Settings Interface 32 Fingerprint Access Control Terminal 2. Select Edit and follow the steps in Section 4.6.3.1 Adding Holiday to edit the holiday information. Or select Delete and press the OK key to delete the holiday. 3. Press the ESC key and select Yes to save the settings and exit the interface. 4.6.4 Configuring Shift Schedule Purpose:
Configure the shift schedule by department or by individual. 4.6.4.1 Scheduling Shift by Department Before you start:
1. Edit the department. For detailed information, see Section 4.6.1 Configuring Department. 2. Configure the normal shift or the man-hour shift. For detailed information, see Section 4.6.2 Configuring Shift. Steps:
1. Select a target department in the By Dept. (Schedule by Department) interface. 2. Press the OK key to enter the Schedule Shift by Dept. interface. Figure 4. 62 Schedule Shift by Department Figure 4. 63 Schedule Shift by Dept. Interface 3. Move the cursor to Set Shift and press the OK key to enter the Set Shift interface. 1) Select the shift type and the shift times. 33 Fingerprint Access Control Terminal Figure 4. 64 Set Shift Interface Notes:
You can set the shift from Monday to Sunday. The shift types include None, Normal, and Man-Hour. 2) Press the ESC key and select Yes to save the settings and exit the interface. 4. Set the schedule start time and the end time. 5. Move the cursor to Select Holiday and press the OK key. Figure 4. 65 Select Holiday Interface 1) Select a target holiday. 2) Press the ESC key and select Yes to save the settings and exit the interface. Notes: The attendance will not be recorded during the holiday. 6. Press the ESC key and select Yes to save the settings and exit the interface. Note: The department name cannot be edited. 4.6.4.2 Scheduling Shift by Individual Adding New Individual Shift Before you start:
1. Add the user. For detailed information, see Section 4.4 User Management. 2. Configure the normal shift or the man-hour shift. For detailed information, see Section 4.6.2 Configuring Shift. Steps:
1. Press the key to enter the By Individual (Schedule by Individual) interface. 34 Fingerprint Access Control Terminal 2. Select New Individual Shift and press the OK key to enter New Individual Shift interface. Figure 4. 66 Schedule Shift by Individual 3. Select an individual in the list and press the OK key to enter the Individual Shift Settings interface. Figure 4. 67 New Individual Shift Interface Figure 4. 68 Individual Shift Settings Interface 4. Move the cursor to Set Shift and press the OK key to enter the Set Shift interface. 1) Select the shift types and the shift times. 35 Fingerprint Access Control Terminal Figure 4. 69 Set Shift Interface Notes:
You can set the shift from Monday to Sunday. The shift types include None, Normal, and Man-Hour. 2) Press the ESC key and select Yes to save the settings and exit the interface. 5. Set the start time and the end time in the Individual Shift Settings interface. 6. Select Select Holiday and press the OK key to enter the Select Holiday interface. Figure 4. 70 Select Holiday Interface 1) Select a target holiday. 2) Press the ESC key and select Yes to save the settings and exit the interface. Note: The attendance will not be recorded during the holiday. 7. Press the ESC key and press the OK key to save the settings and exit the interface. Editing and Deleting Individual Schedule Steps:
1. Select an individual shift in the By Individual (Schedule by Individual) interface. 2. Select Edit and press the OK key to enter the Individual Shift Settings interface. Follow Section 4.6.4.2 Scheduling Shift by Individual to edit the shift. Or select Delete to delete the selected individual shift. 36 Fingerprint Access Control Terminal Figure 4. 71 Schedule Shift by Individual Configuration Interface 4.6.5 Report Management Purpose:
You are able to export the attendance report, the attendance report, the abnormal attendance record and the attendance management schedule. Steps:
1. Insert a USB disk to the USB interface. Note: The device will detect the USB disk memory before exporting the report. If the memory is not enough, the device will pop up a prompt to remind you. 2. Select Attendance Record/Attendance Report/Abnormal Attendance Record in the Report interface. Figure 4. 72 Report Management Interface 3. Edit the device No., the start time and the end time in the Export Report interface. Note: You should customize the device No. The device No. is for differentiating the reports of different devices. 37 Fingerprint Access Control Terminal Figure 4. 73 Export Report Interface Or select Attendance Management Schedule in the Report Management interface to export the Shift Settings Table, the Normal Shift Schedule table and the Man-Hour Shift Schedule table directly. 4. Press the OK key to export. The exported file will be saved in the USB disk in Excel format. Notes:
Support the USB disk of FAT32 format. The USB disk memory should be from 1G to 32G. Make sure the USB disk free space is up to 512M. For details about the exported tables descriptions, see Section 6.4 Attendance Report Table. Other Management 4.7 4.7.1 Transferring Data Purpose:
You can export the ACS parameters and the attendance data. You can also import the ACS parameters from the USB disk. 4.7.1.1 Exporting Data Steps:
1. Insert the USB disk to the USB interface. Note: The device will detect the USB disk memory before exporting the report. If the memory is not enough, the device will pop up a prompt to remind you. 2. In the Export interface, select Export ACS Para (Export Access Control System Parameters)or Export Attendance Data. 3. Press the OK key, the ACS parameters or the attendance data will be saved in the USB disk. Figure 4. 74 Export Interface Notes:
38 Fingerprint Access Control Terminal Support the USB disk of FAT32 format. The USB disk memory should be from 1G to 32G. Make sure the USB disk free space is up to 512M. 4.7.1.2 Importing Data Steps:
1. Insert the USB disk to the USB interface. 2. Press the key to enter the Import interface and select Import ACS Para (Import Access Control System Parameters). Figure 4. 75 Import Interface 3. Press the OK key to import. Notes:
Support the USB disk of FAT32 format. The file for importing should be in the root directory. 4.7.2 Searching Log Purpose:
You are able to search the event log in the target time duration of the target ID No. Steps:
1. Enter the ID No. in the Log (Log Search) interface. 2. Move the cursor the Name, the corresponding name will be displayed automatically. Or enter the name and move the cursor to the ID No., the corresponding ID No. will be displayed automatically. Figure 4. 76 Log Search Interface 3. Enter the target log start time and the end time. 4. Press the OK key to search. The interface will display the log search result. 39 Note: A user authentication will create an event record. Fingerprint Access Control Terminal Figure 4. 77 Search Result 4.7.3 Testing You are able to perform the voice test, the keypad test and the RTC test. Select Test to enter the Test interface. Figure 4. 78 Test Interface Voice Test:
Keypad Test:
If the device voice is working properly, you are able to hear Voice Test Success. If the keypad test succeeds, the screen will display the corresponding numbers or functions of the pressed key. If the test succeeds,, the screen will display the synchronization time. RTC Test:
4.7.4 System Information Purpose:
You are able to check the device capacity and the device information. 4.7.4.1 Checking Capacity Check the user capacity and the fingerprint capacity in the device. 40 Fingerprint Access Control Terminal Figure 4. 79 Capacity Interface User Capacity: The maximum user amount that can be configured. Note: The default maximum user amount is 3,000. Fingerprint Capacity: The maximum fingerprint amount. Note: The default maximum fingerprint amount is 3,000. 4.7.4.2 Checking Device Information In the Device interface, you are able to check the device name, the device serial No., the MAC address, the firmware, the hardware and the production data. Figure 4. 80 Device Information Interface 41 Fingerprint Access Control Terminal Chapter 5 Client Operation Overview of Access Control System 5.1 Click Switch System-> Access Control System on the menu bar to enter the Access Control System. 5.1.1 Description The Access Control System is a client of configuring permission of door access. It provides multiple functionalities, including access controller management, person/card management, permission configuration, door status management, attendance management, event search, etc. This user manual describes the function, configuration and operation steps of Access Control Client. To ensure the properness of usage and stability of the client, please refer to the contents below and read the manual carefully before installation and operation. 5.1.2 Configuration Flow Refer to the following flow chart for the configuration order. 42 Fingerprint Access Control Terminal 5.2 Device Management 5.2.1 Controller Management Click the icon to enter the controller management interface. The interface is divided into 2 parts: device management and online device detection. Device Management:
43 Fingerprint Access Control Terminal Manage the access control devices, including adding, editing, deleting, and batch time synchronizing functions. Online Device Detection:
Automatically detect online devices in the same subnet with the access control server, and the detected devices can be added to the server in an easy way. Note: The control client can manage 16 access controllers at most. Device Management Adding Controller Steps:
1. Click the button to enter the add access controller interface. 2. Input the device name. 3. Select the access controller type in the dropdown list. 4. Select the connection mode in the dropdown list: TCP/IP, or COM port. TCP/IP: Connect the device via the network. 5. Set the parameters of connecting the device. If you choose to connect the device via network, you should input the IP address and port No. of the device, and set the Dial-up value to 1. button to finish adding. 6. Click the You can click Status to check the detailed status of the controller, and click Remote Configuration to configure the settings of the controller. Editing Device (Basic Information) Purpose:
After adding the device, some advanced parameters can be configured in the editing device interface, e.g. downloading hardware parameters, reading hardware parameters, time synchronizing, configuring access point, etc. Steps:
1. In the device list, click Edit button to edit the information of the selected added device. 44 Fingerprint Access Control Terminal 2. Edit the basic parameters of the device on your demand, which are the same as the ones when adding the device. 3. (Optional) Check the checkbox of Enable Holiday to enable the holiday parameters when downloading permissions. 4. Click the Edit button to finish editing. 5. Click the Hardware Parameters Downloading button to download the updated parameters to the local memory of the device. Note: Capture function is not supported. Editing Device (Door Information) 45 Fingerprint Access Control Terminal Steps:
1. In the editing interface, click the Door_1 button to edit the information of the selected door. 1) Door Magnetic: The Door Magnetic is in the status of Remain Closed (excluding special conditions). 2) Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions). 3) Door Locked Time(s): After swiping the normal card and relay action, the timer for locking the door starts working. 4) Door Open for Disabled Person: The door magnetic can be enabled with appropriate delay after disabled person swipes the card. 5) Door Open Timeout(s): The alarm can be triggered if the door has not been close 6) Enable Lock Door when Door Close: This function has not been supported yet. 7) Duress Code: The door can open by inputting the duress code when there is a duress. At the same time, the access system can report the duress event. 8) Super Password: The specific person can open the door by inputting the super password. 2. Click the Restore Default Value to restore all parameters into default settings. 3. Click the Edit button to save parameters. 4. Click the Hardware Parameters Downloading button to download the updated parameters to the local memory of the device. Note: The attendance device does not support the function. Editing Device (Card Reader Information) 46 Fingerprint Access Control Terminal Steps:
1. In the device list, select a card reader name to enter into the card reader information editing interface. 2. Click the Basic Information button to edit the basic information about the card reader. 3. Click the Expansion Information button to edit the expansion information about the card reader. 4. Click the Edit button to save parameters. 5. Click the Hardware Parameters Downloading button to download the updated parameters to the local memory of the device. Deleting Device 47 Fingerprint Access Control Terminal Steps:
1. In the device list, select a device by clicking it, or select multiple devices by pressing Ctrl button on your keyboard and clicking them one by one. 2. Click the 3. Click OK button in the popup confirmation dialog to finish deleting. button to delete the selected device(s). Bulk Time synchronization Steps:
1. In the device list, select a device by clicking it, or select multiple devices by pressing Ctrl button on your keyboard and clicking them one by one. 2. Click the Bulk Time Adjustment button to start time synchronization. A message box will pop up on the lower-right corner of the screen when the time synchronization is compeleted. Status In the device list, you can click Status button to enter view the status. 1) Door Status: The status of the connected door. 2) Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, Host Anti-Tamper Status. 3) Card Reader Status: The status of card reader. 4) Alarm Input Status: The alarm input status of each port. 5) Alarm Output Status: The alarm output status of each port. 6) Event Sensor Status: The event status of each port. Remote Configuration In the device list, you can click Remote Configuration button to enter the remote configuration interface. You are able to configure the voice prompt function. 48 Fingerprint Access Control Terminal Attendance Configuration Purpose:
You are able to remotely configure the device shift, holiday and shift schedule. Shift Management You are able to add, delete and edit the shift. 1) Editing Normal Shift Steps:
1. Click the Shift Group tab to enter the following page. 49 Fingerprint Access Control Terminal 2. Click Attendance Rule in the Shift Management List, and click the attendance rule on the right of the interface. Note: There is one default attendance rule. 3. Click button to pop up the Attendance Rule window. 4. Configure the parameters and click the 5. Click Attendance Shift in the Shift Management list and select a shift on the right side of the button to confirm editing. interface. 6. Click to enter the Attendance Shift editing window. 50 Fingerprint Access Control Terminal 7. Configure the parameters in the window and click to confirm editing. 8. Click to apply the parameters to the device. 2) Editing Man-Hour Shift Steps:
1. Click Man-Hour Shift in the Shift Management List and click a shift on the right of the interface. 2. Click 3. Configure the man-hour shift parameters in the pop-up window. 51 Fingerprint Access Control Terminal 4. Click to confirm editing. Holiday Management Steps:
1. Click Holiday Management to enter the Holiday Management tab. 2. Click 3. Edit the holiday name, the holiday start time and the end time. to enter the Holiday management window. 52 Fingerprint Access Control Terminal 4. Click 5. Click to add the holiday. to apply the parameters to the device. Or select a holiday in the holiday list and click to edit the holiday. Or select a holiday and click to delete the holiday. Shift Schedule Management Schedule by Department Before you start:
Add department before manage the shift schedule. For details, see Section 5.3.1 Person Management. Steps:
1. Click Shift Schedule Management to enter the Shift Schedule Management tab and click
. 53 Fingerprint Access Control Terminal 2. Select a department in the department list and click the default shift on the right of the interface. 3. Click 4. Click and configure the shift schedule parameters in the pop-up window. to confirm editing. 5. Click
, and apply permissions in the permission management to apply configurations to the device. For details, see Section 5.3 Permission Management. Schedule by Person Before you start:
Add persons in the Person Management before you scheduling by person. Steps:
1. In the Shift Schedule Management tab, click
. 54 Fingerprint Access Control Terminal 2. Click and select the person in the pop-up window and click
. You can also select the person in the person list and click person. to delete the 3. Select the person in the person list and select the default schedule on the right of the interface. 4. Click and configure the parameters in the pop-up window. 55 Fingerprint Access Control Terminal 5. Click to confirm editing. 6. Click
, and apply permissions in the permission management to apply configurations to the device. For details, see Section 5.3 Permission Management. Setting Wiegand Purpose:
You can set the Wiegand channel and the communication mode. Steps:
1. In the Edit Access Controller interface, click the Wiegand Settings button to enter the Wiegand Settings interface. 2. Select the Wiegand channel and the communication mode in the dropdown list. 3. Click OK to save the settings. Notes:
After changing the communication direction, the device will be rebooted. A prompt will be pop-up after changing the communication direction. The attendance device does not support the function. 56 Fingerprint Access Control Terminal 5.2.2 Access Control Point Management Click the icon on the control panel to enter the door management interface. Group Management The doors can be added to different groups to realize the centralized management. Door Management Manage the specific door under the door group, including importing, editing and deleting door. 57 Fingerprint Access Control Terminal Group Management Adding Group Steps:
1. Click the button to pop up the Add Group dialog. button to finish adding. 2. Input the group name in the text field and click the Note: Multi-level groups are not supported yet. Editing Group Steps:
Double-click the group or right-click the group and select Edit in the right-click menu. Deleting Group To delete a group, three ways are supported. Click to select a group and click the button. Right-click a group and select Delete in the popup menu. Move the mouse onto the group and click And then click the OK button in the popup window. Access Control Point Management Access control points under the group can also be edited, refer to the following instructions. Importing Access Control Point Steps:
1. Click the 2. Select a access control point to import by clicking it. 3. Click to select a group in the right side bar to import to. 4. Click button to import the selected access control points or click button to pop up the access control point importing interface. icon of it. to import all the available access control points. Notes:
You can click The control client can manage 16 access control points at most. button on the upper-right corner of the window to create a new group. Editing Access Control Point Steps:
1. Click to select a access control point in the list and click the control point. button to edit the access 2. Edit the Door Name and Position. 3. Click Note: you can also enter the Edit interface by double clicking the door from the list. Deleting Access Control Point button to finish editing. 58 Fingerprint Access Control Terminal Several ways are supported to delete the access control point, as shown below. Click to select a group in the group list, select door(s) under it, and click Click to select a group in the group list, and click button. button to delete all access control points under the group. Move the mouse onto a group in the group list, and click button to delete all access control points under the group. Note: you can also edit/delete a door on the Import Access Control Point panel. Steps:
1. Select a control point on the Group panel. 2. Click the
/
icon to enter the Edit Access Control Point panel or to delete the control point. 5.3 Permission Management 5.3.1 Person Management Click the Adding, editing, deleting and filtering of the department and person are supported in this interface. icon on the control panel of the software. Department Management Steps:
1. In the department list, click button to pop up the adding department interface. 59 Fingerprint Access Control Terminal Notes:
Multi-level department system can be created. Click a department as the upper-level deparment button, and then the added department will be the sub-department of it. and click Up to 10 levels can be created. 2. You can double-click an added department to edit its name. 3. You can click to select a department, and click the button to delete it. Notes:
The lower-level departments will be deleted as well if you delete a department. Make sure there is no person added under the department, or the department cannot be deleted. Person Management Note: In the person management interface, double-click the person name or click the Edit button to edit the person informationt In the person management interface, click the Delete button to delete the person. Up to 2000 persons ban be added. Steps:
1. Select a department in the list and click the Inputting General Information in the person infoarmation list to pop up the adding person interface. 2. Input the Person Name (required), Gender, ID Card, etc., upload the photo of the person and click the Note: The format of the photo should be .jpg, or .jpeg. icon to finish adding. 3. You can double-click an added person to edit its information. 4. You can click to select a person, and click the button to delete it. 60 Fingerprint Access Control Terminal If a card is associated with the current person, the association will be invalid after the person is deleted. Inputting Fingerprint Steps:
1. In the personal information interface, click the Fingerprint button. 2. Click the Start Register button, and select the fingerprint to be input. 3. Click the Save button to save the parameter. Note: Click the Delete Fingerprint button to delete the fingerprint. Click the Delete All button to clear all fingerprints input. 5.3.2 Card Management Click interface. on the control panel of the software to enter the card management The cards are divided into 3 types: Blank Card, Normal Card, and Lost Card. Blank Card: A card has not been issued with a person. Normal Card: A card is issued with a person and is under normal using. Lost Card: A card is issued with a person and is reported as lost. 61 Fingerprint Access Control Terminal Blank Card Adding Card Before you start:
Make sure a card dispenser is connected to the PC and is configured already. Refer to the section of Card Dispenser Configuration5.6.2 System Configuration for details. Steps:
1. Click the button to add cards. 2. Two modes of adding cards are supported. Adding Single Card Choose the Single Add as the adding mode by clicking the Date and Card No. in the text field. to and input the Start Date, Expiring Batch Adding Cards Choose the Bulking Adding as the adding mode by clicking the date, expiry date, start card No. and last card No. in the corresponding text fields. Note: The start card No. and the last card No. should be the with same length. E.g., the last card No. is 234, then the start card No. should be like 028. and input the activation to 3. Click the 4. Click an added blank card in the list and click button to finish adding. button to issue the card with a person. Note: you can double click the blank card in the card list to enter the Issue Card Page. 62 Fingerprint Access Control Terminal 5. Click to choose a person on your demand in the popup dialog box, select a fingerprint, and click to finish. Notes:
The issued card will disappear from the Blank Card list, you can check the card information in the Normal Card list. Up to 2000 cards can be added. For the DS-K1A801 device and the DS-K1T803 device, the card and the user are mapped in one-
to-one relationship. Deleting Card You can click an added blank card in the list and click Normal Card Click the Normal tab in the card managemet interface to show the Normal Card list. You can view all the issued card information, including card No., card holder, and the department of the card holder. button to delete the selected card. Click to select a card and click the Card Change button to change the associated card for card holder. Select another card in the popup window to replace the current card. Click to select an issued card and click the Return Card button to cancel the assotiation of the card, then the card will disappear from the Normal Card list, which you can find it in the Blank Card list. Click to select an issued card and click the Report Card Loss button to set the card as the Lost Card, that is, an invalid card. 63 Fingerprint Access Control Terminal Click to select an issued card and click the Password Settings button to set the password for the card, set the password in the text filed and click the OK button to finish setting. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card&password authentication on the advanced configuration page. Lost Card Click the Card Reported Loss tab in the card managemet interface to show the Lost Card list. You can view all the lost card information, including card No., card holder, and the department of the card holder. Click the Cancel Card Loss button to resume the card to the normal card. Click the Card Replacement button to issue a new card to the card holder replacing for the lost card. Select another card in the popup window as the new card and the predefined permissions of the lost card will be copied to the new one automatically. 5.3.3 Schedule Template Click on the control panel of the software to enter the schedule template interface. 64 Fingerprint Access Control Terminal There are 3 settings in this interface: Week Plan, Holiday Plan, and Template. Setting Week Plan Adding Week Plan System defines 2 kinds of week plan by default, Enable Week Plan by Default and Disable Week Plan by Default. You can define custom plans on your demand. Steps:
1. Click the Add Week Plan button to pop up the adding plan interface. 2. Input the name of week plan and click the OK button to add the week plan. 3. Select a week plan in the plan list on the left-side of the window to edit. 4. Click and drag your mouse on a day to draw a blue bar on the schedule, which means in that period of time, the cofigured permission is activated. 5. Repeat the above step to configure other time periods. Or you can select a configured day and click the Copy to Week button to copy the same settings to the whole week. Deleting Week Plan Click to select a configured duration and click the Delete Duration button to delete it. Click the Clear Duration button to clear all the configured durations, while the week plan still exists. Click the Delete Week Plan button to delete the week plan directly. 65 Fingerprint Access Control Terminal Setting Holiday Group Adding Holiday Group Steps:
1. Click the Add Holiday Group button to pop up the adding holiday group interface. 2. Input the name of holiday group in the text filed and click the button to add the holiday group. 3. Click the holiday. Note:At most 16 holiday periods can be added. icon to add a holiday in the holiday list and configure the duration of the 1) Click and drag your mouse on a day to draw a blue bar on the schedule, which means in that duration, the cofigured permission is activated. 2) Click to select a configured duration and click 3) Click the 4) Click the to clear all the configured durations, while the holiday still exists. to delete the holiday directly. to delete it. button to save the settings. 4. Click the Note: The holidays cannot be overlapped with each other. Setting Schedule Template The schedule consists of week plan and holiday group; you can only choose which plan and group to enable in the schedule template configuration interface. Configure the week plan and holiday group before configuring the schedule template. 66 Fingerprint Access Control Terminal Note: The priority of holiday group schedule is higher than the week plan. Steps:
1. Click to pop up the adding schedule interface. 2. Input the name of schedule in the text filed and click the 3. Select a week plan you want to apply to the schedule. Click the Week Plan tab and select a plan in the dropdown list. button to add the schedule. 4. Select holiday groups you want to apply to the schedule. Note:At most 4 holiday groups can be added. 67 Fingerprint Access Control Terminal Click to select a holiday group in the left-side list and click Click to select an added holiday group in the right-side list and click Click to delete all the added holiday groups. 5. Click Note: The attendance device does not support schedule template.. to save the settings. to add it. to delete the it. 5.3.4 Door Status Management Purpose:
The function of Door Status Management allows you to schedule weekly time periods for a door to remain open or closed. Click the icon on the control panel to enter the interface. 68 Fingerprint Access Control Terminal Steps:
1. Enter the Door Status Management page. 2. Click and select a door from the door list on the left side of the page. 3. Draw a schedule map. 1) Select a door status brush
/
on the upper-left side of the Door Status Settings panel. Remain open: the door will keep open during the configured time period. The brush is marked as yellow. Remain Closed: the door will keep closed during the configured duration. The brush is marked as blue. 2) Click and drag the mouse to draw a color bar on the schedule map to set the duration. 69 Fingerprint Access Control Terminal Notes The min. segment of the schedule is 30min. You can copy the configured time periods of a day to the whole week. Steps:
1. Select a day which has already been configured. 2. Click on to copy the time periods to the whole week. 4. Edit the schedule map. Edit Duration:
Click and drag the color bar on the schedule map and you can move the bar on the time track. Click and drag the mouse on the ends of the color bar and you can adjust the length of the bar. Delete a Duration:
Click and select a color bar and click Clear All Durations:
to delete the time period. Click to clear all configured durations on the schedule map. 5. Click on to save the settings. 6. You can copy the schedule to other doors by clicking on and select the required doors. 7. Click to enter the Download Door State page. 70 Fingerprint Access Control Terminal 8. Select a control point and click OK to download the settings to the system. Note: The attendance device does not support the function. 5.3.5 Interact Configuration Click interface. on the control panel of the software to enter the interact configuration In this interface, you can set alarm linkage modes of the access host, including case trigger, event card interact, and client interact. Case Trigger Purpose:
71 Fingerprint Access Control Terminal The case (refer to the triggers of the controller) can be linked to some actions (e.g., alarm output, host buzzer) when it is triggered. Steps:
1. Click the Case Trigger tab to enter the case trigger interface, and select a case. 2. Check the checkbox of the corresponding linkage actions and set the property as Trigger to enable this function. Host Buzzer: The audible warning of controller will be triggered. Reader Buzzer: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Door (Open/Close): The door will be open or closed when the case is triggered. 3. Click the Save button. 4. Click the Apply button to take effect of the new settings. Note: The Door cannot be configured as open or closed at the same time. Event Card Interact In the Interact Configuration interface, click the Event Card Interact button to enter the settings interface. Event Linkage In the Event Interact interface, the linkage alarm action, after triggering alarm event, can be set. The alarm event can be divided into four types: event device, event input alarm, door event, and card reader event. Steps:
1. Click the Event Card Interact tab to enter the event card interface 2. Select the host to be set from the host list. 3. Click the button to start setting the event linkage. 4. Click the radio button of the event linkage, and select the event type from the dropdown list. 5. Set the linkage target, and set the property as Trigger to enable this function. Host Buzzer: The audible warning of controller will be triggered. Snapshot: The real-time capture will be triggered. Reader Buzzer: The audible warning of card reader will be triggered. 72 Fingerprint Access Control Terminal Alarm Output: The alarm output will be triggered for notification. Door: The door status of open, close, normally open, and normally close will be triggered. 6. Click the 7. Click the Apply button to download the updated parameters to the local memory of the device. Notes:
button to save parameters. The door status of open, close, normally open, and normally close cannot be triggered at the same time. The attendance device does not support opening door, closing door and capturing. Card Linkage In the Event Interact interface, the linkage alarm action, after triggering the card number, can be set. Steps:
1. Click the Card Event Interact tab to enter the event card interface 2. Select the host to be set from the host list. 3. Click the button to start setting the event linkage. 4. Click the radio button of card linkage, and input the card number. 5. Select the event source, and check the checkbox of the card readers serial number. 6. Set the linkage target, and set the property as Trigger to enable this function. Controller Buzzer: The audible warning of controller will be triggered. Snapshot: The real-time capture will be triggered. Reader Buzzer: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Door: The door status of open, close, normally open, and normally close will be triggered. button to save parameters. 7. Click the 8. Click the Apply button to download the updated parameters to the local memory of the device. Note: The door status of open, close, normally open, and normally close cannot be triggered at the same time. 73 5.3.6 Access Permission Configuration Fingerprint Access Control Terminal Click the icon on the control panel to enter the interface. Access Permission Settings Purpose:
You can allocate permission for people/department to enter/exist the control points (doors) in this section. Steps:
1. Enter the Permission page. 2. Click on icon on the upper-left side of the page to enter the Add Permission page. 3. Select an adding type in the Select Type interface. 74 Fingerprint Access Control Terminal By Person: you can select people from the list to enter/exit the door. By Department: You can select departments from the list to enter/exit the door. Once the permission is allocated, all the people in this department will have the permission to access the door. By Access Control Point: You can select doors from the door list for people to enter/exit. By Door Group: You can select groups from the door list for people to enter/exit. The permission will take effect on the door in this group. 4. Click Next to enter the Permission Settings interface. 5. Click on the dropdown menu to select a schedule template for the permission. Note: The schedule template must be configured before any permission settings. Refer to Section 5.3.3 Schedule Template for detailed configuration guide. 6. Select people/department and corresponding doors/door groups from the appropriate lists. 75 Fingerprint Access Control Terminal Note: The lower-level of department will also be selected if the highest-level of department is selected, 7. Click the Done button to complete the permission adding. 8. Click to enter the Download Permission page. 9. Select a control point and click the OK button, to enter the download result interface, to download the permission to the device. 76 Fingerprint Access Control Terminal Access Permission Searching Purpose:
After the permission settings being completed, you can search and view permission assigning condition on the searching interface. Steps:
1. Enter the Permission page. 2. Enter the search criteria (main type/minor type/Keyword). 3. Click Search to get the search results. Note: You can click Reset on the search criteria panel to clear all the displayed search results. Permission Deleting Steps:
1. Follow steps 1-3 in the Permission Searching section to search for the permission needs to be deleted. 2. Select the permission from the results list. 77 Fingerprint Access Control Terminal Note: you can press the Ctrl or Shift key on the keyboard to select multiple items. 3. Click the Delete Permission button to delete the permission. 4. Click to enter the Download Permission page. 5. Select a control point and click the OK button to download the deletion operation to the device. 5.3.7 Advanced Functions Purpose:
The advanced functions of the access control system can be configured. Click the icon on the control panel to enter the interface. 78 Fingerprint Access Control Terminal Access Control Type Purpose:
The added cards can be assigned with different card type for the corresponding usage. Steps:
1. Click Access Control Type tab and select a card type. Normal Card: By default, the card is set as normal card. Card for Disabled Person: The door will remain open for the configured time period for the cardholder. Card in Blacklist: The card swiping action will be uploaded and the door cannot be opened. Patrol Card: The card swiping action can used for checking the working status of the inspection staff. The access permission of the inspection staff is configurable. Duress Card: The card swiping action will be uploaded. Super Card: The card is valid for all the doors of the controller during the configured schedule. Visitor Card: The card is assigned for visitors. 2. Click Add and select the available card. 3. Click OK to confirm assigning the card(s) to the selected card type. 4. Click the Apply button to take effect of the new settings. Notes:
You can click Delete to remove the card from the card type and the card can be available for being re-assigned. The attendance device only supports the normal card. Card Reader Authentication Purpose:
You can only open the door by both swiping card and entering the password during the set time periods. Notes:
For this authentication mode, the card swiping operation cannot be replaced by entering the card No. For password settings, please refer to Section 5.3.2 Card Management. Steps:
79 Fingerprint Access Control Terminal 1. Click Card Reader Authentication tab and select a card reader. 2. Select a card reader authentication type from the dropdown list. Fingerprint: The door can open by only inputting the fingerprint. Swipe Card: The door can open by only swiping the card. Fingerprint/Swipe Card: The door can open by inputting the fingerprint or swiping the card. Swipe Card/Password: The door can open by inputting the ID No. and password, or swiping the card. Fingerprint Password: The door can open by both inputting the password and inputting the fingerprint. Swipe Card Password: The door can open by both inputting the password and swiping the card. Fingerprint Swipe Card: The door can open by both inputting the fingerprint and swiping the card. Fingerprint Swipe Card Password: The door can open by both inputting the fingerprint, inputting the password, and swiping the card. 3. Click and drag your mouse on a day to draw a blue bar on the schedule, which means in that period of time, the password authentication is valid. 4. Repeat the above step to set other time periods. Or you can select a configured day and click the Copy to Week button to copy the same settings to the whole week. You can click the Delete button to delete the selected time period or click the Clear button to delete all the configured time periods.
(Optional) Click the Copy to button to copy the settings to other card readers. 5. 6. Click the Save button to save parameters. 7. Click the Apply button to take effect of the new settings. First Card Purpose:
The door remains open for the configured time duration after the first card swiping. 80 Fingerprint Access Control Terminal Steps:
1. Click First Card and select an access control point. 2. Check the checkbox of Enable First Card Remain Open to enable this function. 3. In the Remain Open Duration (min), input the time duration for remaining open the door. 4. Click button. and select the cards to add as first card for the door and click the 5. Click Note: The attendance device does not support the function. and then click to take effect of the new settings. Anti-Passing Back Purpose:
In this mode, you can only pass the access control system according to the specified path. Note: Either the anti-passing back or multi-door interlocking can be configured for an access controller at the same time. Setting the Path of Swiping Card (Card Reader Order) Steps:
1. Click Anti-passing Back and select an access control point. 81 Fingerprint Access Control Terminal 2. You can set the name for the controller and select the card reader as the beginning of the path. 3. In the list, click the text filed of Card Reader Afterward and select the linked card readers. Example: If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked card readers. Then you can only get through the access control system by swiping the card in the order as Reader In_01, Reader In_02 and Reader Out_04. 4. Check the checkbox of Enable Anti-Passing back. 5. Click Note: The attendance device does not support the function. and then click to take effect of the new settings. Attendance Management 5.4 Purpose:
After adding the device and person, you can set the person shift, set the holiday, manage the person attendance and view the card swiping log. Click icon on the control panel to enter the Attendance Configuration interface. 5.4.1 Shift Group Management Purpose:
On the shift group management interface, you can add, edit, and delete shift groups for attendance management. Steps:
1. Click the Shift Group tab to enter the following page. 2. Click button to pop up the adding shift group window. 82 Fingerprint Access Control Terminal 3. Enter the shift group name, and add button on the person list area to pop up the person adding window. 4. Check the checkbox to select the person and click and return to the shift group settings interface. To delete the added person, check the person from the person list, and click button. 5. Click OK button to complete the operation. 6. You can edit or delete the added shift groups by clicking Notes:
After deleting the shift group, the shift schedule of the shift group will be deleted as well. For details or
. about shift schedule, refer to Section 5.4.4 Shift Schedule Management. If the person has been added to one shift group, he/she cannot be added to other shift groups. 83 Fingerprint Access Control Terminal 5.4.2 Shift Management Click Shift tab to enter the shift management interface. There are two kinds of shifts in this interface: Normal Shift, and Man-Hour Shift. Normal Shift Setting Attendance Rule Steps:
1. Click Attendance Rule to set the rule for the attendance management. 2. Click to pop up the following dialog box. 3. Set a rule name. 4. Set detailed parameters for the attendance rule according to actual needs. 5. Click to save the rule. 6. (Optional) You can edit or delete the rule by clicking or
. Notes:
After deleting the rule, the normal attendance shift which has enabled the rule will be deleted as well. If the shift which has enabled the rule has already set the shift schedule, the shift will not be deleted. Setting Attendance Shift Steps:
1. Click Attendance Shift to set the normal attendance shift. 84 Fingerprint Access Control Terminal 2. Click to pop up the attendance shift setting window. 3. Set a shift name. 4. Set on-work duration for the shift, and select the attendance rule from the dropdown list. 5. Click to complete the operation. 6. (Optional) You can edit or delete the shift by clicking or
. Note: After deleting the shift, its shift schedule will be deleted as well. For details about shift schedule, refer to Section 5.4.4 Shift Schedule Management. Man-Hour Shift Steps:
1. Click Man-Hour Shift to set the man-hour shift details. 2. Click to pop up the man-hour shift setting window. 85 Fingerprint Access Control Terminal 3. Set a shift name, and daily work duration. 4. (Optional) Check the checkbox of latest on-work time, and set the latest on-work time. 5. (Optional) Set the durations excluded from man-hour duration. 6. Click to complete the operation. 7. (Optional) You can edit or delete the shift by clicking
. Note: After deleting the shift, its shift schedule will be deleted as well. For details about shift schedule, refer to Shift Schedule Management. or 5.4.3 Holiday Management Steps:
1. Click Holiday tab to enter the holiday management interface. 2. Click button to pop up the holiday setting window. 86 Fingerprint Access Control Terminal 3. Click button to pop-up holiday adding window. 4. Set the start date and end date, select the date of week, and click
. 5. Click to save the settings. 5.4.4 Shift Schedule Management Purpose:
After setting the shift group and the corresponding shift and shift rule, you can set the shift schedule for the shifts. Steps:
1. Click the Shift Schedule tab to enter the shift schedule management interface. 87 Fingerprint Access Control Terminal 2. Select the shift group from the list on the left. 3. Click to pop up the shift schedule settings window. 4. Select the shift name from the drop-down list and set the start data and end data.
(Optional) You can check the checkbox of holiday to add the holiday shift. Click 5. Click button to complete the operation. to save the settings. 5.4.5 Attendance Check Point Management Steps:
1. Click the Attendance Check Point tab to enter the attendance check point management interface. 2. Click to pop up the adding attendance check point interface as follows. 88 Fingerprint Access Control Terminal Check the select the card reader of the access control point and set the start date and the end date. Select the check point type. Click The added check points will be displayed in the attendance check point list. to save the adding. 3. You can check the checkbox of a check point, and click to pop up the attendance check point editing window. You can edit the attendance check point name, start date, end date, and check point type, controller name, door position, and card reader name. Click to complete the operation. 4. You can check the checkbox of a check point and click to delete the added check point. 5.4.6 Adjustment Management Click the Adjustment tab to enter the adjustment management interface. In this module, Reason Management and List Management can be realized. Reason Management Leave You can add, edit, and delete reasons for leave on the leave interface. Steps:
1. Click Leave tab to enter the leave interface. 89 Fingerprint Access Control Terminal 2. Click to pop up the adjustment reason adding dialog box. 3. Enter the adjustment reason, and click Notes:
The default adjustment reasons include leave for personal affairs, sick leave, marriage leave, funeral to save the adding. leave, home leave, annual leave, maternity leave, and paternity leave. You can check the checkbox of a reason and click to edit the reason, and click to delete the reason. Leave in Lieu Steps:
1. Click Leave in Lieu tab to enter the leave-in-lieu interface. 2. Click to pop up the adjustment reason adding dialog box. 90 Fingerprint Access Control Terminal 3. Enter the adjustment reason, and click Notes:
The default adjustment reasons for leave in lieu include overtime, and business trip. You can check the checkbox of a reason and click to edit the reason, and click to delete the reason. Overtime Steps:
1. Click the Overtime tab to enter the overtime interface. 2. Click to pop up the adjustment reason adding dialog box. 3. Enter the adjustment reason, and click Notes:
The default adjustment reasons for overtime include work requirement, working day overtime, rest
. day overtime, and holiday overtime. You can check the checkbox of a reason and click to edit the reason, and click to delete the reason. Card Replacement Steps:
1. Click the Card Replacement tab to enter the following interface. 91 Fingerprint Access Control Terminal 2. Click to pop up the adjustment reason adding dialog box. 3. Enter the adjustment reason, and click Notes:
The default adjustment reasons for card replacing include forget to swipe card, attendance card lost,
. device fault, shift adjustment, and business trip. You can check the checkbox of a reason and click to edit the reason, and click to delete the reason. List Management Enabled List Steps:
1. Click Enabled List tab to enter the enabled list interface. 2. Click button to add an attendance management form. 92 Fingerprint Access Control Terminal 3. Select the adjustment type: leave, leave in lieu, overtime, and card replacement. Leave, Leave in Lieu, and Overtime 1) Select the adjustment reason from the drop-down list. 2) Click to pop up the person adding window. 3) Select the adding type as by department or by shift group. Select the person and click
. 4) Set the time duration. Disabled List Steps:
93 Fingerprint Access Control Terminal 1. In the Enabled List interface, check the checkbox of a piece of enabled list and click to disable the list. 2. Click Disabled tab and the disabled list will be listed on the disabled interface. 3. You can check the checkbox and click to delete the disabled list. 5.4.7 Card Swiping Log Query Click Swiping Log tab to enter the card swiping log searching and viewing interface. card swiping log by two query types: By Shift Group, and By Department. Input other search conditions and click to start query the card swiping log. 5.4.8 Statistic Analysis Press the Statistic Analysis tab to enter the statistic analysis interface. You can search the On the statistic analysis interface, you can search the attendance analysis table, attendance result statistic table, and attendance rate statistic table. Attendance Analysis Table Press the Attendance Analysis Table tab to enter the attendance analysis interface. 94 Fingerprint Access Control Terminal Notes:
You can search the attendance statistics by different shift type: Normal Shift, or Man-Hour Shift. You can search the attendance statistics by department. You can search the attendance statistics by start date and end date. Attendance Result Statistic Table Press the Attendance Result Statistic Table tab to enter the attendance result analysis interface. Notes:
You can search the attendance result statistics by different shift type: Normal Shift, or Man-
Hour Shift. You can search the attendance result statistics by department. You can search the attendance result statistics by start date and end date. Attendance Rate Statistic Table Press the Attendance Rate Statistic Table tab to enter the attendance rate analysis interface. Notes:
You can search the attendance rate statistics by different shift type: Normal Shift, or Man-
95 Fingerprint Access Control Terminal Hour Shift. You can search the attendance rate statistics by department. You can search the attendance rate statistics by start date and end date. 5.4.9 Parameters Configuration Steps:
1. Click the Parameters Configuration tab to enter the parameters configuration interface. 2. Select the attendance effecting type, data saving time, data expiring prompt. 3. Set the attendance checking log clearing time. 4. Click to save the parameters. 5.4.10 Data Management Steps:
1. Click the Data Management tab to enter the data management interface. 2. Select the date and time period for calculation and click Calculate Attendance Data to start calculating the attendance data. 3. After calculation, you can also export and import the attendance data. Checking Status and Event 5.5 Purpose:
In this section, you are able to anti-control the status of the door and to check the event report of the control point. 5.5.1 Status Monitor Purpose:
You can anti-control the door status and check the real-time access event information for the control point. 96 Fingerprint Access Control Terminal Click the icon on the control panel to enter the interface. Access Anti-control Purpose:
You can control the status for a single control point (a door) in this section. Steps:
1. Enter the status monitor page. 2. Click on the icon 3. Click on the button listed on the upper-left side of the Status Information panel to select a door on the Status Information panel to select a door. status for the door.
: Click on the button to open the door once.
: Click on the button to close the door once.
: Click on the button to keep the door open.
: Click on the button to keep the door closed. Note: Do not support the Capture function. 4. You can also right click the icon and to select a status for the door. 97 5. (Optional) Right click on a group in the Group list and to select a door status for the group. Fingerprint Access Control Terminal Notes:
If the status is selected as Remain Open/Remain Closed, the door will keep open/ closed until a new anti-control command being made. The function of picture capturing cannot be realized until the storage server is installed. Do not support the Capture function. Access Status The door status will be represented instantly by the change of icon on the Access Information panel if the access event is triggered or an anti-control command is made. Note: The attendance device does not support the function. Real-Time Event You can check the Real-time information of the access event on this panel. Click More to enter the Access Event page to view more event information. 5.5.2 Access Control Event Purpose:
You can view real-time access event (such as swiping to open the door, unrecognized card number, duration group error, etc.) information in this section. Click the icon on the control panel to enter the interface. 98 Fingerprint Access Control Terminal Steps:
1. Enter the access event page. 2. View the event information in the event list. 3. Click on an event to view the information of the card holder on the Person Information panel on the left side of the page. 5.5.3 Event Search Purpose:
You can search historical access event according to the search criteria (such as event type, name of the person, card No. or start/end time) in this section. Click the icon on the control panel to enter the interface. 99 Fingerprint Access Control Terminal Steps:
1. Enter the event search page. 2. Enter the search criteria (event type/ person name/ card No/ start &end time). to get the search results. 3. Click 4. View the event information in the event list. 5. Click on an event to view the information of the card holder on the Person Information panel on the left side of the page. 5.6 System Maintenance 5.6.1 Log Management Purpose:
The log files of the Access Control System and the devices that connected to the Access Control System can be searched for checking. Click the icon on the control panel to open the Log Search page. 100 Fingerprint Access Control Terminal Configuration Logs Searching Purpose:
The Configuration Log files of the Access Control System can be searched by time ,including One-card Configuration, Access Control Configuration, Downloading Permission and System Configuration. Steps:
1. Open the Log Search page. 2. Select the radio button of Configuration Logs. 3. Select the Operation Type of log files. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Control Logs Searching Purpose:
The Control Log files of the Access Control System can be searched by time ,including Access Control and Log Search. Steps:
1. Open the Log Search page. 2. Select the radio button of Control Logs. 3. Select the Operation Type of log files. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Searching Configuration Log Searching One-card Configuration Logs Purpose:
The One-card Configuration Log files include departments, persons and cards log files. One-card Configuration of the Access Control System can be operated as adding ,modifying and deleting logs. Steps:
101 Fingerprint Access Control Terminal 1. Open the Log Search page. 2. Select the radio button of Configuration Logs. 3. Select the operation type as One-card Configuration. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Searching Access Control Configuration Logs Purpose:
The Access Control Configuration Log files include Access Control devices log files. Access Control Configuration of the Access Control System can be operated as adding, modifying and deleting door groups or doors and access control device permission operations. Steps:
1. Open the Log Search page. 2. Select the radio button of Configuration Logs. 3. Select the operation type as Access Control Configuration. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Searching Downloading Permission Logs Purpose:
The Downloading Permission Log files include downloading permission log files, and no record for downloading permission failure log files. Steps:
1. Open the Log Search page. 2. Select the radio button of Configuration Logs. 3. Select the operation type as Downloading Permission. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Searching System Configuration Logs Purpose:
The System Configuration Log files of the Access Control System can be searched as system configuration interface log files. Steps:
1. Open the Log Search page. 2. Select the radio button of Configuration Logs. 3. Select the operation type as System Configuration Logs. 4. Click the icon to specify the start time and end time. 5. Click Search. The matched log files will display on the list. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. 102 Fingerprint Access Control Terminal Searching Control Log Searching Access Control Logs Purpose:
The Access Control Log files of the Access Control System include door groups and doors access control logs and door on/off control log files. Steps:
1. Open the Log Search page. 2. Select the radio button of Control Logs. 3. Select the operation type as Access Control Logs. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. Log Search Purpose:
The Log Search of the Access Control System include informations for configuration log files and control log files. Steps:
1. Open the Log Search page. 2. Select the radio button of Control Logs. 3. Select the operation type as Log Search. 4. Click the icon 5. Click Search. The matched log files will display on the list. to specify the start time and end time. You can check the operation time, log type and other information of the logs. Note: Please narrow the search condition if there are too many log files. 5.6.2 System Configuration Purpose:
The general parameters, Auto Time Adjustment and Card Reader of the Access Control System can be configured. Click the icon on the control panel to open the System Configuration page. 103 Fingerprint Access Control Terminal Auto Time Synchronization The Auto Time Synchronization of the Access Control System can operate auto time adjustment to all access control devices of the Access Control System according to specified period and time. Card Reader Configuration The Card Reader Configuration is for Access Control System to read the card by setting Card Reader parameters. For now D8E-U-A-III and DS-K1F100-M card reader types are supported. Fingerprint Machine The Fingerprint Machine is for Access Control system to collect fingerprints. Manual Capture Configuration The Manual Capture Configuration is for Access Control system to take photos remotely. Auto Time Synchronization Steps:
1. Open the System Configuration page. 2. Click the Common tab to enter the Common Settings interface. 3. Tick the checkbox to enable Auto Time Synchronization. 4. Select the matched day and input the time to operate the time adjustment. 5. Click to save the settings.
(Restore Default Value) to restore the defaults of all the local Note: You can click configurations. Card Dispenser Configuration Purpose:
The Card Reader Configuration of the Access Control System can configure device type, connection mode, serial port, baud rate and other parameters of the Card Reader Configuration. 104 Steps:
Fingerprint Access Control Terminal 1. Click the icon on the System Configuration interface to open the Card Dispatcher Configuration page. 2. Select the device type, serial port type, serial port, baud rate, and other parameters of the Card Dispatcher. 3. Click the save button to save the settings. Note:
Configuration Instruction DS-K1F100-M: select Serial Port Mode as accessing mode (currently only support serial port mode), the serial port NO. is the COM port NO. of the computer. Set other parameters as default. D8E-U-A-III: select USB Mode as accessing mode (currently only support USB mode). Set other parameters as default. It is supported using card type as regular and Wiegand. When the BEEP is selected as YES, the audio will be off when you click the SAVE if the Card Reader Configuration is set wrong; the audio will be on when you click the you insert the card reader if the configuration is set correct. and when You can click configuration.
(Restore Default Value) to restore the defaults of all the local Fingerprint Machine Configuration Steps:
1. Click the icon on the System Configuration interface to open the Fingerprint Machine Configuration page. 105 Fingerprint Access Control Terminal 2. Select the device type, serial port number, baud rate, device code, and overtime parameters of the fingerprint machine. 3. Click Note:
to save the settings. It is supported using device type as Optical Fingerprint Collecting. The serial port number should correspond to the serial port number of PC. The baud rate should be called according to the external fingerprint card dispatcher. The default value is 19200. Overtime refers to the valid fingerprint collecting time. If the user does not input a fingerprint or inputs a fingerprint unsuccessfully, the device will indicate that the fingerprint collecting is over. You can click
(Restore Default Value) to restore the defaults of all local settings. 106 Fingerprint Access Control Terminal Chapter 6 Appendix Tips for Scanning Fingerprint 6.1 Recommended Finger Forefinger, middle finger or the third finger. Correct Scanning The figure displayed below is the correct way to scan your finger:
You should press your finger on the scanner horizontally. The center of your scanned finger should align with the scanner center. Incorrect Scanning The figures of scanning fingerprint displayed below are wrong:
Vertical Edge I Side Edge II Environment The scanner should avoid direct high light, high temperature, humid conditions and rain. When it is dry, the scanner may not recognize your fingerprint successfully. You can blow your finger and scan again after drying the finger. Others If your fingerprint is shallow, or it is hard to scan your fingerprint, we recommend you to use other authentication methods. If you have injuries on the scanned finger, the scanner may not recognize. You can change another finger and try again. 107 6.2 Attendance Record Delete Rule Fingerprint Access Control Terminal 6.2.1 Enabling Record Delete You are able to configure the percentage of the attendance record over threshold prompt. 1) When the record reaches the threshold, an alarm of the attendance record over limit value will be displayed on device screen. The alarm information is: Log will be full, export the report. Card authentication is available. The interface will be back to the alarm interface after authenticating. 2) When the record is full, an alarm of the attendance record over limit value will be displayed on the device screen. The alarm information is: Log is full, export the report. Card authentication is available. And the first 3000 attendance records will be deleted automatically. The interface will be back to the alarm interface after authenticating. 3) Deleting by time and deleting all are available when deleting the attendance records. 6.2.2 Disabling Record Delete You are able to configure the percentage of the attendance record over threshold prompt. 1) When the record reaches the threshold, an alarm of the attendance record over limit value will be displayed on device screen. The alarm information is: Log will be full, export the report. Card authentication is available. The interface will be back to the alarm interface after authenticating. 2) When the record is full, an alarm of the attendance record over limit value will be displayed on the device screen. The alarm information is: Log is full, export the report. Card authentication is available. And there will be no new attendance records added. The interface will be back to the alarm interface after authenticating. 3) Deleting by time and deleting all are available when deleting the attendance records. 108 Fingerprint Access Control Terminal 6.3 Device Performance 6.3.1 Access Control Content Door Lock Time Door Open Timeout Maximum Attempts of Authentication Alarm Access Control Terminal Tampering Alarm Duration External Card Reader Tampering Alarm Duration Linkage Alarm Card Permission Week Plan Card Permission Holiday Template Card Permission Holiday Group Card Permission Schedule Template 6.3.2 Attendance Content Department Normal Shift Man-Hour Shift Holiday Holiday Group Schedule by Department Schedule by Individual Configurable Parameters 1 to 255s 0 to 255s 1 to 10 15s 15s 15s Up to 32 are supported. Each day supports up to 8 periods in each week plan. Up to 128 are supported. Each holiday schedule supports up to 8 time periods. Each holiday schedule can be in multiple holiday groups. Up to 64 are supported. Each holiday group supports up to 16 holiday schedules. Up to 64 are supported. Each schedule template supports up to one week plan and 4 holiday groups. Maximum Configurable Parameters 32 32 32 32 64 32 32 109 6.4 Attendance Report Table Fingerprint Access Control Terminal 6.4.1 Description of Attendance Report File Name File Name Rule att_Report Type_dev_Device No._Date_Time.xls Report Type abnormal: The Abnormal Attendance Record table. abnormal2: When the row of the Abnormal Attendance Record table is more than 65000, the record will be export in two tables. Here abnormal2 refers to the second table. summary: The Attendance Report table. record: The Attendance Record table. schedule_cfg: The shift schedule configuration table. ord_class: The normal shift configuration table. work_class: The man-hour shift configuration table. Device No. A serial of numbers from 0 to 8. Date YYYYMMDD Time HHMMSS Example 110 6.4.2 Attendance Report Table Description Fingerprint Access Control Terminal Special Shift1-1 Normal Shift1 2-1 Man-Hour Shift1 0 No Shift 3Holiday Shift Settings Table Date Name 2016/4/10 1 2 3 4 5 6 7 8 Department Employee ID Shift Settings Table: All users shift schedule information for a period will be displayed in this table. You are able to set the shift information and the holiday (No attendance recorded during the holiday) in shift schedule configuration. 1. ID No.: The user's ID No. 2. Name: The user's name. 3. Department: The department of the user. 4. Header: The number from 1 to 31 refers to the shift schedule days. For example: If entering 2016.8.26 to 2016.9.15, header 1 refers to the shift schedule information in 2016.8.26. Normal Shift Schedule Shift No. Shift Name Period 1 Period 2 On Work Off Work On Work Off Work Normal Shift Table: Up to 4 periods can be configured in normal shift configuration. You are able to take attendance according to the configured period. For example: If set Period 1 to 9:00 (On Work) and 17:00 (Off Work), it is effective for the user to take attendance between 9:00 and 17:00. Combining with the attendance rule, you are able to set multiple attendance types. Man-Hour Shift Schedule Shift No. Shift Name Duration Latest On-Work Time Break Period 1 Start End Man-Hour Shift Table: Set the Man-Hour Shift working duration. If set the Latest On-Work Time to 0, all users are attendant. If set the Latest On-Work Time to more than 0, the user will be absent by taking attendance after the configured time. The Break Period will not be configured in the man-hour shift. For example: If set the working duration to 6 hours, the on-work time to 09:00, the off-
work time to 17:00 and the break period 1 to 12:00 to 13:00, the user actual working hour is 17:00 - 09:00 - (13:00 - 12:00). 111 Fingerprint Access Control Terminal Abnormal Attendance Record Date2016/04/01 ~2016/04/30 Employee ID Name Department Date Period 1 Period 2 On Work Off Work On Work Abnormal Attendance Record Table: Calculate the abnormal attendance according to the attendance records and the shift schedule configuration. 1. Employee ID: The user's ID No. 2. Name: The user's name. 3. Department: The department of the user. 4. Date: the date of the data generated. 5. Period 1 to Period 4: Up to 4 periods can be configured. It records the attendance time of each user every day. 6. Late (Minute): The on-work attendance time is later than the normal on-work time. 7. Early Leaving (Minute): The off-work attendance time is earlier than the normal off-
work time. 8. Absence (Minute): No normal working hour. 9. Total: The normal working hour of the day. Attendance Record Attendance Checking Time2016/04/01~2016/04/30 Tabulation Time2016/04/30 1
#
Employee ID1 Name111 Departmentaaa 10 4 5 6 7 8 9 3 2 Employee ID2 Name222 Department bbb Attendance Record Table: Input the start time and the end time to export the effective attendance data during the configured duration. 1. Hearder: The number from 1 to 31 refers to the shift schedule days. For example: If entering 2016.8.26 to 2016.9.15, header 1 refers to the shift schedule information in 2016.8.26. 2. Employee ID: The user's ID No. 3. Name: The user's name. 4. Department: The user's department. Counting Date2016/04/01 ~2016/04/30 Attendance Report Employee ID Name Department
(Hour:Munite) Late Duration 1 2 111 222 aaa bbb Standard Actual 11:00 11:00 12:00 12:00 Frequency Minute 1 1 20 30 112 Fingerprint Access Control Terminal Attendance Report Table: Enter the start time and the end time to calculate the user attendance information via the shift information and the holiday information according to the shift schedule configuration. 1. Emplayee ID: The user's ID No. 2. The user's name. 3. Department: The user's department. 4. Duration:
Standard: Total standard working hours in the duration. Actual: Total actural working hours in the duration. Actural Hours = Standard Value - Late Hours - Early Leaving Hours 5. Late: The on-work attendance time is later than the normal on-work time. Frequency: Late arriving for no more than once every day. Minute: All late arriving minutes in the duration. 6. Early Leaving: The off-work attendance time is earlier than the normal off-work time. Frequency: Early leaving for no more than once every day. Minute: All early leaving minutes in the duration. 7. Over Time: No records. 8. Attendance Days:
Standard: Standard attendance days in a duration, exculding the holidays and the days without shift schedule. Actual: Actual attendance days in a duration. Actural Days = Standard Days - Absent Days 9. Business: No records. 10. Absence: Do not take attendance in the normal working days. 11. Leave: No records. 1000001060824 113 Fingerprint Access Control Terminal 114
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2018-07-04 | 2422 ~ 2452 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter | ||
3 | 2017-10-09 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
4 | 2422 ~ 2452 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 4 | Effective |
2018-07-04
|
||||
1 2 3 4 |
2017-10-09
|
|||||
1 2 3 4 | Applicant's complete, legal business name |
Hangzhou Hikvision Digital Technology Co., Ltd.
|
||||
1 2 3 4 | FCC Registration Number (FRN) |
0024149825
|
||||
1 2 3 4 | Physical Address |
No. 555 Qianmo Road, Binjiang District
|
||||
1 2 3 4 |
Hangzhou, N/A 310052
|
|||||
1 2 3 4 |
China
|
|||||
app s | TCB Information | |||||
1 2 3 4 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 2 3 4 |
u******@sgs.com
|
|||||
1 2 3 4 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 3 4 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 3 4 | Grantee Code |
2ADTD
|
||||
1 2 3 4 | Equipment Product Code |
K1T803MF
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 4 | Name |
X******** Z****
|
||||
1 2 3 4 | Telephone Number |
+86-5********
|
||||
1 2 3 4 | Fax Number |
+86-5********
|
||||
1 2 3 4 |
z******@hikvision.com
|
|||||
app s | Technical Contact | |||||
1 2 3 4 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 3 4 |
SGS-CSTC Standards Technical Services Co., Ltd
|
|||||
1 2 3 4 | Name |
P******** Z****
|
||||
1 2 3 4 |
K******** X****
|
|||||
1 2 3 4 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 2 3 4 |
No.1 Workshop, M-10, Middle Section
|
|||||
1 2 3 4 |
ShangHai, 201612
|
|||||
1 2 3 4 |
Shenzhen, 518057
|
|||||
1 2 3 4 |
China
|
|||||
1 2 3 4 | Telephone Number |
86 21********
|
||||
1 2 3 4 |
0755-********
|
|||||
1 2 3 4 | Fax Number |
86 21********
|
||||
1 2 3 4 |
0755-********
|
|||||
1 2 3 4 |
P******@sgs.com
|
|||||
1 2 3 4 |
k******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 2 3 4 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 3 4 | Name |
K**** X******
|
||||
1 2 3 4 | Physical Address |
No.1 Workshop, M-10, Middle Section
|
||||
1 2 3 4 |
Shenzhen, 518057
|
|||||
1 2 3 4 |
China
|
|||||
1 2 3 4 | Telephone Number |
0755-********
|
||||
1 2 3 4 | Fax Number |
0755-********
|
||||
1 2 3 4 |
k******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 3 4 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
1 2 3 4 | Yes | |||||
1 2 3 4 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 4 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 4 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 4 | DXX - Part 15 Low Power Communication Device Transmitter | |||||
1 2 3 4 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Fingerprint Access Control Terminal | ||||
1 2 3 4 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 4 | Modular Equipment Type | Does not apply | ||||
1 2 3 4 | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
1 2 3 4 | Original Equipment | |||||
1 2 3 4 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 4 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 4 | Grant Comments | C2PC to change RTC circuit. Power Output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This device has a 20 MHz, 40 MHz bandwidth mode. | ||||
1 2 3 4 | C2PC to change RTC circuit. | |||||
1 2 3 4 | Power Output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This device has a 20 MHz, 40 MHz bandwidth mode. | |||||
1 2 3 4 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 4 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 4 | Firm Name |
SGS-CSTC Standards Technical Services Co.,Ltd.
|
||||
1 2 3 4 |
SGS-CSTC Standards Technical Services Co., Ltd.
|
|||||
1 2 3 4 | Name |
L****** Y****
|
||||
1 2 3 4 |
J******** C******
|
|||||
1 2 3 4 | Telephone Number |
+86 (********
|
||||
1 2 3 4 |
86 (0********
|
|||||
1 2 3 4 | Fax Number |
86 (0********
|
||||
1 2 3 4 |
l******@sgs.com
|
|||||
1 2 3 4 |
j******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2412 | 2462 | 0.025 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC | 2422 | 2452 | 0.02 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 13.56000000 | 13.56000000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | CC | 13.56000000 | 13.56000000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15C | CC | 2412 | 2462 | 0.14 | |||||||||||||||||||||||||||||||||||
4 | 2 | 15C | CC | 2422 | 2452 | 0.146 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC