all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manuals | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual 20210713 v1 - User Manual 1 | Users Manual | 3.74 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
User Manual 20210713 v1 - User Manual 2 | Users Manual | 5.26 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Internal Photos 20210713 v1 - Internal Photo | Internal Photos | 1.63 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
External Photos 20210713 v1 - External Photo | External Photos | 479.39 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
label and label location-update | ID Label/Location Info | 111.04 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Cover Letters 20210713 v1 - Authorization Letter | Cover Letter(s) | 165.43 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Cover Letters 20210713 v1 - Declaration letter | Cover Letter(s) | 114.52 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Cover Letters 20210713 v1 - Request for Confidentiality request letter | Cover Letter(s) | 116.25 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Test Report 20210713 v1 - 4789949892-3 FCC 15.225 Test Report | Test Report | 1.22 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Test Setup Photos 20210713 v1 - Setup Photo | Test Setup Photos | 447.63 KiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
4789949892-1 FCC ID WIFI 2.4G Report Part1 | Test Report | 3.95 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
4789949892-1 FCC ID WIFI 2.4G Report Part2 | Test Report | 3.24 MiB | July 29 2021 / August 02 2021 | |||
1 2 |
|
Test Report 20210713 v1 - 4789949892-2 FCC MPE Report | RF Exposure Info | 208.65 KiB | July 29 2021 / August 02 2021 |
1 2 | User Manual 20210713 v1 - User Manual 1 | Users Manual | 3.74 MiB | July 29 2021 / August 02 2021 |
Face Recognition Access Controller
User’s Manual
User’s Manual
V1.0.0
Foreword
General
Safety Instructions
This manual introduces the installation and detailed operations of the face recognition access
controller (hereinafter referred to as "access controller").
This manual applies to model G and model J access controllers. Figures of model G access
controllers are demonstrated in the manual for example.
The following categorized signal words with defined meaning might appear in the manual.
Signal Words
Meaning
Indicates a high potential hazard which, if not avoided, will result in
DANGER
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
WARNING
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or unpredictable
CAUTION
result.
TIPS
NOTE
Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and supplement to
the text.
Revision History
About the Manual
Version
V1.0.0
Revision Content
First Release.
Release Date
May 2021
The manual is for reference only. If there is inconsistency between the manual and the
actual product, the actual product shall prevail.
We are not liable for any loss caused by the operations that do not comply with the
manual.
The manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our official
website. If there is inconsistency between paper manual and the electronic version, the
electronic version shall prevail.
All the designs and software are subject to change without prior written notice. The
I
product updates might cause some differences between the actual product and the
manual. Please contact the customer service for the latest program and supplementary
documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
II
Important Safeguards and Warnings
This chapter describes the contents covering proper handling of the access controller, hazard
prevention, and prevention of property damage. Read these contents carefully before using the
access controller, comply with them when using, and keep them well for future reference.
Operation Requirement
Do not place or install the access controller in a place exposed to sunlight or near the heat
source.
Keep the access controller away from dampness, dust or soot.
Keep the access controller installed horizontally on the stable place to prevent it from
falling.
Do not drop or splash liquid onto the access controller, and make sure there is no object
filled with liquid on the access controller to prevent liquid from flowing into the access
controller.
Install the access controller in a well-ventilated place, and do not block the ventilation of
the access controller.
Operate the access controller within the rated range of power input and output.
Do not dissemble the access controller randomly.
Transport, use and store the access controller under the allowed humidity and temperature
conditions.
When used in outdoors with high temperature, do not directly touch the surface of the
access controller, such as the screen, metal back shell, and fingerprint sensor.
Electrical Safety
Improper battery use might result in fire, explosion, or inflammation.
When replacing battery, make sure the same model is used.
Use the recommended power cables in the region and conform to the rated power
specification.
Use the power adapter provided with the access controller; otherwise, it might result in
people injury and damage of the access controller.
Use a power supply that meets ES1 but does not exceed PS2 limits defined in IEC 62368-1.
For specific power supply requirements, refer to labels on the access controller.
Connect the access controller (I-type structure) to the power socket with protective
earthing.
The appliance coupler is a disconnection device. When using the coupler, keep the angle
for easy operation.
III
Table of Contents
Foreword..................................................................................................................................................... I
Important Safeguards and Warnings..................................................................................................... III
1 Overview ................................................................................................................................................. 1
Introduction ...................................................................................................................................................................... 1
Features .............................................................................................................................................................................. 1
Application ........................................................................................................................................................................ 1
2 System Operations ................................................................................................................................. 3
Basic Configuration Procedure .................................................................................................................................. 3
Common Icons ................................................................................................................................................................. 3
Initialization ....................................................................................................................................................................... 4
Standby Interface ............................................................................................................................................................ 4
Main Menu ........................................................................................................................................................................ 6
Unlocking Methods ....................................................................................................................................................... 7
2.6.1 Cards ....................................................................................................................................................................... 7
2.6.2 Face .......................................................................................................................................................................... 7
2.6.3 Fingerprints .......................................................................................................................................................... 7
2.6.4 User Password ..................................................................................................................................................... 8
2.6.5 Administrator Password ................................................................................................................................... 8
User Management .......................................................................................................................................................... 8
2.7.1 Adding New Users ............................................................................................................................................. 8
2.7.2 Viewing User information ............................................................................................................................. 10
Access Management ................................................................................................................................................... 10
2.8.1 Period Management ....................................................................................................................................... 11
2.8.2 Unlock ................................................................................................................................................................... 12
2.8.3 Alarm Configuration ....................................................................................................................................... 14
2.8.4 Door Status ......................................................................................................................................................... 15
2.8.5 Lock Holding Time ........................................................................................................................................... 15
Attendance ...................................................................................................................................................................... 15
Network Communication ........................................................................................................................................ 16
2.10.1 IP Configuration ............................................................................................................................................. 16
2.10.2 Active Register ................................................................................................................................................ 17
2.10.3 Wi-Fi ................................................................................................................................................................... 18
2.10.4 Serial Port Settings ........................................................................................................................................ 18
2.10.5 Wiegand Configuration ............................................................................................................................... 19
System ............................................................................................................................................................................ 20
2.11.1 Time .................................................................................................................................................................... 20
2.11.2 Face Parameter ............................................................................................................................................... 20
2.11.3 Image Mode .................................................................................................................................................... 23
2.11.4 Volume ............................................................................................................................................................... 23
2.11.5 Language .......................................................................................................................................................... 23
2.11.6 Infrared Light ................................................................................................................................................... 23
2.11.7 Screen Settings ............................................................................................................................................... 24
2.11.8 Restore to Factory Settings ........................................................................................................................ 24
IV
2.11.9 Reboot ............................................................................................................................................................... 24
USB................................................................................................................................................................................... 24
2.12.1 USB Export ....................................................................................................................................................... 25
2.12.2 USB Import ....................................................................................................................................................... 25
2.12.3 USB Update ...................................................................................................................................................... 26
Features .......................................................................................................................................................................... 26
2.13.1 Privacy Setting ................................................................................................................................................ 28
2.13.2 Result Feedback ............................................................................................................................................. 29
Record ............................................................................................................................................................................. 32
System Info ................................................................................................................................................................... 32
3 Web Operations ................................................................................................................................... 33
Initialization ..................................................................................................................................................................... 33
Login .................................................................................................................................................................................. 35
Resetting the Password .............................................................................................................................................. 35
Door Parameter ............................................................................................................................................................. 37
Alarm Linkage ................................................................................................................................................................ 39
3.5.1 Setting Alarm Linkage .................................................................................................................................... 39
3.5.2 Alarm Log ............................................................................................................................................................ 40
Talkback Setting ............................................................................................................................................................ 41
3.6.1 SIP Server ............................................................................................................................................................ 41
3.6.2 Local Configuration ......................................................................................................................................... 43
3.6.3 VTO Number Management .......................................................................................................................... 45
3.6.4 VTH Number Management .......................................................................................................................... 46
3.6.5 VTS Management ............................................................................................................................................ 48
3.6.6 Online Status ...................................................................................................................................................... 49
3.6.7 Call Logs .............................................................................................................................................................. 50
Time Section ................................................................................................................................................................... 51
3.7.1 Configuring Time Section ............................................................................................................................. 51
3.7.2 Configuring Holiday Group .......................................................................................................................... 51
3.7.3 Configuring Holiday Group .......................................................................................................................... 52
Data Capacity ................................................................................................................................................................. 53
Video Setting .................................................................................................................................................................. 53
3.9.1 Data Rate ............................................................................................................................................................. 53
3.9.2 Image .................................................................................................................................................................... 54
3.9.3 Exposure .............................................................................................................................................................. 56
3.9.4 Motion Detection ............................................................................................................................................. 57
3.9.5 Volume Setting.................................................................................................................................................. 59
3.9.6 Image Mode ....................................................................................................................................................... 59
3.9.7 Local Coding ...................................................................................................................................................... 60
Face Detection ............................................................................................................................................................. 60
Network Setting .......................................................................................................................................................... 63
3.11.1 TCP/IP ................................................................................................................................................................. 63
3.11.2 Port ...................................................................................................................................................................... 65
3.11.3 Register .............................................................................................................................................................. 66
3.11.4 P2P ...................................................................................................................................................................... 66
Safety Management .................................................................................................................................................. 67
3.12.1 IP Authority ...................................................................................................................................................... 67
V
3.12.2 Systems .............................................................................................................................................................. 68
User Management ..................................................................................................................................................... 69
3.13.1 Adding Users ................................................................................................................................................... 70
3.13.2 Modifying User Information ...................................................................................................................... 70
3.13.3 ONVIF User ...................................................................................................................................................... 70
Maintenance................................................................................................................................................................. 71
Configuration Management .................................................................................................................................. 71
3.15.1 Exporting Configuration File ..................................................................................................................... 71
3.15.2 Importing Configuration File .................................................................................................................... 72
3.15.3 Default ............................................................................................................................................................... 72
Upgrade ......................................................................................................................................................................... 72
Version Information ................................................................................................................................................... 73
Online User ................................................................................................................................................................... 73
System Log.................................................................................................................................................................... 73
3.19.1 System Logs ..................................................................................................................................................... 73
3.19.2 Admin Log ........................................................................................................................................................ 74
3.19.3 Unlock Records ............................................................................................................................................... 74
Fusion Calibration ...................................................................................................................................................... 75
Advanced ....................................................................................................................................................................... 76
Exit .................................................................................................................................................................................... 76
4 SmartPSS AC Configuration ............................................................................................................... 77
Login .................................................................................................................................................................................. 77
Adding Devices .............................................................................................................................................................. 77
4.2.1 Auto Search ........................................................................................................................................................ 77
4.2.2 Manual Add ........................................................................................................................................................ 78
User Management ........................................................................................................................................................ 79
4.3.1 Card Type Setting ............................................................................................................................................. 79
4.3.2 Adding User ....................................................................................................................................................... 80
4.3.3 Issuing Card in Batches .................................................................................................................................. 86
4.3.4 Exporting User Information ......................................................................................................................... 87
Permission Configuration .......................................................................................................................................... 87
4.4.1 Adding Permission Group ............................................................................................................................. 87
4.4.2 Configuring Permission ................................................................................................................................. 89
Access Management ................................................................................................................................................... 90
4.5.1 Remotely Opening and Closing Door ...................................................................................................... 90
4.5.2 Setting Always Open and Always Close .................................................................................................. 91
4.5.3 Resetting Door Status..................................................................................................................................... 91
Attendance Management .......................................................................................................................................... 92
4.6.1 Report Search .................................................................................................................................................... 92
4.6.2 Other Configurations ...................................................................................................................................... 93
5 FAQ ........................................................................................................................................................ 94
Notes of Face Recording/Comparison ............................................................................. 95
Cybersecurity Recommendations ..................................................................................... 98
VI
1 Overview
The access controller is an access control panel that supports unlock through faces, passwords,
cards, and supports unlock through their combinations.
Introduction
Features
LCD display, the resolution of 4.3-inch access controller is 480 × 272.
Supports face unlock, IC card unlock, fingerprint unlock, and password unlock; unlock by
period.
With a face detection box, the largest face among faces that appear at the same time is
recognized first; the maximum face size can be configured on the web interface.
2MP wide-angle WDR lens; with auto/manual illuminator.
Face recognition distance is 0.3 m–1.5 m.
With face recognition algorithm, the access controller can recognize more than 360
positions on human face.
Face verification accuracy > 99.5%; low false recognition rate.
Supports profile recognition; the profile angle is 0°–90°.
Supports liveness detection.
Supports duress alarm, tamper alarm, intrusion alarm, door contact timeout alarm, illegal
card exceeding threshold alarm, illegal password exceeding threshold alarm and external
alarm.
Supports general users, patrol users, blocklist users, VIP users, guest users, other users, and
custom users.
Various unlock status display modes to protect user privacy.
Supports body temperature monitoring.
Application
The access controller is applicable for parks, office buildings, schools, factories, residential areas
and other places. The identity is verified through face recognition to achieve passage without
perception.
1
Networking
2
2 System Operations
Basic Configuration Procedure
Basic configuration procedure
Common Icons
Icon
Description
Confirm icon.
Table 2-1 Icon description
Turn to the first page of the list.
Turn to the last page of the list.
Turn to the previous page of the list.
Turn to the next page of the list.
Return to the previous menu.
Enable.
Disable.
Turn to previous page.
Turn to next page.
3
Initialization
Administrator password and an email should be set the first time the access controller is turned
on or after reset; otherwise the access controller cannot be used.
Initialization
Administrator and password set on this interface are used to log in to the web
management platform.
The administrator password can be reset through the email address you entered if the
administrator forgets the password.
The password must consist of 8 to 32 non-blank characters and contain at least two types
of characters among upper case, lower case, number, and special character (excluding ' " ; :
&).
Standby Interface
You can unlock the door through faces, fingerprints, passwords and cards.
The unlock methods might vary with different models.
If there are no operations in 30 seconds, the access controller will go to the standby mode.
The standby interfaces shown in this section are for reference only, and might differ from
the actual ones.
4
Standby interface of model J
Standby interface of model G
Table 2-2 Homepage description
Unlock methods: Card, face, fingerprint and password.
No. Description
1
When card, face, fingerprint and password are all set as unlock mode, the password icon
will not be displayed at the top left corner of the access controller.
2
Date & Time. Displays the current date and time.
5
No. Description
3
4
5
6
7
8
Display the network status and USB status.
Face recognition area.
Password unlock icon.
Administrator password unlock icon.
Tap to call other devices.
Card swiping area.
Main Menu
Administrators can add users of different levels, set access-related parameters, do network
configuration, view access records and system information, and more in the main menu.
On the standby interface, long press 3 s to go to the Administrator Login interface.
Select a main menu entering method.
Different modes support different unlock methods, and the actual interface shall
prevail.
Administrator login
6
Main menu
Unlocking Methods
You can unlock the door through faces, passwords, fingerprint and cards.
2.6.1 Cards
2.6.2 Face
Put the card at the card swiping area to unlock the door.
2.6.3 Fingerprints
Place your fingerprint at the fingerprint sensor to unlock the door.
Only certain models support this function.
7
Make sure that your face is centered on the face recognition frame, and then you can unlock
the door.
2.6.4 User Password
Enter the user password, and then you can unlock the door.
Tap
on the homepage.
Tap PWD Unlock.
Enter the user ID and password, and then tap
.
The door is unlocked.
2.6.5 Administrator Password
Enter the administrator password, and then you can unlock the door. There is only one
administrator password for one access controller. The administrator password can unlock the
door without being subject to user levels, unlock modes, periods, holiday plans, and
anti-passback.
Administrator password cannot be used when NC is selected at "2.8.1.5 NC Period."
Tap
on the homepage.
Tap Admin PWD.
Enter the administrator password, and then tap
.
The door is unlocked.
User Management
You can add new users, view user lists, admin lists, and modify the administrator password on
the User interface.
2.7.1 Adding New Users
You can add new users by entering user IDs, names, face images, cards, passwords, selecting
user levels, and more.
The following figures are for reference only, and the actual interface shall prevail.
Log in to the Main Menu interface.
Select User > New User.
8
New User Info
Configure parameters on the interface.
Table 2-3 New user parameter description
Parameter Description
User ID
Face
Enter user IDs. The IDs can be numbers, letters, and their combinations, and the
maximum length of the ID is 32 characters. Each ID is unique.
Name
Enter names with at most 32 characters (including numbers, symbols, and letters).
Make sure that your face is centered on the picture capturing frame and the access
controller will take a picture of the new user’s face automatically.
You can register five cards at most for each user. On the card registration interface,
enter your card number or swipe your card, and then the card information will be
read by the access controller.
Card
You can enable the Duress Card function on the card registration interface. Alarms
will be triggered if a duress card is used to unlock the door.
PWD
Only certain models support card unlock.
The door unlocking password. The maximum length of the password is 8 digits.
If the access controller is without touch screen, you need to connect the access
controller to a peripheral card reader. There are buttons on the card reader.
9
Parameter Description
You can select a user level for new users. There are two options:
User: Users only have door unlock permission.
Admin: Administrators can unlock the door and also have parameter
User Level
configuration permission.
No matter whether there is an administrator in the access controller,
administrator identity authentication is needed.
You can set a period in which the user can unlock the door. "See 3.7 Time Section"
Period
for details.
Plan
Section" for details.
There are six levels:
Holiday
You can set a holiday plan in which the user can unlock the door. "See 3.7 Time
Valid Date
You can set a period during which the unlocking information of the user is valid.
User Level
General: General users can unlock the door normally.
Blocklist: Users in the blocklist do not have unlock permission. When they
try to unlock the door, the access controller will prompt that this is a
blocklist user.
Guest: Guests are allowed to unlock the door certain times. Once they
exceed the maximum times, they cannot unlock the door again.
Patrol: Paroling users can get their attendance tracked, but they have no
unlock permission.
VIP: When VIP unlocks the door, service personnel will get a prompt.
Other: When special people unlock the door, there will be a delay of 5
seconds before the door is closed.
Custom User 1: Reserved for customization. Users can unlock the door
Custom User 2: Reserved for customization. Users can unlock the door
normally.
normally.
Use Time
When the user level is Guest, you can set the maximum number of times that
the user can unlock the door.
Tap
to save the configuration.
2.7.2 Viewing User information
You can view user list, admin list and enable administrator password through the User interface.
Access Management
You can do access management on period, unlock mode, alarm, door status, and lock holding
time.
Tap Access to go to the access management interface.
10
2.8.1 Period Management
You can set periods, holiday periods, holiday plan periods, door normally on periods, door
normally closed periods, and remote verification periods.
2.8.1.1 Period Config
2.8.1.2 Holiday Group
For model G access controllers, you can configure periods locally; for model J access controllers,
you can configure periods through web interface.
You can configure 128 periods (weeks) whose number range is 0–127. You can set four periods
on each day of a period (week). Users can only unlock the door in the periods that you set.
For model G access controllers, you can configure holiday groups locally; for model J access
controllers, you can configure holiday groups through web interface.
You can set group holidays, and then you can set plans for holiday groups. You can configure
128 groups whose number range is 0–127. You can add 16 holidays into a group. Configure the
start time and end time of a holiday group, and then users can only unlock the door in the
periods that you set.
You can enter names with 32 characters (including numbers, symbols, and letters). Tap
to
save the holiday group name.
2.8.1.3 Holiday Plan
For model G access controllers, you can configure holiday plans locally; for model J access
controllers, you can configure holiday plans through web interface.
You can add holiday groups into holiday plans. You can use holiday plans to manage user
access permission in different holiday groups. Users can only unlock the door in the period that
you set.
2.8.1.4 NO Period
If a period is added to the NO period, then the door is normally open in that period.
The NO/NC period permissions are higher than permissions in other periods.
11
2.8.1.5 NC Period
If a period is added to the NC period, then the door is normally closed in that period. Users can
not unlock the door in this period.
2.8.1.6 Remote Verification Period
If you configured the remote verification period, then when unlock doors during the period you
configured, remote verification is required. To unlock the door in this period, a door unlock
instruction sent by the management platform is needed.
You need to enable Remote Verification Period.
means enabled.
means not enabled.
2.8.2 Unlock
2.8.2.1 Unlock Mode
There are two unlock modes: unlock mode and temperature monitoring mode. The unlock
modes described in this section are for reference only, and might vary with the model.
When the Unlock Mode is on, users can unlock through cards, faces, fingerprints, passwords, or
any one of all the unlocking methods.
Log in to the Main Menu interface.
Select Access > Unlock Mode > Unlock Mode.
12
Element (multiple choice)
Select one or more unlock methods.
The unlock methods displayed in the figure above are for reference only, and
might vary with different models.
Tap a selected unlock method again to deselect it.
Select a combination mode.
+ And: For example, if you select card + PWD, you need to swipe your card first,
and then enter the password to unlock the door.
/ Or: For example, if you select card/PWD, you can swipe your card or enter the
password to unlock the door.
Tap
to save the settings.
Enable Unlock Mode.
means enabled.
means not enabled.
2.8.2.2 Temperature Monitoring Mode
The access controller will unlock the door when your temperature is normal.
Log in to the Main Menu interface.
Select Access > Unlock Mode, and then enable Temp Monitoring Mode Only.
13
2.8.3 Alarm Configuration
Administrators can manage visitors’ unlock permission through alarm configuration.
Log in to the Main Menu interface.
Select Access > Alarm.
Alarm
means enabled.
means disabled.
Table 2-4 Parameters on the alarm interface
Parameter
Description
After the anti-passback is enabled, users need to verify identities both for
entry and exit; otherwise an alarm will be triggered.
If a person enters with the identity checked and exits without the
identity checked, an alarm will be triggered when the person tries to
enter again and the person will have no permission to unlock the door
any more.
If a person enters without the identity checked, an alarm will be
triggered when the person tries to exit with the identity checked, and
the person will have no permission to unlock the door any more.
An alarm will be triggered when a duress card or duress password is used to
unlock the door.
door contact released.
An intrusion alarm will be triggered if a door is unlocked without having the
A timeout alarm will be triggered if the time that a user takes to unlock the
door exceeds the Door Sensor Timeout time.
The Door Sensor Timeout time range is 1–9999 seconds.
Door Sensor On
Only when the Door Sensor On is enabled can the intrusion alarm and door
sensor timeout alarm be triggered.
Anti-passback
Duress
Intrusion
Door Sensor
Timeout
14
2.8.4 Door Status
There are three options: NO, NC, and Normal.
NO: If NO is selected, the door status is normally open, which means the door will never be
NC: If NC is selected, the door status is normally closed, which means the door will not be
Normal: If Normal is selected, the door will be unlocked and locked depending on your
closed.
unlocked.
settings.
2.8.5 Lock Holding Time
Lock Holding Time is the duration in which the lock is unlocked. If the lock has been unlocked
for a period that exceeds the duration, the lock will be automatically locked.
Attendance
You can enable attendance and configure the attendance mode as needed.
This function needs to work with a platform. For details, see corresponding user's manual.
Log in to the Main Menu interface.
Tap Attendance, and then tap
to enable attendance.
Attendance
Tap Mode Set to set an attendance mode and the time for different attendance
statuses.
Auto/Manual Mode: Displays the attendance status according to the time you
check in or out. If the time you check in or out is not defined, you can tap
Attendance Events and select an attendance status as needed.
Auto Mode: Displays the attendance status according to the time you check in or
out.
Manual Mode: You need to manually select an attendance status when you check
in or out.
Fixed Mode: The attendance status is fixed when you punch in or out on the
standby interface.
15
Attendance status
16
For the six statuses, you can define them as needed, such as Check In for the start
of a work day and Break Out for the start of lunch break.
Network Communication
To make the access controller work normally, you need to configure parameters for network,
serial ports and Wiegand ports.
2.10.1 IP Configuration
Configure an IP address for the access controller to make it be connected to the network.
Log in to the Main Menu interface.
Select Connection > Network > IP Address, and then configure IP address
parameters.
IP address configuration
Parameter
Description
Table 2-5 IP configuration parameters
IP Address/Subnet
Mask/Gateway IP
Address
The IP address, subnet mask, and gateway IP address should be on the
same network segment. After configuration, tap
to save the
configurations.
DHCP (Dynamic Host Configuration Protocol).
When the DHCP is enabled, the IP address can be automatically acquired,
and the IP address, subnet mask and gateway IP address cannot be
manually configured.
P2P is a private network traversal technology which enables user to
manage devices without requiring DDNS, port mapping or transit server.
Make sure that the computer used to log in to the web interface is in the same LAN with the
access controller.
2.10.2 Active Register
By active registering, you can connect the access controller to the management platform, and
then you can manage the access controller through the management platform.
Configurations you have made can be cleared on the managing platform, and the access
controller can be initialized, you need to protect the platform managing permission in case of
data loss caused by improper operation.
Log in to the Main Menu interface.
Select Connection > Network >Active Register.
Tap
to enable active register, and then configure parameters.
DHCP
P2P
Table 2-6 Active register
17
Name
Parameter
Server IP Address
IP address of the managing platform.
Port
Device ID
Port number of the managing platform.
Subordinate device number on the managing platform.
2.10.3 Wi-Fi
You can connect the access controller to the network through Wi-Fi if the access controller has
Wi-Fi function.
Log in to the Main Menu interface.
Select Connection > Network >WiFi.
Tap
to enable Wi-Fi.
Tap
, select a network, and then enter the password.
You can see the information of the network in the following interface.
Wi-Fi
2.10.4 Serial Port Settings
Select serial input or serial output according to the use of the external devices.
Log in to the Main Menu interface.
Select Connection > Serial Port.
Serial port
18
Select Serial Input when external devices that are with card reading and writing functions
are connected to the access controller. Serial Input is selected to enable access card
information to be sent to the access controller and the management platform.
For access controllers with face recognition, card reading and writing functions, if you
select Serial Output, access controller will send lock/unlock information to other access
controllers. There are two types of lock/unlock information: User ID and card number.
Select OSDP Input when card reader of OSDP protocol is connected to the access controller.
The access controller can send card information to the management platform.
2.10.5 Wiegand Configuration
Only model J access controllers support this function.
Select Wiegand Input or Wiegand Output accordingly.
Log in to the Main Menu interface.
Select Connection > Wiegand.
Wiegand
Select Wiegand Input when an external card swipe mechanism is connected to the access
controller.
Select Wiegand Output when the access controller works as a reader that can be
connected to other controllers. See Table 2-7.
Parameter
Description
Table 2-7 Wiegand output
Wiegand Output Type
Pulse Width
Pulse Interval
Output Data Type
The Wiegand Output Type determines the card number or the digit of
the number that can be recognized by the access controller.
Wiegand26, three bytes, six digits.
Wiegand34, four bytes, eight digits.
Wiegand66, eight bytes, sixteen digits.
Set the valur as needed.
User ID: If User ID is selected, and then user ID will be output.
Card No.: If Card No. is selected, and then card number will be
output.
19
System
2.11.1 Time
You can do date format setting, date setting, time setting, DST setting, NTP check, and time
zone settings.
Log in to the Main Menu interface.
Select System > Time, and then configure time parameters.
Time
When you select Network Time Protocol (NTP), you need to enable the NTP Check
function first. Server IP Address: enter the IP address of the time server, time of the access
controller will be synchronized with the time server.
Port: Enter the port number of the time server.
Interval (min): NPT check interval. Tap the save icon to save.
2.11.2 Face Parameter
Log in to the Main Menu interface.
Select System > Face Parameter.
20
Face parameter
Tap a parameter and do configuration, and then tap
.
Parameter
Description
Table 2-8 Face parameters
Face Threshold
Max. Angle of Face
Face recognition accuracy can be adjusted. The larger the value is, the
higher the accuracy will be.
Set the control panel shooting angle of profiles. The larger the value is,
the wider range of the profiles will be recognized.
Pupillary distance is the pixel value of the image between the centers of
the pupils in each eye. You need to set an appropriate value so that the
access controller can recognize faces as needed. The value changes
The closer the face is to the lens, the greater the value should be. If an
adult is 1.5 meters away from the lens, the pupillary distance value can
be within 50 to 70.
Pupillary Distance
according to the face sizes and the distance between faces and the lens.
Recognition Timeout
The interval of the prompt during valid face recognition.
Invalid Face Prompt
For a face has no access permission, the controller will prompt that the
Interval (S)
face is invalid. The prompt interval is invalid face prompt interval.
Anti-fake Threshold
This function prevents people from unlocking by face images or models.
Temp Parameters
Temperature Monitoring: Enable or disable this function.
Temp Rect: Set whether to display the temperature monitoring
box or not.
Temp Monitoring Distance (cm): 50 by default. You must
monitor your temperature standing away from the access
controller at the distance you define.
Only certain models support this parameter.
21
Parameter
Description
Temp Correction Duration
(ms): When monitoring
the
temperature, the access controller will take the temperature value
after the time defined by this parameter.
Only certain models support this parameter.
High Temp Threshold: Set the temperature threshold. The
monitored body temperature will be judged as high temperature
if it is greater than or equal to the set value.
Only certain models support this parameter.
Max/Min temperature: Set the temperature range you need. If
the monitored temperature is lower than the lower limit, it will
prompt that the temperature is too low; if higher than the upper
limit, it will prompt that there is a heat source interfering with
the function.
Temp Correction Value: This parameter is for testing. The
difference of the temperature monitoring environment might
cause the temperature deviation between the monitored
temperature and the actual temperature. You can select multiple
monitored samples for testing, and then correct the temperature
deviation by this parameter according to the comparison
between the monitored temperature and the actual temperature.
For example, if the monitored temperature is 0.5°C lower than
the actual temperature, the correction value is set to 0.5°C; if the
monitored temperature
is 0.5°C higher than the actual
temperature, the correction value is set to -0.5°C.
Temp Monitoring Mode:
Only certain models support this parameter.
Auto: Uses a face heat map for face recognition; if heat maps
are not found, it will automatically change to calibration mode.
Thermogram: Uses only a heat map for face recognition and
temperature monitoring.
Calibration: Uses a white light image of a face for face
recognition, and then extract and apply the coordinates on the
face heat map for temperature monitoring.
Temp Unit: Select ° C or ° F.
Evn Compensation Value: This value will be added to the
monitored environment temperature.
Only certain models support this parameter.
Temperature Strategy:
Only certain models support this parameter.
Maximum: Take the highest temperature as the result.
22
Parameter
Description
Average: Take the average temperature as the result.
this parameter.
Only the access controller with a temperature monitoring unit supports
No detect: Mask is not detected during face recognition.
Mask reminder: Mask is detected during face recognition. If the
person is detected without wearing a mask, the system will
prompt mask reminder and passage is allowed.
Mask intercept: Mask is detected during face recognition. If the
mask reminder and passage is not allowed.
Mask Recognition Threshold: When a mask is detected, this value
will be applied to face recognition. The higher the value, the higher
the precision requirements, and harder to recognize a person
wearing a mask.
Mask Parameters
person is detected without wearing a mask, the system will prompt
2.11.3 Image Mode
There are three options:
Indoor: Select Indoor when the access controller is installed indoors;
Outdoor: Select Outdoor when the access controller is installed outdoors;
Other: Select Other when the access controller is installed at places with backlights like
corridors and hallways.
2.11.4 Volume
2.11.5 Language
Tap
or
to adjust the volume.
The following languages are available: English, Italian, Spanish, Japanese, Russian, Turkish, Polish,
Korean, Arabic, Spanish (Latin America), and Thai.
2.11.6 Infrared Light
Tap
or
to adjust the infrared light brightness.
The larger the value is, the brighter the infrared light will be.
23
2.11.7 Screen Settings
You can set the screen saver time and screen off time.
Log in to the Main Menu interface.
Select System > Screen Settings.
Screen settings
2.11.8 Restore to Factory Settings
Data will be lost if you restore the access controller to the factory settings.
After the access controller is restored to the factory settings, IP address will not be
changed.
You can select whether to retained user information and logs.
You can select to restore the access controller to the factory settings with all user
information and device information deleted.
You can select to restore the access controller to the factory settings with user information
and device information retained.
Log in to the Main Menu interface.
Select System > Reboot, and the access controller will be rebooted.
2.11.9 Reboot
USB
Make sure that the USB is inserted to the access controller before exporting user
information and updating.
During exporting or updating, do not pull out the USB or operate the access controller;
otherwise the exporting or updating will fail.
Export information from one access controller to the USB, and then import it to another
access controller. Different models support different types of information, such as faces
and fingerprints.
24
USB can also be used to update the program.
2.12.1 USB Export
You can export data from the access controller to the USB after inserting the USB. The data
exported is encrypted and cannot be edited.
Log in to the Main Menu interface.
Select USB > USB Export.
USB export
Select the data type that you want to export.
Tap OK.
Only certain models support fingerprint.
The data will be saved in the USB.
2.12.2 USB Import
Only data in the USB that was exported from one access controller can be imported into
another access controller.
Log in to the Main Menu interface.
Select USB > USB Import.
25
USB Import
26
Select the data type that you want to import.
Tap OK.
Data in the USB flash drive will be imported into the access controller.
2.12.3 USB Update
USB flash drive can be used to update the system.
Rename the updating file name to "update.bin", and save the "update.bin" file in the
root directory of the USB flash drive.
Log in to the Main Menu interface.
Select USB > USB Update.
Tap OK.
The update starts, and the access controller restarts after the update is finished.
Features
You can do settings about privacies, card number reverse, security module, door sensor type,
and result feedback.
Log in to the Main Menu interface.
Tap Features.
Features
27
Table 2-9 Feature description
Parameter
Description
Privacy Setting
See "2.13.1 Privacy Setting" for details.
If the third-party card reader needs to be connected to the access
controller through the wiegand output port, you need to enable the card
Card No. Reverse
number reverse function; otherwise the communication between the
access controller and the third party card reader might fail due to
Security Module
protocol discrepancy.
If the security module is enabled, you need to purchase access
control security module separately. The security module needs
separate power supply to provide power.
Once the security module is enabled, the exit button, lock control
and firefighting linkage will be invalid.
Display a heat map at the upper-left corner.
Thermogram Display
Only certain models support this function.
External Reader Temp
Turn it on and the card reader will also monitor the temperature of a
person.
Monitoring
Door Sensor
Result Feedback
NO for normally open or NC for normally closed.
Select a result feedback mode during unlock. See "2.13.2 Result
Feedback".
2.13.1 Privacy Setting
Privacy setting
Parameter
Description
Table 2-10 Privacy setting
PWD Reset
If the PWD Reset Enable function is enabled, you can reset the password.
Enable
The PWD Reset function is enabled by default.
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure
communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI commands;
HTTPS
otherwise HTTP will be used.
default.
When HTTPS is enabled, the access controller will restart automatically.
Common Gateway Interface (CGI) offers a standard protocol for web servers to
execute programs similarly to console applications running on a server that
CGI
dynamically generates web pages.
When CGI is enabled, CGI commands can be used. The CGI is enabled by
SSH
Capture
Photos
Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network.
When SSH is enabled, SSH provides cryptographic service for the data
transmission.
If you select ON, when a user unlocks the door, the user’s photo will be
automatically taken. This function is ON by default.
28
Parameter
Description
Enable this mode to display the temperature of the blackbody on the standby
interface. You can correct the temperature of the blackbody accordingly.
Only certain models support this function.
When this mode is enabled, the door cannot be opened by any method.
If enabled, temperature will be displayed in unlock results.
Debug Mode
Temperature
Display
Clear Captured
Photos
Delete all captured photos.
Face Privacy
If enabled, the standby interface will be covered in mosaic.
2.13.2 Result Feedback
Photos&Name Mode
There are 4 result feedback modes: Success/Failure, Only Name, Photo&Name, and
Photos&Name.
You can select a result feedback mode as needed.
The captured face image, the image saved in the face database, user ID, user name and time are
all displayed during unlock.
Photos and name mode (1)
29
Photo&Name Mode
The image saved in the face database, user ID, user name and time are all displayed during
unlock.
Photo and name mode (2)
Only Name Mode
Only user ID, user name and time are displayed during unlock.
30
Success/Failure Mode
Only display success or failure during unlock.
Success/Failure mode
Only name mode
31
Record
You can query all unlocking records.
Search punch records
System Info
You can view data capacity, device version, and firmware information of the access controller on
the System Info interface.
Log in to the Main Menu interface.
Tap System Info.
System info
32
3 Web Operations
The access controller can be configured and operated on the web. Through the web you can set
network parameters, video parameters, and access controller parameters; and you can also
maintain and update the system.
Initialization
You need to set a password and an email address before logging in to the web for the first time.
Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of
the access controller in the address bar, and then press Enter.
Use browser newer than IE 8, otherwise you might not log in to the web.
Make sure that the computer used to log in to the web is in the same LAN with the
access controller.
Initialization
Enter the new password, confirm password, enter an email address, and then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least
two types of characters among upper case, lower case, number, and special
character (excluding ' " ; : &). Set a password of high security level according to
the password strength prompt.
For security, keep the password properly after initialization and change the
password regularly.
When you need to reset the administrator password by scanning the QR code,
you need an email address to receive the security code.
33
Click Next.
Auto check
You can decide whether to select Auto Check or not.
Click Next.
It is recommended that Auto Check be selected to get the latest program in time.
Finished configuration
Click Complete, and the initialization is completed.
34
Login
and press Enter.
Open IE web browser, enter the IP address of the access controller in the address bar,
Use browser newer than IE 8, otherwise you might not log in to the web.
Make sure that the computer used to log in to the web is in the same LAN with the
access controller.
The default IP address is 192.168.1.108.
Login
Enter the user name and password.
Click Login.
The default administrator name is admin, and the password is the login password
after initializing the access controller. Change the administrator password regularly
and keep it properly.
If you forget the administrator login password, you can click Forget Password? to
reset it. See "3.3 Resetting the Password."
Resetting the Password
When resetting the password of the admin account, your email address will be needed.
Click Forgot password? on the login interface.
35
Tips
Read the tips.
Click OK.
Reset Password
Scan the QR code on the interface, and you will get the security code.
At most two security codes will be generated by scanning the same QR code. If
security codes become invalid, to get more security codes, refresh the QR code.
You need to send the content you get after you scanned the QR code to the
designated email address, and then you will get the security code.
36
Please use the security code within 24 hours after you receive it. Otherwise, it will
become invalid.
If wrong security codes are entered for consecutive five times, the administrator
will be frozen for five minutes.
Enter the security code you have received.
Click Next.
Reset and confirm the new password.
The password should consist of 8 to 32 non-blank characters and contain at least two
types of characters among upper case, lower case, number, and special character
(excluding ' " ; : &).
Click OK, and the reset is completed.
Door Parameter
Configure the access control parameters.
Log in to the web interface.
Select Door Parameter.
Door parameters
Configure Opening Method.
Time section
1) Click
.
Time section parameter
37
2) Configure the time and opening method for a time section. You can configure
up to four time sections for each day.
3) (Optional) Select Apply to the whole week to copy the configuration to other
days.
4) Click OK
Multi-person
1) Click
, and then click Add.
Multi-person parameter
2) Select an opening method, and enter a number for valid user.
3)
In the User List section, enter the ID of the users as needed. For user ID, see
"2.7 User Management".
VIP, patrol, and blocklist users cannot be added.
All the users in different groups must all verify their identities in the group
order to unlock the door.
Unlock mode
1) Select the unlock method(s) in Element (Multiple Choice).
Unlock mode parameters
2) Select Or or And. Or means you must use all the defined methods to open the
door; And means you can open the door with any of the defined methods.
3) Select the unlock methods for Element (Multiple Choice).
Configure other parameters.
38
Parameter
Description
Table 3-1 Parameter description
Enter a name for the door that this access controller controls.
Select NC for normally closed, or NO for normally open. If either is selected,
the defined opening method will not be effective.
See Step 3 above.
Hold Time (Sec.) Unlock duration. If expired, the door will be locked.
The door will be always open or closed.
A timeout alarm will be triggered if the door stays unlock for longer than
this value.
Name
State
Opening
Method
Normally Open
Time
Time
Normally Close
Timeout (Sec.)
Duress Alarm
Door Sensor
Intrusion Alarm
Overtime Alarm
Anti-passback
Alarm
Click OK.
See Table 2-4.
Alarm Linkage
3.5.1 Setting Alarm Linkage
Alarm input devices can be connected to the access controller, and you can modify the alarm
linkage parameter as needed.
Log in to the web interface.
Select Alarm Linkage > Alarm Linkage.
Alarm linkage
Click
to modify the alarm linkage parameters.
39
Change alarm linkage parameters
Table 3-2 Alarm linkage parameter description
You cannot modify the value. Keep it default.
Description
Enter a zone name.
Parameter
Alarm Input
Name
Alarm Input Type
If alarm input type of the alarm device you purchased is NO, then you
should select NO; otherwise you should select NC.
If fire link is enabled the access controller will output alarms when fire
alarms are triggered. The alarm details will be displayed in the alarm
log.
Fire Link Enable
Alarm intput and access link are NO by default if fire link is enabled.
Access Link Enable
If enabled, the access controller will be normally on or normally closed
when there are input alarm signals.
Channel Type
There are two options: NO and NC.
Click OK, and then the configuration is completed.
The configuration on the web will be synchronized with the configuration in the client if
the access controller is added to a client.
3.5.2 Alarm Log
You can view the alarm type and time range in the Alarm Log interface.
Log in to the web interface.
Select Alarm Linkage > Alarm Log.
40
Alarm log
Select a time range and alarm type, and then click Query.
The query results are displayed.
Query results
Talkback Setting
The access controller can work as a door station (VTO) and call other devices.
3.6.1 SIP Server
On the web, you can add door stations and indoor stations to the SIP server so that they can
talk to each other. The SIP server can be the access controller or other door stations.
When the access controller works as the SIP server, it can connect up to 50 other access
controllers and indoor monitors (VTH) combined.
3.6.1.1 Access Controller as SIP Server
Log in to the web interface.
41
Select Talkback Setting > SIP Server.
Enable SIP Server, and then click OK.
The access controller will restart.
SIP server (1)
3.6.1.2 Other Device as SIP Server
Log in to the web interface.
Select Talkback Setting > SIP Server.
Disable SIP Serve, and then set Server Type to VTO.
Configure the parameters
42
SIP server (2)
Table 3-3 SIP server parameter description (1)
IP Address
The IP address of the VTO working as the SIP server.
Parameter Description
Port
5060 by default.
Keep the default values.
Must be VDP.
Username
Password
SIP
Domain
SIP Server
Username
SIP Server
Password
Click OK.
SIP server login username and password.
3.6.2 Local Configuration
Set the device type and number.
3.6.2.1 Access Controller as SIP Server
Log in to the web interface.
Select Talkback Setting > Local.
43
Configure the parameters.
Local (1)
Table 3-4 Parameter description
Parameter
Description
Device Type
The access controller can only work as a unit VTO.
Centre Call
No.
VTO No.
Group Call
Enter a number for the management center. It can contain up tp nine digits.
Cannot be configured when the access controller is working as the SIP
server.
When enabled, all sub VTHs will also receive the call when the access
controller is calling a main VTH.
This function is only available when the access controller is working as the
SIP server.
Mode1: Real-time call but the video and sound may be lagging with
Transmission
Mode
poor network.
Click Confirm.
Mode2: Not real-time call but ensures smooth video and sound.
3.6.2.2 Other Device as SIP Server
Log in to the web interface.
Select Talkback Setting > Local.
Configure the parameters.
Local (2)
Parameter
Description
Table 3-5 Parameter description
Device Type
Centre Call No.
The access controller can work as a unit door station or fence
station.
Enter a number for the management center. It can contain up tp
nine digits.
44
Parameter
VTO No.
Description
Set a number.
poor network.
sound.
It should be four digits. The first two should be 80 and the
last two starts with 01, such as 8001.
If there are multiple VTOs, their VTO numbers cannot be the
same.
Mode1: Real-time call but the video and sound may lag with
Transmission Mode
Mode2: Not real-time call but ensures smooth video and
3.6.3 VTO Number Management
When the access controller works as the SIP server, add other VTOs to call them.
Log in to the web interface.
Select Talkback Setting > VTO No. Management.
Click Add.
VTO No. management
Configure the parameters.
45
Add a door station
Table 3-6 Parameter description
Description
Enter a number for the VTO you want to add.
Register Password
Keep it default.
Cannot be configured.
Parameter
Rec No.
Build No.
Unit No.
IP Address
Username
Password
Click OK.
IP address of the VTO you want to add.
Web interface login username and password of the VTO you want to
add.
3.6.4 VTH Number Management
When the access controller works as the SIP server, add VTHs to call them.
When there are main and sub VTHs, you need to enable group call function first before adding
them. See "3.6.2.1 Access Controller as SIP Server".
3.6.4.1 Add VTHs One by One
Log in to the web interface.
Select Talkback Setting > Room No. Management.
Click Add.
46
Room number management
Enter the information.
Add one VTH
Table 3-7 Parameter description
Parameter
Description
First Name
Nick Name
Last Name
To differentiate from othe rVTHs.
Room number of the VTH.
Room No.
It can contain up to five digits and must be the same as the one
configured on the indoor monitor.
When there are main and sub VTHs, the room number of main VTH
should end with "-0", and that of sub VTHs with "-1", "-2", "-3"…For
example, the main VTH is 101-0, sub VTHs are 101-1, 101-2 and 101-3.
47
Parameter
Description
Keep it default.
Register
Type
Register
Password
Click OK.
3.6.4.2 Add VTHs in Batches
You can add up to 1024 VTHs.
You can click Export to export the room number and import them to other devices.
Log in to the web interface.
Select Talkback Setting > Room No. Management.
Configure Unit Layer Amount, Room Amount in One Layer, First Floor Number and
Second Floor Number.
Click Add.
Add indoor monitors in batches
3.6.5 VTS Management
When the access controller works as the SIP server, add master stations (VTS) to call them.
Log in to the web.
Select Talkback Setting > VTS Management.
Click Add.
48
Enter the information.
VTS No.: It can contain up to nine digits.
Register Password: Keep it default.
IP Address: IP address of the VTS.
Click OK.
Related Operations
: Modify the information of a VTS.
: Delete a VTS.
3.6.6 Online Status
When the access controller works as the SIP server, administrators can log in to the web
interface and check the information of online devices.
Log in to the web.
Select Talkback Setting > Status.
Add managing devices
49
3.6.7 Call Logs
You can check up to 1024 call logs.
Log in to the web interface.
Select Talkback Setting > Call.
(Optional) Click Export Data to export all the logs.
Call logs
Status
50
Time Section
Configure time sections and holiday plans, and then you can define when a user has the
permissions to unlock doors.
3.7.1 Configuring Time Section
Set when a user can unlock doors each day.
Log in to the web interface.
Select Time Section > Time Section.
Time section parameters
Enter a number and name for the time section.
Configure periods for each day. You can configure up to four periods.
(Optional) Click Apply to the whole week to copy the configuration to other days.
Click OK.
3.7.2 Configuring Holiday Group
Before setting up a holiday plan, you need to set up holiday groups.
Log in to the web interface.
Select Time Section > Holiday Group Config.
Click Add.
51
Add a holiday group
Enter a number and a name for the holiday group.
Click Add.
Add a holiday
Enter a name for the holiday, select the start and end date, and then click OK.
Click OK.
You can add multiple holidays for one holiday group.
3.7.3 Configuring Holiday Group
Set up a holiday plan. When adding a user on the access controller, you can select the holiday
plan, and then the user can only open the doors within the days defined in the holiday plan.
Log in to the web interface.
Select Time Section > Holiday Plan Config.
Click Add.
52
Add a holiday plan
Enter a number and name for the holiday plan.
Select the number of a holiday group you configured.
Select 255 if you do not want to select a holiday group.
Configure periods for every day in the holiday group you selected. You can configure
up to four periods.
Click OK.
Data Capacity
You can see how many users, cards, fingerprints and face images the access controller can hold
on the Data Capacity interface.
Log in to the web interface.
Select Data Capacity on the navigation bar.
Video Setting
You can set parameters including data rate, image parameters (brightness, contrast, hue,
saturation, and more), and exposure on the Video Setting interface.
3.9.1 Data Rate
You can configure stream parameters for channel 1.
Log in to the web interface.
Select Video Setting > Video Setting > Data Rate.
53
Data rate
Table 3-8 stream parameter description
Parameter
Video Standard
Channel
Audio Collection
Description
Select NTSC or PAL according to the video standard of your
region.
There are two options: 1 and 2. 1 is white light camera and 2 is IR
light camera.
If enabled, other devices will also receive the audio stream when
they pull the video stream from the access controller.
Video Format
Select D1, VGA, 720p or 1080p option according to the video
quality you want.
Main
Format
Frame Rate
frame rate range is 1–30 fps.
The rate at which consecutive frames appear on a display. The
Bit Rate
The number of bits that are conveyed or processed per unit of
time. There are five options: 2 Mbps, 4 Mbps, 6 Mbps, 8 Mbps, and
10 Mbps.
Video Format There are three options: D1, VGA, and QVGA.
The rate at which consecutive frames appear on a display. The
Extra
Format
Frame Rate
Bit Rate
frame rate range is 1–30 fps.
The number of bits that are conveyed or processed per unit of
time. There are options: 512Kbps, 640Kbps, 768Kbps, 896Kbps,
1024Kbps, 1.25 Mbps, 1.5 Mbps, 1.75 Mbps, and 2 Mbps.
3.9.2 Image
There are two channels, and you need to configure parameters for each channel.
Log in to the web interface.
Select Video Setting > Video Setting > Image.
54
Parameter
Brightness
Contrast
Saturation
Scene Mode
Select Wide Dynamic in the Backlight Mode.
Table 3-9 Image parameter description
Description
The larger the value is, the brighter the images will be.
Contrast is the difference in luminance or color that makes an object
distinguishable. The larger the contrast value is, the greater the
brightness and color contrast will be.
Hue
The larger the value is, the deeper the color will be.
The larger the value is, the brighter the colors will be.
The value does not change image brightness.
Close: Without modes.
Auto: The system automatically adjusts scene modes.
Sunny: In this mode, image hue will be reduced.
Night: In this mode, image hue will be increased.
Day/Night Mode
Sunny is selected by default.
Day/Night mode decides the working status of the fill light.
Auto: The system automatically adjusts the day/night modes.
Colorful: In this mode, images are with colors.
Black and white: In this mode, images are in black and white.
Image
55
Parameter
Description
Backlight Mode
Close: Without backlight compensation.
BLC: Backlight compensation corrects regions with extremely high
or low levels of light to maintain a normal and usable level of light
for the object in focus.
WDR: In the wide dynamic range mode, the system dims bright
areas and compensates dark areas to ensure the definition of
objects in the bright areas and dark areas.
When human faces are in the backlight, you need to enable WDR.
Inhibition: Highlight compensation is needed to compensate for
overexposure of highlights or strong light sources like spotlights,
headlights, porch lights, etc. to create an image that is usable and
not overtaken by a bright light.
Mirror
Flip
When the function is enabled, images will be displayed with left and
right side reversed.
When this function is enabled, images can be flipped over.
3.9.3 Exposure
You can configure exposure parameters.
Log in to the web interface.
Select Video Setting > Video Setting > Exposure.
Exposure
Table 3-10 Exposure parameter description
Parameter
Description
Anti-flicker
50Hz: When the utility frequency of alternating current is 50 Hz, the
exposure is automatically adjusted to make sure that there are no
stripes on images.
60Hz: When the utility frequency of alternating current is 60 Hz, the
exposure is automatically adjusted to make sure that there are no
stripes on images.
Outdoor: When Outdoor is selected, the exposure mode can be
switched.
56
Parameter
Description
Auto: The access controller will automatically adjust brightness of
images.
Shutter Priority: The access controller will adjust image brightness
according to shutter exposure value range. If the image brightness is
not enough and the shutter value has reached upper or lower limit, the
access controller will adjust gain value automatically to get ideal
brightness.
Manual: You can configure gain and shutter value manually to adjust
Exposure
Mode
image brightness.
When you select Outdoor in the Anti-flicker drop-down list, you can
select Shutter Priority as the exposure mode.
Exposure modes listed below are for reference only, and might vary
with different models.
If you select Customized Range, you can customize the speed range of the
shutter.
The lower the shutter speed is, the shorter the exposure time and the darker
the images will be.
Gain
When the gain value range is set, video quality will be improved.
Exposure
Compensation
You can increase video brightness by adjusting exposure compensation
value.
When 3D Noise Reduction (RD) is enabled, video noise can be reduced, and
high definition videos will be produced.
You can adjust the value of the 3D NR when 3D NR is enabled.
The larger the value is, the less the noise there will be.
Shutter
3D NR
Grade
3.9.4 Motion Detection
Set a range in which moving objects can be detected.
Log in to the web interface.
Select Video Setting > Motion Detection.
57
Motion detection
Press and hold the left mouse button, and then drag the mouse in the red area.
The red rectangles are motion detection area. The default motion detection range
is all the rectangles.
To draw a motion detection area, you need to click Remove All first.
The motion detection area you draw will be a non-motion detection area if you
draw in the default motion detection area.
Motion detection area
Set sensitivity and threshold.
58
Sensitivity represents the ability of each grid to sense motion. The larger the value
is, the higher the sensitivity is.
Threshold is the condition of motion detection. When grid number reaches the
threshold, motion detection will be triggered. The smaller the value is, the more
likely the motion detection will be triggered.
When grid number is smaller than the threshold, green line will appear; when grid
number is more than the threshold, red line will appear. See Figure 3-34.
Click OK to finish the setting.
3.9.5 Volume Setting
Adjust the volume of the speaker or the beeping prompt.
Log in to the web interface.
Select Video Setting > Volume Setting.
Volume setting
3.9.6 Image Mode
Select indoor, outdoor or other according to where the access controller is installed.
Log in to the web interface.
Select Video Setting > Image Mode.
Indoor: The access controller is installed indoors.
Outdoor: The access controller is installed outdoors.
Other: The access controller is installed at places with backlights, such as hallways.
Image mode
59
3.9.7 Local Coding
Set up the area to be displayed on the indoor monitors.
Log in to the web.
Select Video Setting > Local Coding.
Enable the function.
Local coding
Click OK.
Face Detection
You can configure human face related parameters on this interface to increase face recognition
accuracy.
Log in to the web interface.
Select Face Detect.
60
Face detect
61
Configure parameters.
Table 3-11 Face detect parameter description
Parameter
Description
Face Recognition
Threshold
The larger the value is, the higher the accuracy will be.
Max. Angle of Face
Recognition
The larger the angle is, the wider range of the profiles will be
recognized.
Anti-fake Threshold
This function prevents people from unlocking by face images or
models.
Infrared Light
Adjust IR brightnees by dragging the scroll bar.
Recognition Timeout
The interval of the prompt during valid face recognition.
Invalid Prompt
Interval
The interval of the prompt during invalid face recognition.
Parameter
Description
Face Target Brightness The default value is 50. Adjust the brightness as needed.
Pupillary Distance
Channel ID
Exposure(Face)
Exposure Time
(Face)(S)
Temperature
Monitoring
Temp Unit
Temp Rect
Temp Correction
Duration (ms)
Temp Monitoring
Distance (cm)
High Temp Threshold
Max Temperature
Min Temperature
Temp Correction
Value
Pupillary distance is the pixel value of the image between the
centers of the pupils in each eye. You need to set an appropriate
value so that the access controller can recognize faces as needed.
The value changes according to the face sizes and the distance
between faces and the lens. The closer the face is to the lens, the
greater the value should be. If an adult is 1.5 meters away from the
lens, the pupillary distance value can be within 50 to 70.
There are two options: 1 and 2. 1 is white light camera and 2 is IR
light camera.
After face exposure is enabled, human face will be clearer when the
access controller is installed outdoors.
After a face is detected, the access controller will give out light to
illuminate the face, and the access controller will not give out light
again until the interval you set has passed.
Enable or disable the temperature monitoring function.
Select ° C or ° F.
Set whether to display the temperature monitoring box on the
standby interface or not.
When monitoring the temperature, the access controller will take
the temperature value after the time defined by this parameter.
Only certain models support this parameter.
50 by default. You can correct the monitored temperature as needed
according to the distance you set.
Only certain models support this parameter.
Set the temperature threshold. The monitored body temperature
will be judged as high temperature if it is greater than or equal to
the set value.
Set the temperature range you need. If the monitored temperature
is lower than the lower limit, it will prompt that the temperature is
too low; if higher than the upper limit, it will prompt that there is a
heat source interfering with the function.
This parameter is for testing. The difference of the temperature
monitoring environment might cause the temperature deviation
between the monitored temperature and the actual temperature.
You can select multiple monitored samples for testing, and then
correct the temperature deviation by this parameter according to
the comparison between the monitored temperature and the actual
temperature. For example, if the monitored temperature is 0.5°C
lower than the actual temperature, the correction value is set to
0.5°C; if the monitored temperature is 0.5°C higher than the actual
temperature, the correction value is set to -0.5°C.
62
Parameter
Description
Temp Monitoring
Mode
Auto: Uses a face heat map for face recognition; if heat maps
are not found, it will automatically change to calibration mode.
Thermogram: Uses only a heat map for face recognition and
temperature monitoring.
Calibration: Uses a white light image of a face for face
recognition, and then extract and apply the coordinates on the
face heat map for temperature monitoring.
Only certain models support this parameter.
Display a heat map at the upper-left corner.
Thermogram Display
Only certain models support this parameter.
No detect: Mask is not detected during face recognition.
Mask reminder: Mask is detected during face recognition. If
the person is detected without wearing a mask, the system will
prompt mask reminder and passage is allowed.
Mask intercept: Mask is detected during face recognition. If
the person is detected without wearing a mask, the system will
prompt mask reminder and passage is not allowed.
Click Draw Target, and then you can draw the minimum face
detection frame.
Click Remove All, and you can remove all the frames you drew.
Click Detect Region, move your mouse, and you can adjust the face
detection region.
Click Remove All, and you can remove all the detection regions.
Mask Mode
Draw Target
Detect Region
Click OK to finish the setting.
Network Setting
3.11.1 TCP/IP
You need to configure IP address and DNS server to make sure that the access controller can
communicate with other devices.
Make sure that the access controller is connected to the network correctly.
Log in to the web interface.
Select Network Setting > TCP/IP.
63
TCP/IP
64
Configure parameters.
Table 3-12 TCP/IP
Parameter
IP Version
Description
There is one option: IPv4.
MAC Address
MAC address of the access controller.
Mode
If DHCP is effective, IP address, subnet mask, and gateway address
Static: Set IP address, subnet mask, and gateway address manually.
DHCP
After DHCP is enabled, IP address, subnet mask, and gateway
address cannot be configured.
will be displayed automatically; if DHCP is not effective, IP address,
subnet mask, and gateway address will all be zero.
If you want to see the default IP when DHCP is effective, you need
to disable DHCP.
Only available when IPv6 is selected in the IP version. Unique link-local
addresses will be assigned to network interface controller in each local area
network to enable communications. The link-local address cannot be
Enter IP address, and then configure subnet mask and gateway address.
IP address and gateway address must be in the same network segment.
modified.
Link-local
address
IP Address
Subnet Mask
Default Gateway
Preferred/
Alternate DNS
Server
Set IP address of the preferred DNS server.
Click OK to complete the setting.
3.11.2 Port
Set the maximum connections clients that the access controller can be connected to and port
numbers.
Log in to the web interface.
Select Network Setting > Port.
Configure port numbers. See the following table.
Except max connection, you need to reboot the access controller to make the
configuration effective after modifying values.
65
Table 3-13 Port description
Parameter
Description
Max
be connected to.
Connection
You can set the maximum connections of clients that the access controller can
Platform clients like SmartPSS AC are not counted.
TCP Port
Default value is 37777.
HTTP Port
Default value is 80. If other value is used as port number, you need to add this
value behind the address when logging in through browsers.
HTTPS Port
Default value is 443.
RTSP Port
Default value is 554.
Click OK to complete the setting.
3.11.3 Register
When connected to external network, the access controller will report its address to the server
that is designated by the user so that clients can get access to the access controller.
Log in to the web interface.
Select Network Setting > Auto Register.
Select Enable, and enter host IP, port, and sub device ID.
Table 3-14 Auto register description
Parameter
Description
Host IP
Port
Server IP address or server domain name.
Server port used for auto registeration.
Sub Device ID
Access controller ID assigned by the server.
Click OK to complete the setting.
3.11.4 P2P
Peer-to-peer computing or networking is a distributed application architecture that partitions
tasks or workloads between peers. Users can download mobile application by scanning QR
code, and then register an account so that more than one access controller can be managed on
the mobile app. You do not need to apply dynamic domain name, do port mapping or do not
need transit server.
If you are to use P2P, you must connect the access controller to external network; otherwise the
access controller cannot be used.
66
P2P
Log in to the web interface.
Select Network Setting > P2P.
Select Enable to enable the P2P function.
Click OK.
Scan the QR code on your web interface to get the serial number of the access
controller.
Safety Management
3.12.1 IP Authority
Select a cybersecurity mode as needed.
IP authority
67
3.12.2 Systems
3.12.2.1 System Service
Enable or disable the system services as needed.
The system service configuration on the web interface is synchronized to the Features interface
of the access controller.
System service
Parameter
Description
Table 3-15 Parameter description
SSH
Secure Shell (SSH) is a cryptographic network protocol for operating
network services securely over an unsecured network.
When SSH is enabled, SSH provides cryptographic service for the data
transmission.
PWD Reset Enable
If enabled, you can reset the password. This function is enabled by default.
68
Parameter
Description
Common Gateway Interface (CGI) offers a standard protocol for web servers
to execute programs similarly to console applications running on a server
CGI
that dynamically generates web pages.
When CGI is enabled, CGI commands can be used. The CGI is enabled by
Enable other devices to pull video stream of the VTO through the ONVIF
default.
protocol.
ONVIF
Audio and Video
Encryption
Transmission
Encrypt all data during voice or video call.
RTSP over TLS
Output encrypted bit stream through RTSP.
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure
communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI commands;
HTTPS
otherwise HTTP will be used.
When HTTPS is enabled, the access controller will restart automatically.
TLSv1.1 and
Enable this function if your browser is using TLS V1.1 or earlier versions.
Enable it for fault analysis and repair.
This function will occupy 8088 and 8087 ports.
Security Mode (recommended): Support logging in with Digest
Auth Method
authentication.
Compatible Mode: Use the old login method.
Compatible with
earlier versions
Emergency
Maintenance
3.12.2.2 Creating Server Certificate
Click Create Server Certificate, enter needed information, click Save, and then the access
controller will reboot.
3.12.2.3 Downloading Root Certificate
Click Download Root Certificate.
Select a path to save the certificate on the Save File dialog box.
Double-click on the Root Certificate that you have downloaded to install the
certificate. Install the certificate by following the onscreen instructions.
User Management
You can add and delete users, modify users’ passwords, and enter an email address for resetting
the password when you forget your password.
69
3.13.1 Adding Users
Click Add on the User Mgmt. interface to add users, and then enter username, password,
confirmed password, and remark. Click OK to complete the user adding.
3.13.2 Modifying User Information
You can modify user information by clicking
on the User Mgmt. interface.
User management
3.13.3 ONVIF User
Open Network Video Interface Forum (ONVIF), a global and open industry forum with the goal
of facilitating the development and use of a global open standard for the interface of physical
IP-based security products. When ONVIF is used, administrator, operator, and user have
different permission of ONVIF server. Create ONVIF users as needed.
Onvif user
70
Maintenance
You can make the access controller reboot itself in idle time to improve the running speed of
the access controller. You need to set the auto reboot date and time.
Log in to the web interface.
Select Maintenance.
Set the auto reboot time, and then click OK.
Maintenance
For example, the access controller will reboot at 2 O’clock in the morning every Tuesday.
Click Reboot Device, the access controller will reboot immediately.
Configuration Management
When more than one access controller needs the same configuration, you can configure
parameters for them by importing or exporting configuration files.
3.15.1 Exporting Configuration File
You can export the configuration file of the access controller for backup.
Log in to the web interface.
Select Config Mgmt. on the navigation bar.
Configuration management
Click Export configuration to save the configuration file locally.
IP information of the access controller will not be exported.
71
3.15.2 Importing Configuration File
You can import the configuration file that is exported from an access controller to another
access controller with the same model.
Log in to the web interface.
Select Config Mgmt. on the navigation bar.
On the configuration management interface, click Browse to select the configuration
file that you want to import, and then click Import configuration.
The access controller will reboot after importing configuration file.
Restore Factory: Reset all the data and configuration of the access controller.
Restore Factory (Save user & log): Reset all data and configuration, except for user
information and logs.
3.15.3 Default
Upgrade
Export the configuration file for backup before upgrade, and then import it after the
upgrade is completed.
Make sure that the upgrade file has been obtained. You can get it from technical support.
Do not disconnect the power or network, or reboot or shutdown the access controller
during upgrade.
Upgrade.
Log in to the web interface.
Select Upgrade on the navigation bar.
On the Upgrade interface, click Browse to select the upgrade file, and then click
Upgrade
If the upgrade is succeeded, the system pops up a message indicating that the upgrade
is completed. If the upgrade is failed, there will be corresponding prompts.
72
You can select Auto Check to upgrade the system automatically. You can also
select Manual Check to upgrade the system manually.
The access controller will reboot after upgrade.
You click Version Info on the left navigation menu to check version after
upgrade.
Version Information
You can view information including MAC address, serial number, MCU version, web version,
security baseline version, system version, and firmware version.
Log in to the web interface.
Select Version Info on the navigation bar.
Online User
You can view username, IP address, and user login time on the Online User interface.
Log in to the web interface.
Select Online User on the navigation bar.
Online user
System Log
View and back up system logs, admin logs, and unlock records.
3.19.1 System Logs
View and search for system logs.
73
Log in to the web interface.
Select System Log > System Log.
Select a time range and a type, and then click Query.
Click Backup to download the results.
Seach for logs
3.19.2 Admin Log
Search for admin logs by admin ID.
Log in to the web interface.
Select System Log > Admin Log.
Enter the admin ID, and then click Query.
Admin log
3.19.3 Unlock Records
Search for unlock records and export them.
Log in to the web interface.
Select System Log > Search Records.
Select a time range and a type, and then click Query.
74
Click Export Data to download the results.
Fusion Calibration
Set up the coordinate relationship between the white light face image and face heat map. When
calibration mode is enabled, the access controller will use the coordinate relationship to
measure temperature on the face heat map.
Only certain models support this function.
Select Temp Monitoring Mode to Calibration Mode. See "3.10 Face Detection" for
details.
Select Fusion Calibrate.
Select a model from Calibration Mode according to the type of the access controller.
Set up coordinate relationship
Click Calibration Point1.
Click the image on the left, and then left to set up a relationship between the two
locations.
Click Calibration Confirmed.
Repeat step 2–4 for calibration point 2–4.
Click OK.
(Optional) Click Default to reset all configuration the default settings.
75
You can view environment temperature, and core temperature and body surface temperature of
a target.
Only certain models support this function.
Advanced
Exit
Click
at the upper-left corner, and then click OK to log out of the web interface.
76
4 SmartPSS AC Configuration
You can manage the access controller through the SmartPSS AC client. For detailed
configurations, see the SmartPSS AC user manual.
SmartPSS AC interfaces might vary with versions, and the actual interface shall prevail.
Login
Install the SmartPSS AC.
in.
Adding Devices
Double-click
, and then follow the instructions to finish the initialization and log
You need to add access controllers to the SmartPSS AC. You can click Auto Search to add and
click Add to manually add devices.
4.2.1 Auto Search
You can search and add access controllers at the same network segment to the SmartPSS AC.
Log in to SmartPSS AC.
Click Device Manager at the lower left corner.
Devices
Click Auto Search.
77
Auto search
78
Enter the network segment, and then click Search.
A search result list will be displayed.
Select access controllers that you want to add to the SmartPSS AC, and then click Add.
The Login information dialog box will be displayed.
Enter the username and the login password to login.
You can see the added access controller on the Devices interface.
Select an access controller, click Modify IP, and you can modify the access controller’s IP
address. For details about IP address modification, see SmartPSS AC user manual.
4.2.2 Manual Add
You can add access controllers manually. You need to know IP addresses and domain names of
access controllers that you want to add.
Log in to SmartPSS AC.
Click Device Manager at the lower left corner.
Click Add on the Devices interface, and the Manual Add interface will be displayed.
Manual add
Enter the device name, select a method to add, enter the IP, Port number (37777 by
default), User Name, and Password.
Click Add, and then you can see the added access controller on the Devices interface.
User Management
4.3.1 Card Type Setting
Before issuing card, set card type first. For example, if the issued card is ID card, select type as ID
card.
Card types must be the same as card issuer types; otherwise card numbers cannot be read.
Log in to SmartPSS AC.
Click Personnel Manager.
79
Personnel manager
On the Personnel Manager interface, click
, then click
.
On the Setting Card Type interface, select a card type.
Click
to select display method of card number in decimal or in hex.
Setting card type
Click OK.
4.3.2 Adding User
Select one of the methods to add user.
Add user one by one manually.
Add user in batches.
Extract user information from other devices.
Import user information from the local.
4.3.2.1 Manual Add
You can add user one by one manually.
Log in to SmartPSS AC.
Click Personnel Manger > User > Add.
Add basic information of the user.
1) Click the Basic Info tab on the Add User interface, and then add basic information
of the user.
2) Click the image, and then click Upload Picture to add a face image.
The uploaded face image will display on the capture frame.
80
Make sure that the image pixels are more than 500 × 500; image size is less than
120 KB.
Add basic information
Click the Certification tab to add certification information of the user.
Configure password.
81
Set password. For the second generation access controllers, set the personnel
password; for other devices, set the card password. The new password must consist
of 6 digits.
Configure card.
The card number can be read automatically or filled in manually. For automatically read,
select a card reader, and then place the card on the card reader. The card number is
read automatically after that.
1) Click
to select Device or Card issuer as card reader.
2) Add card. The card number must be added if the non-second generation access
controller is used.
3) After adding, you can select the card as main card or duress card, or replace the
card with new one, or delete the card.
Configure fingerprint.
1) Click
to select Device or Fingerprint Scanner as fingerprint collector.
2) Add fingerprint. Click Add Fingerprint and press finger on the scanner three times
continuously.
82
Configure certification
Configure permission for the user.
For details, see "4.4 Permission Configuration".
83
Permission configuration
Click Finish.
4.3.2.2 Batch Add
You can add users in batches.
Log in to SmartPSS AC.
Click Personnel Manger > User > Batch Add.
Select card reader and the department of user. Set the start number, card quantity,
effective time and expired time of card.
Click Issue to start issuing cards.
The card number will be read automatically.
Click Stop after issuing card, and then click OK.
84
Add user in batches
In the list of user, click
to modify information or add details of users.
4.3.2.3 Extracting User from Devices
You can extract user information from devices.
Log in to SmartPSS AC.
Click Personnel Manger > User > Extract.
Search and select the target device, and then click OK.
85
Devices with user information
Select users as needed, and click Extract.
In the list of user, click
to modify information or add details of user.
4.3.2.4 Importing User
You can import users locally.
Log in to SmartPSS AC.
Click Personnel Manger > User > Import.
Import user information according to instructions.
4.3.3 Issuing Card in Batches
You can issue cards to user who have been added but have no card.
Log in to SmartPSS AC.
Select Personnel Manager > User.
Select users as needed and then click Batch Issue Card.
Issue card in batches. Card No. can be auto read by card reader or entered manually.
Auto read
1) Select card reading device, and then click Issue.
2) According to the card list, put the cards of the corresponding user on card reader
in sequence, and then the system will auto read the card number.
3) Modify user info, such as start time and end time for card validation.
Enter manually
1) Select user in card list and enter the corresponding card number.
2) Modify user info, such as start time and end time for card validation.
86
Issue card in batches
Click OK.
4.3.4 Exporting User Information
You can export user information.
Log in to SmartPSS AC.
Select Personnel Manager > User.
Select the user information which needs to be exported, and then click Export to
export all user information to local.
Permission Configuration
4.4.1 Adding Permission Group
Log in to SmartPSS AC.
87
Click Personnel Manger > Permission Configuration.
Permission group list
Click
to add a permission group.
Set permission parameters.
1) Enter group name and remark.
2) Select the needed time template.
For details of time template setting, see SmartPSS AC user manual.
3) Select the corresponding device, such as door 1.
Add permission group
Click OK.
88
On the Permission Group List interface, you can do:
Click
to delete group.
Click
to modify group info.
Double-click permission group name to view group info.
4.4.2 Configuring Permission
The method to configure permission for department and for users is similar. This section takes
users as an example.
Log in to SmartPSS AC.
Click Personnel Manger > Permission Configuration.
Select the target permission group, and then click
.
Configure permission
Select the user need to be configured permission.
Click OK.
89
Access Management
4.5.1 Remotely Opening and Closing Door
After access configuration, you can remotely control door through SmartPSS AC.
Click Access Manager on the homepage. (Or click Access Guide >
).
Remotely control the door. There are two methods.
Method 1: Select the door, right click and select Open.
Remotely control (method 1)
Method 2: Click
or
to open or close the door.
Remotely control (method 2)
View door status by Event Info list.
Event filtering: Select the event type in the Event Info, and the event list displays
events of the selected types. For example, select Alarm, and the event list only
displays alarm events.
Event refresh locking: Click
to the right of Event Info to lock or unlock the
event list, and then the real-time events cannot be viewed.
Event deleting: Click
to the right of Event Info to clear all events in the event
list.
90
4.5.2 Setting Always Open and Always Close
After setting always open or always close, the door is open or closed all the time and cannot be
controlled manually. If you want to manually control the door again, click Normal to reset the
door status.
Click Access Manager on the homepage. (Or click Access Guide >
).
Select the needed door, and then click Always Open or Always Close.
Set always open or always close
4.5.3 Resetting Door Status
Click Normal to reset the door status, if you want to manually control the door again when you
have clicked Always Open or Always Close.
Click Access Manager on the homepage. (Or click Access Guide >
).
Select the needed door, and then click Normal. And then follow the on-screen
instructions to operate.
Reset door status
91
Attendance Management
You can set attendance time, add attendance shifts, personnel scheduling, process attendance,
manage attendance statistics, search reports, add holidays, and configure attendance.
4.6.1 Report Search
You can view the normal attendance, attendance abnormality, overtime attendance and staff
information here. And the statistics can be exported as reports.
Log in to SmartPSS AC.
Click Attendance Manager.
On the left menu bar, click
.
Select the time, department and statistic type, to view the corresponding reports.
Report search
After the device is added and authenticated on the SmartPSS AC platform, the corresponding
attendance status will be reported to the platform, and the platform will generate the
corresponding attendance status report.
Attendance status report of the device
92
4.6.2 Other Configurations
For other configurations such as attendance periods, attendance shifts, personnel scheduling,
attendance processing and attendance statistics, adding holidays and attendance
configurations, refer to the SmartPSS AC user's manual.
Log in to SmartPSS AC.
Click
on the left menu.
Click Attendance Guide at the lower-right corner.
View SmartPSS AC user's manual
93
5 FAQ
1 The access controller fails to start after power-on.
Check whether the 12V power supply is correctly connected, and whether the power
button is pressed.
2 Faces cannot be recognized after the access controller powers on.
Make sure that Face is selected in the unlock mode. See “2.8.2 Unlock”.
3 There is no output signal when the access controller and the external controller are
connected to the Wiegand port.
Check whether the GND cable of access controller and the external controller are
connected.
4 Configurations cannot be made after the administrator and password are forgotten.
Delete administrators through the platform, or contact technical support to unlock the
access controller remotely.
5 User information, and face images cannot be imported into the access controller.
Check whether names of XML files and titles of tables were modified because the system
will identify the files through their titles.
6 When a user’s face is recognized, but other users’ information is displayed.
Make sure that when importing human faces, there are no other people around. Delete the
original face, and import it again.
94
Notes of Face
Recording/Comparison
Before Registration
Glasses, hats, and beards might influence face recognition performance.
Do not cover your eyebrows when wearing hats.
Do not change your beard style greatly if you will use the device; otherwise face
recognition might fail.
Keep your face clean.
Keep the device at least two meters away from light source and at least three meters away
from windows or doors; otherwise backlight and direct sunlight might influence face
recognition performance of the device.
During Registration
You can register faces through the access controller or through the platform. For registration
through the platform, see the platform user manual.
Make your head center on the photo capture frame. A picture of your face will be captured
automatically.
Appendix Figure 1-1 Registration
95
Do not shake your head or body, otherwise the registration might fail.
Avoid two faces appear in the capture frame at the same time.
Face Position
If your face is not at the appropriate position, face recognition effect might be influenced.
Appendix Figure 1-2 Appropriate face position
Requirements of Faces
Make sure that the face is clean and forehead is not covered by hair.
Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image
With eyes open, without facial expressions, and make your face toward the center of
When recording your face or during face recognition, do not keep your face too close to or
recording.
camera.
too far from the camera.
96
Appendix Figure 1-3 Head position
Appendix Figure 1-4 Face distance
When importing face images through the management platform, make sure that image
resolution is within 150 × 300 to 600 × 1200; image pixels are more than 500 × 500; image
size is less than 75 KB, and image name and person ID are the same.
Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image
area, and the aspect ratio does not exceed 1:2.
97
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a more
secured security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
device (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is
equipped with the latest security patches and fixes. When the device is connected to
the public network, it is recommended to enable the “auto-check for updates”
function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
98
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc.,
to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited
to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used
to log in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to
save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
99
Enable IP/MAC address filtering function to limit the range of hosts allowed to access
the device.
100
1 2 | User Manual 20210713 v1 - User Manual 2 | Users Manual | 5.26 MiB | July 29 2021 / August 02 2021 |
1 2 | Internal Photos 20210713 v1 - Internal Photo | Internal Photos | 1.63 MiB | July 29 2021 / August 02 2021 |
1 2 | External Photos 20210713 v1 - External Photo | External Photos | 479.39 KiB | July 29 2021 / August 02 2021 |
1 2 | label and label location-update | ID Label/Location Info | 111.04 KiB | July 29 2021 / August 02 2021 |
ic) Face Recognition Access Controller @ hua DHI-ASI6213J-FT1 12V = 2A P/N:1.0.01.25.11405 S/N: 6MO78BDPAGO0002 FCC ID:SVN-ASI6213J-FT FC MADE IN CHINA ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. FCC Warning Statement This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference and
(2) this device must accept any interference received, including interference that may cause undesired operation.
1 2 | Cover Letters 20210713 v1 - Authorization Letter | Cover Letter(s) | 165.43 KiB | July 29 2021 / August 02 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Date: 2021-07-06
Federal Communications Commission
7435 Oakland Mills Road
Columbia MD 21046
To whom it may concern:
I, the undersigned, hereby authorize UL-CCIC COMPANY LIMITED to act on our behalf in all
manners relating to application for equipment authorization, including signing of all documents
relating to these matters. Any and all acts carried out by UL-CCIC COMPANY LIMITED on our
behalf shall have the same effect as acts of our own.
I, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes
FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a).
In authorizing UL-CCIC COMPANY LIMITED as our representative, we still recognize that we are
responsible to:
a) comply with the relevant provisions of the certification program;
b)
c)
d)
e)
f)
make all necessary arrangements for the conduct of the evaluation, including
provision for examining documentation and access to all areas, records (including
internal audit reports) and personnel for the purposes of evaluation (e.g. testing,
inspection, assessment, surveillance, reassessment) and resolution of complaints;
make claims regarding certification only in respect of the scope for which
certification has been granted;
do not use our product certification in such a manner as to bring the Certification
Division into disrepute and not make any statement regarding our product
certification which the Certification Division may consider misleading or
unauthorized;
upon suspension or cancellation of certification, discontinue use of all advertising
matter that contains any reference thereto and return any certification documents
as required by the Certification Division;
use certification only to indicate the products are certified as being in conformity
with specified standards;
g)
h)
i)
j)
endeavor to ensure that no certificate or report nor any part thereof is used in a
misleading manner;
ensure that any reference to our product certification in communication media
such as documents, brochures or advertising, complies with the requirements of
the Certification Division;
keep a record of all complaints made known to us relating to the product’s
compliance with requirements of the relevant standard and to make these records
available to the when requested;
take appropriate action with respect to such complaints and any deficiencies
found in products or services that affect compliance with the requirements for
certification;
k)
document the actions taken.
This authorization is valid until further written notice from the applicant.
Sincerely Yours,
Signed by:
Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Contact Name: Yolanda chen
Title of Person: Certificate Engineer
Address: No.1199, Bin’an Road, Binjiang District, Hangzhou, P.R.China
1 2 | Cover Letters 20210713 v1 - Declaration letter | Cover Letter(s) | 114.52 KiB | July 29 2021 / August 02 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Address: No.1199, Bin’an Road, Binjiang District, Hangzhou, P.R.China
Confirmation Letter
We, ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
The product: Face Recognition Access Controller
And model No.: DHI-ASI6213J-FT1,ASI6213J-FT1,DH-ASI6213J-FT1,DHI-
ASI6213JFT,ASI6213J-FT,DH-ASI6213J-FT,DHI-ASI6213J-F,ASI6213J-F,DH-ASI6213J-
F,DHI-ASI6214J-F,ASI6214J-F,DH-ASI6214J-F,DHI-ASI6213J-MW,ASI6213J-MW,DH-
ASI6213J-MW,DHI-ASI6214J-MFW,ASI6214J-MFW,DH-ASI6214J-MFW
ASI6213J-FT1,DH-ASI6213J-FT1,DHI-ASI6213JFT,ASI6213J-FT,DH-ASI6213J-FT,DHI-
ASI6213J-F,ASI6213J-F,DH-ASI6213J-F,DHI-ASI6214J-F,ASI6214J-F,DH-ASI6214J-F,DHI-
ASI6213J-MW,ASI6213J-MW,DH- ASI6213J-MW,DHI-ASI6214J-MFW,ASI6214J-MFW,DH-
ASI6214J-MFW have the same technical construction including circuit diagram, PCB Layout,
components and component layout, all electrical construction and mechanical construction, with
DHI-ASI6213J-FT1. The difference is only the name of the models for different market regions
and/or customers.
Best Regards
Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Contact Name: Yolanda chen
Title of Person:Certificate Engineer
Address: No.1199, Bin’an Road, Binjiang District, Hangzhou, P.R.China
1 2 | Cover Letters 20210713 v1 - Request for Confidentiality request letter | Cover Letter(s) | 116.25 KiB | July 29 2021 / August 02 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Request for Confidentiality
Federal Communications Commission
7435 Oakland Mills Road
Columbia MD 21046
Subject:
FCC ID:SVN-ASI6213J-FT
To Whom It May Concern:
Pursuant to the provisions of Sections 0.457 and 0.459 of the Commission’s rules (47 CFR §§
0.457, 0.459), we are requesting the Commission to withhold the following attachments as
confidential document from public disclosure indefinitely.
Schematic Diagram
Block Diagram
Theory of Operation
Above mentioned document contains detailed system and equipment description are considered
as proprietary information in operation of the equipment. The public disclosure of above
documents might be harmful to our company and would give competitor an unfair advantage in
the market.
It is our understanding that all measurement test reports, FCC ID label format and correspondent
during certification review process cannot be granted as confidential documents and those
information will be available for public review once the grant of equipment authorization is
issued.
Best Regards
Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
Contact Name: Yolanda chen
Title of Person: Certificate Engineer
Address: No.1199, Bin’an Road, Binjiang District, Hangzhou, P.R.China
1 2 | Test Report 20210713 v1 - 4789949892-3 FCC 15.225 Test Report | Test Report | 1.22 MiB | July 29 2021 / August 02 2021 |
1 2 | Test Setup Photos 20210713 v1 - Setup Photo | Test Setup Photos | 447.63 KiB | July 29 2021 / August 02 2021 |
1 2 | 4789949892-1 FCC ID WIFI 2.4G Report Part1 | Test Report | 3.95 MiB | July 29 2021 / August 02 2021 |
1 2 | 4789949892-1 FCC ID WIFI 2.4G Report Part2 | Test Report | 3.24 MiB | July 29 2021 / August 02 2021 |
1 2 | Test Report 20210713 v1 - 4789949892-2 FCC MPE Report | RF Exposure Info | 208.65 KiB | July 29 2021 / August 02 2021 |
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2021-08-02 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
2 | 2422 ~ 2452 | DTS - Digital Transmission System |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2021-08-02
|
||||
1 2 | Applicant's complete, legal business name |
Zhejiang Dahua Vision Technology Co., Ltd
|
||||
1 2 | FCC Registration Number (FRN) |
0028432326
|
||||
1 2 | Physical Address |
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
|
||||
1 2 |
No.1199, Bin'an Road, Binjiang District, Hangzhou
|
|||||
1 2 |
Hangzhou, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
L******@ul.com
|
||||
1 2 | TCB Scope |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
||||
1 2 |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
|||||
app s | FCC ID | |||||
1 2 | Grantee Code |
SVN
|
||||
1 2 | Equipment Product Code |
ASI6213J-FT
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
Y****** c********
|
||||
1 2 | Telephone Number |
0571-********
|
||||
1 2 | Fax Number |
0571-********
|
||||
1 2 |
c******@dahuatech.com
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
UL Verification Services Guangzhou Co., Ltd, Song
|
||||
1 2 | Name |
S**** C******
|
||||
1 2 | Physical Address |
Building 10, Innovation Technology Park, Song Shan
|
||||
1 2 |
Dongguan, 523808
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
86769********
|
||||
1 2 | Fax Number |
86769********
|
||||
1 2 |
e******@ul.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DXX - Part 15 Low Power Communication Device Transmitter | ||||
1 2 | DTS - Digital Transmission System | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Face Recognition Access Controller | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output power listed is conducted. This device supports 20 MHz and 40 MHz bandwidth modes. The transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be collocated or operating in conjunction with any other transmitters. End-users must be provided with transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
UL Verification Services (Guangzhou) Co., Ltd.
|
||||
1 2 | Name |
S**** G******
|
||||
1 2 | Telephone Number |
+86 0********
|
||||
1 2 |
S******@ul.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 13.56000000 | 13.56000000 | ||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 2412 | 2462 | 0.0385 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15C | CC | 2422 | 2452 | 0.018 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC