all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manuals | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual -1 | Users Manual | 5.26 MiB | April 29 2021 | |||
1 2 |
|
User Manual -2 | Users Manual | 3.37 MiB | April 29 2021 | |||
1 2 |
|
Internal Photos | Internal Photos | 1.64 MiB | April 29 2021 | |||
1 2 |
|
External Photos | External Photos | 567.12 KiB | April 29 2021 | |||
1 2 |
|
Label and Label Location | ID Label/Location Info | 1.54 MiB | April 29 2021 | |||
1 2 |
|
Authorization Letter | Cover Letter(s) | 210.32 KiB | April 29 2021 | |||
1 2 | Block Diagram | Block Diagram | April 29 2021 | confidential | ||||
1 2 | Circuit diagram | Schematics | April 29 2021 | confidential | ||||
1 2 |
|
Confidentiality Letter | Cover Letter(s) | 153.80 KiB | April 29 2021 | |||
1 2 |
|
Declaration Letter | Cover Letter(s) | 198.91 KiB | April 29 2021 | |||
1 2 | Operational Description | Operational Description | April 29 2021 | confidential | ||||
1 2 |
|
RF Exposure Info | RF Exposure Info | 207.69 KiB | April 29 2021 | |||
1 2 |
|
Setup Photos | Test Setup Photos | 440.92 KiB | April 29 2021 | |||
1 2 |
|
Test Report -1 | Test Report | 5.02 MiB | April 29 2021 | |||
1 2 |
|
Test Report -2 | Test Report | 3.99 MiB | April 29 2021 | |||
1 2 |
|
Test Report -3 | Test Report | 2.64 MiB | April 29 2021 | |||
1 2 |
|
Test Report | Test Report | 1.21 MiB | April 29 2021 |
1 2 | User Manual -2 | Users Manual | 3.37 MiB | April 29 2021 |
Face Recognition Access Controller Users Manual Users Manual V1.0.0 V1.0.0 Foreword General Safety Instructions This manual introduces the installation and basic operations of the Face Recognition Access Controller (hereinafter referred to as "access controller"). The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning DANGER WARNING CAUTION TIPS NOTE Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury. Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result. Provides methods to help you solve a problem or save you time. Provides additional information as the emphasis and supplement to the text. Revision History About the Manual Version Revision Content Release Time V1.0.0 First release. September 2020 The manual is for reference only. If there is inconsistency between the manual and the actual product, the actual product shall prevail. We are not liable for any loss caused by the operations that do not comply with the manual. The manual would be updated according to the latest laws and regulations of related jurisdictions. For detailed information, refer to the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail. All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or I errors in print. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF All trademarks, registered trademarks and the company names in the manual are the format) cannot be opened. properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurring when using the device. If there is any uncertainty or controversy, we reserve the right of final explanation. II Important Safeguards and Warnings This chapter describes the contents covering proper handling of the access controller, hazard prevention, and prevention of property damage. Read these contents carefully before using the access controller, comply with them when using, and keep them well for future reference. Operation Requirement Do not expose the access controller to direct sunlight or heat source. Do not install the access controller in a humid or dusty area. Install the access controller horizontally at stable places to prevent it from falling. Do not drip or splash liquids onto the access controller; do not put on the access controller anything filled with liquids. Install the access controller at well-ventilated places and do not block its ventilation opening. Operate the access controller within rated input and output range. Do not disassemble the access controller by yourself. Transport, use and store the access controller under allowed humidity and temperature. For the access controller with a temperature monitoring unit:
Install the temperature monitoring unit in a windless indoor environment, and maintain the indoor ambient temperature at 15C to 32C. Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. Electrical Safety Improper battery use might result in fire or explosion. When replacing battery, make sure that the same model is used. Use recommended power cables in the region under their rated specification. Use the power adapter provided with the access controller; otherwise, it might result in injury and device damage. The power supply should conform to the Safety Extra Low Voltage (SELV) requirements, and supply power with rated voltage that conforms to Limited Power Source in IEC60950-1. Please note that the power supply requirement is subject to the device label. Connect the device (I-type structure) to the power socket with earthing. The appliance coupler is a disconnection device. When using the coupler, keep the angle for easy operation. III Table of Contents 2.1 2.2 2.3 1.1 1.2 1.3 1.4 3.1 3.2 3.3 3.4 3.5 3.6 Foreword .................................................................................................................................................... I Important Safeguards and Warnings .................................................................................................... III 1 Overview ................................................................................................................................................. 1 Introduction ................................................................................................................................... 1 Features ........................................................................................................................................ 1 Application ..................................................................................................................................... 1 Dimension and Component .......................................................................................................... 2 2 Connection and Installation ................................................................................................................. 4 Cable Connections ........................................................................................................................ 4 Installation Notes........................................................................................................................... 6 Installation ..................................................................................................................................... 8 3 System Operations .............................................................................................................................. 10 Basic Configuration Procedure ................................................................................................... 10 Common Icons ............................................................................................................................ 10 Initialization ................................................................................................................................. 10 Standby Interface ......................................................................................................................... 11 Main Menu .................................................................................................................................. 12 Unlocking Methods ..................................................................................................................... 14 3.6.1 Cards ................................................................................................................................ 14 3.6.2 Face .................................................................................................................................. 14 3.6.3 User Password ................................................................................................................. 14 3.6.4 Administrator Password .................................................................................................... 15 User Management ...................................................................................................................... 15 3.7.1 Adding New Users ............................................................................................................ 15 3.7.2 Viewing User Information ................................................................................................. 17 Access Management ................................................................................................................... 17 3.8.1 Period Management ......................................................................................................... 17 3.8.2 Unlock ............................................................................................................................... 19 3.8.3 Alarm Configuration .......................................................................................................... 22 3.8.4 Door Status ....................................................................................................................... 23 3.8.5 Lock Holding Time ............................................................................................................ 23 Network Communication ............................................................................................................. 23 3.9.1 IP Address ......................................................................................................................... 23 3.9.2 Serial Port Settings ........................................................................................................... 25 3.9.3 Wiegand Configuration ..................................................................................................... 25 System ...................................................................................................................................... 26 3.10.1 Time ................................................................................................................................ 26 3.10.2 Face Parameter .............................................................................................................. 27 3.10.3 Image Mode .................................................................................................................... 28 3.10.4 Fill Light Mode Setting .................................................................................................... 28 3.10.5 Fill Light Brightness Setting ............................................................................................ 29 3.10.6 Volume Adjustment ......................................................................................................... 29 3.10.7 IR Light Brightness Adjustment ...................................................................................... 29 3.10.8 Restore to Factory Settings ............................................................................................ 29 3.10 3.7 3.8 3.9 IV 4.5 3.11 3.12 4.1 4.2 4.3 4.4 3.13 3.14 3.15 3.10.9 Reboot ............................................................................................................................ 29 USB ........................................................................................................................................... 30 3.11.1 USB Export ..................................................................................................................... 30 3.11.2 USB Import ...................................................................................................................... 31 3.11.3 USB Update .................................................................................................................... 31 Features .................................................................................................................................... 31 3.12.1 Privacy Setting ................................................................................................................ 33 3.12.2 Result Feedback ............................................................................................................. 34 Record ....................................................................................................................................... 36 Auto Test.................................................................................................................................... 37 System Info ............................................................................................................................... 38 4 Web Operations ................................................................................................................................... 39 Initialization ................................................................................................................................. 39 Login ............................................................................................................................................ 41 Resetting the Password .............................................................................................................. 41 Alarm Linkage ............................................................................................................................. 43 4.4.1 Setting Alarm Linkage ....................................................................................................... 43 4.4.2 Alarm Log .......................................................................................................................... 45 Call Configuration ....................................................................................................................... 45 4.5.1 Configuring the Access Controller .................................................................................... 45 4.5.2 SIP Server ......................................................................................................................... 47 4.5.3 Door Station Management ................................................................................................ 48 4.5.4 Indoor Monitor Management ............................................................................................ 50 4.5.5 Configuring the Managing Device .................................................................................... 52 4.5.6 Online Status .................................................................................................................... 53 4.5.7 Call Logs ........................................................................................................................... 54 Data Capacity .............................................................................................................................. 55 Video Setting ............................................................................................................................... 55 4.7.1 Data Rate .......................................................................................................................... 55 4.7.2 Image ................................................................................................................................ 56 4.7.3 Exposure ........................................................................................................................... 57 4.7.4 Motion Detection ............................................................................................................... 58 4.7.5 Volume Setting .................................................................................................................. 60 4.7.6 Image Mode ...................................................................................................................... 60 4.7.7 Local Coding ..................................................................................................................... 60 Face Detect ................................................................................................................................. 61 Network Setting ........................................................................................................................... 64 4.9.1 TCP/IP .............................................................................................................................. 64 4.9.2 Port ................................................................................................................................... 65 4.9.3 Register ............................................................................................................................. 66 4.9.4 P2P ................................................................................................................................... 66 Safety Management .................................................................................................................. 67 4.10.1 IP Authority...................................................................................................................... 67 4.10.2 Systems .......................................................................................................................... 67 User Management ..................................................................................................................... 68 4.11.1 Adding Users ................................................................................................................... 68 4.11.2 Modifying User Information ............................................................................................. 68 4.6 4.7 4.8 4.9 4.10 4.11 V 4.12 4.13 4.14 4.15 4.16 4.17 4.11.3 Onvif User ....................................................................................................................... 69 Maintenance .............................................................................................................................. 69 Configuration Management ...................................................................................................... 70 Upgrade .................................................................................................................................... 70 Version Information ................................................................................................................... 71 Online User ............................................................................................................................... 71 System Log ............................................................................................................................... 71 4.17.1 Querying Logs ................................................................................................................ 72 4.17.2 Backup Logs ................................................................................................................... 72 4.17.3 Admin Log ....................................................................................................................... 72 Exit ............................................................................................................................................ 73 5 FAQ ....................................................................................................................................................... 74 Appendix 1 Notes of Temperature Monitoring .................................................................................... 75 Appendix 2 Notes of Face Recording/Comparison ............................................................................ 76 Appendix 3 Cybersecurity Recommendations ................................................................................... 79 4.18 VI 1 Overview 1.1 Introduction 1.2 Features The access controller is an access control panel that supports unlock through faces, passwords, cards, and their combinations. LCD display, the resolution of 7-inch access controller is 1024 600. Support face unlock, IC card unlock, and password unlock; unlock by period. With face detection box; the largest face among faces that appear at the same time is recognized first; the maximum face size can be configured on the web. 2MP wide-angle WDR lens; with auto/manual illuminator. With face recognition algorithm, the access controller can recognize more than 360 positions on human face. Face verification accuracy > 99.5%; low false recognition rate. Support profile recognition; the profile angle is 090. Support liveness detection. Support duress alarm, tamper alarm, intrusion alarm, door contact timeout alarm, and illegal card exceeding threshold alarm. Support general users, patrol users, blacklist users, VIP users, guest users, and special users. Various unlock status display modes protect user privacy. Support body temperature monitoring through peripheral temperature monitoring unit. 1.3 Application The access controller is applicable for parks, office buildings, schools, factories, residential areas and other places. The identity is verified through face recognition to achieve passage without perception. 1 Figure 1-1 Networking 1.4 Dimension and Component Figure 1-2 Dimensions and components of model X (mm [inch]) Table 1-1 Component description (1) No. Name 1 2 MIC Temperature monitoring unit No. 3 4 Name Dual cameras Display 2 Figure 1-3 Dimensions and components of model Y (mm [inch]) Table 1-2 Component description (2) No. Name Temperature monitoring unit 1 2 3 4 IR light Phototransistor Dual cameras No. 5 6 7 8 Name Display Card swiping area White LED illuminator Mic 3 2 Connection and Installation 2.1 Cable Connections The cable connection of model X and model Y is the same. Here takes model X as an example. The access controller needs to be connected to devices like sirens, readers, and door contacts. Cable connections Figure 2-1 Table 2-1 Component description No. Name USB port Power port Ethernet port 1 2 3 4 Ethernet port (only supported by 7-inch model B access controllers) For detail function of each port, see the table below. Port Cable Color Cable Name Description Table 2-2 Port description CON1 Black Red RD RD+
Negative electrode of external card reader. Positive electrode of external card reader. 4 Port Cable Color Cable Name Description CASE Tamper alarm input of the external card reader. Blue White Green D1 D0 Brown LED Yellow B Purple A Wiegand D1 input (connected to external card reader)/output (connected to controller). Wiegand D0 input (connected to external card reader)/output (connected to controller). Connected to external reader and verify card number. RS-485 negative electrode input (connected to external to reader)/output controller, or connected to door control security module).
(connected card If the security module is enabled, you need to purchase access control security module separately. The security module needs separate power supply to provide power. Once the security module is enabled, the exit button, lock control and firefighting linkage will be invalid. RS-485 positive electrode input (connected to to reader)/output external controller, or connected to door control security module).
(connected card If the security module is enabled, you need to purchase access control security module separately. The security module needs separate power supply to provide power. Once the security module is enabled, the exit button, lock control and firefighting linkage will be invalid. Alarm 1 normally open output port. Alarm 1 common output port. Alarm 2 normally open output port. ALARM1_N O ALARM1_C OM ALARM2_N O ALARM2_C OM and and and and and White red White orange White blue White gray White green and White yellow CON2 Alarm 2 common output port. GND Connected to the common GND port. White Brown ALARM1 Alarm 1 input port. GND Connected to the common GND port. White and ALARM2 Alarm 2 input port. 5 Port Cable Color Cable Name Description purple Black red Black orange Black blue Black gray Black green Black brown Black yellow Black purple and and and and and and and and RX TX RS-232 receiving port. RS-232 sending port. GND Connected to the common GND port. SR1 Used for door contact detection. PUSH1 Door open button of door No.1 DOOR1_CO M Lock control common port. DOOR1_NO Lock control normally open port. DOOR1_NC Lock control normally closed port. CON3 2.2 Installation Notes If there is light source 0.5 meters away from the access controller, the minimum illumination should be no less than 100 Lux. It is recommended that the access controller is installed indoors, at least 3 meters away from windows and doors and 2 meters away from lights. Avoid backlight and direct sunlight. Ambient Illumination Requirement Figure 2-2 Ambient illumination requirement Temperature Monitoring Requirement It is recommended to install the temperature monitoring unit in an windless indoor environment (a relatively isolated area from the outdoor), and maintain the ambient temperature at 15C to 32C. Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. 6 If there is no suitable indoor environment (including areas directly facing indoor and outdoor areas, and outdoor doorways), set up a temporary passage with stable ambient temperature for temperature monitoring. The factors such as sunlight, wind, cold air, and air conditioning cold and warm air can easily affect the surface temperature of human body and the working status of the access controller, which will cause the temperature deviation between the monitored temperature and the actual temperature. Influencing factors of temperature monitoring Wind: Wind will take away the heat from the forehead, which will affect the accuracy of temperature monitoring. Sweating: Sweating is a way for the body to automatically cool down and dissipate heat. When the body sweats, the temperature will also decrease. Room temperature: If the room temperature is low, the surface temperature of human body will decrease. If the room temperature is too high, the human body will start to sweat, which will affect the accuracy of temperature monitoring. The temperature monitoring unit is sensitive to light waves with a wavelength of 10um to 15um. Avoid using it in the sun, fluorescent light sources, air conditioning outlets, heating, cold air outlets, and glass surfaces. Places Recommended Figure 2-3 Places recommended Places Not Recommended Figure 2-4 Places not recommended 7 2.3 Installation The installation of model X and model Y is the same. This section takes model X as an example. Make sure that the distance between the camera and ground is 1.4 meters. Figure 2-5 Installation height Figure 2-6 Installation diagram 8 Installation Procedure Step 1 Step 2 Fix the temperature monitoring unit to the bracket with 3 screws. Drill six holes (five bracket installation holes and one cable entry) in the wall according Step 3 Fix the bracket on the wall by installing the expansion screws into the six bracket to holes in the bracket. installation holes. Step 4 Step 5 Step 6 Step 7 Connect cables for access controller. See "2.1 Cable Connections."
Hang the access controller on the bracket hook. Tighten the screws at the bottom of the access controller. Apply silicon sealant to the cable outlet of the access controller. Figure 2-7 Applying silicon sealant 9 3 System Operations 3.1 Basic Configuration Procedure Figure 3-1 Basic configuration procedure Table 3-1 Icon description 3.2 Common Icons Icon Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. Turn to the previous page of the list. Turn to the next page of the list. Return to the previous menu. Enable. Disable. 3.3 Initialization Administrator password and an email should be set the first time the access controller is turned on or after reset; otherwise the access controller cannot be used. 10 Figure 3-2 Initialization Administrator and password set on this interface are used to log in to the web management The administrator password can be reset through the email address you entered if the platform. administrator forgets the password. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding '
" ; : &). 3.4 Standby Interface You can unlock the door through faces, passwords and cards. If there are no operations in 30 seconds, the access controller will go to the standby mode. The standby interface might vary with versions, and the actual interface shall prevail. 11 Figure 3-3 Homepage When card, face, fingerprint, and password are all set as unlock mode, the password icon will not be displayed at the upper-left corner of the access controller. Table 3-2 Homepage description No. Description Unlock methods: Card, face, fingerprint, and password. 1 2 3 4 5 6 7 Date & Time: Current date and time. Network status and USB status. Main menu icon. Only the administrator can enter the main menu. Password unlock icon. Administrator password unlock icon. Tap to call other devices. 3.5 Main Menu Administrators can add users of different levels, set access-related parameters, do network configuration, view access records and system information, and more in the main menu. Step 1 Tap on the standby interface. Step 2 Select a main menu entering method. 12 Different modes support different unlock methods, and the actual interface shall prevail. Figure 3-4 Administrator login 13 Figure 3-5 Main menu 3.6 Unlocking Methods You can unlock the door through faces, passwords, and cards. 3.6.1 Cards 3.6.2 Face Put the card at the card swiping area to unlock the door. Make sure that your face is centered on the face recognition frame, and then you can unlock the door. 3.6.3 User Password Enter the user password, and then you can unlock the door. 14 Step 1 Tap on the homepage. Step 2 Step 3 Enter the user ID, and then tap Enter the user password, and then tap
. The door is unlocked. 3.6.4 Administrator Password Enter the administrator password, and then you can unlock the door. There is only one administrator password for one access controller. The administrator password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback. Administrator password cannot be used when NC is selected at "3.8.1.5 NC Period."
Step 1 Tap on the homepage. Step 2 Tap Please Enter Administrator PWD. Step 3 Enter the administrator password, and then tap
. The door is unlocked. 3.7 User Management 3.7.1 Adding New Users You can add new users, view user lists, admin lists, and modify the administrator password on the User interface. You can add new users by entering user IDs, names, face images, cards, passwords, selecting user levels, and more. The following figures are for reference only, and the actual interface shall prevail. Step 1 Select User > New User. 15 Figure 3-6 New User Info Step 2 Configure parameters on the interface. Table 3-3 New user parameter description Parameter Description User ID Name Face Card Enter user IDs. The IDs can be numbers, letters, and their combinations, and the maximum length of the ID is 32 characters. Each ID is unique. Enter names with at most 32 characters (including numbers, symbols, and letters). Make sure that your face is centered on the picture capturing frame and the access controller will take a picture of the new users face automatically. You can register five cards at most for each user. On the card registration interface, enter your card number or swipe your card, and then the card information will be read by the access controller. You can enable the Duress Card function on the card registration interface. After enabling the duress function, an alarm will be triggered if a duress card is used to unlock the door. Only certain models support card unlock. PWD The door unlocking password. The maximum length of the password is 8 digits. User Level You can select a user level for new users. There are two options:
User: Users only have door unlock permission. 16 Parameter Description Admin: Administrators can unlock the door and also have parameter configuration permission. No matter whether there is an administrator in the access controller, administrator identity authentication is needed. You can set a period in which the user can unlock the door. You can set a holiday plan in which the user can unlock the door. Period Holiday Plan Valid Date You can set a period during which the unlocking information of the user is valid. There are six levels:
will get a prompt. General: General users can unlock the door normally. Blacklist: When users in the blacklist unlock the door, service personnel Guest: Guests are allowed to unlock the door certain times. Once they User Level exceed the maximum times, they cannot unlock the door again. Patrol: Paroling users can get their attendance tracked, but they have no unlock permission. VIP: When VIP unlocks the door, service personnel will get a prompt. Special: When special people unlock the door, there will be a delay of 5 seconds before the door is closed. Use Time When the user level is Guest, you can set the maximum number of times that the user can unlock the door. Step 3 Tap to save the configuration. 3.7.2 Viewing User Information You can view user list, admin list and enable administrator password through the User interface. 3.8 Access Management You can do access management on period, unlock mode, alarm, door status, and lock holding time. Tap Access to go to the access management interface. 3.8.1 Period Management You can set periods, holiday periods, holiday plan periods, door normally on periods, door normally closed periods, and remote verification periods. 17 3.8.1.1 Period Config 3.8.1.2 Holiday Group You can configure 128 periods (weeks) whose number range is 0127. You can set four periods on each day of a period (week). Users can only unlock the door in the periods that you set. You can set group holidays, and then you can set plans for holiday groups. You can configure 128 groups whose number range is 0127. You can add 16 holidays into a group. Configure the start time and end time of a holiday group, and then users can only unlock the door in the periods that you set. You can enter names with 32 characters (including numbers, symbols, and letters). Tap to save the holiday group name. 3.8.1.3 Holiday Plan You can add holiday groups into holiday plans. You can use holiday plans to manage user access permission in different holiday groups. Users can only unlock the door in the period that you set. 3.8.1.4 NO Period 3.8.1.5 NC Period If a period is added to the NO period, then the door is normally open in that period. The NO/NC period permissions are higher than permissions in other periods. If a period is added to the NC period, then the door is normally closed in that period. Users cannot unlock the door in this period. 3.8.1.6 Remote Verification Period If you configured the remote verification period, then when unlock doors during the period you configured, remote verification is required. To unlock the door in this period, a door unlock instruction sent by the management platform is needed. You need to enable the Remote Verification Period. means enabled. means not enabled. 18 3.8.2 Unlock 3.8.2.1 Unlock Mode There are three unlock modes: unlock mode, unlock by period, and group combination. Unlock modes vary with controller access models, and the actual controller access shall prevail. When the Unlock Mode is on, users can unlock through cards, faces, passwords, or any one of all the unlocking methods. Step 1 Select Access > Unlock Mode > Unlock Mode. Figure 3-7 Element (multiple choice) Step 2 Select unlock mode(s). Tap a selected unlock mode again, the unlock mode will be deleted. Step 3 Select a combination mode.
+ And means "and". For example, if you select card + PWD, it means, to unlock the door, you need to swipe your card first, and then enter password.
/ Or means "or". For example, if you select card/PWD, it means, to unlock the door, you can either swipe your card or enter password. Step 4 Tap to save the settings. 19 Step 5 Enable the Unlock Mode. means enabled. means not enabled. 3.8.2.2 Unlock by Period Doors can be unlocked through different unlock modes in different periods. For example, in period 1, the door can only be unlocked through cards; and in period 2, doors can only be locked through faces. Step 1 Select Access > Unlock Mode > Unlock by Period. Figure 3-8 Unlock by period Step 2 Set starting time and end time for a period, and then select a unlock mode. Step 3 Tap to save the settings. Step 4 Enable the Unlock by Period function. means enabled. means not enabled. 20 3.8.2.3 Group Combination Doors can only be unlocked by a group or groups that consist of more than two users if the Group Combination is enabled. Step 1 Select Access > Unlock Mode > Group Combination. Figure 3-9 Group combination Step 2 Tap to create a group. Figure 3-10 Add a group Parameter Description Table 3-4 Group parameter Add users to the newly created group. 1. Tap User List. User List 2. Tap
, and then enter a user ID. 3. Tap to save the settings. Unlock Mode There are three options: Card, PWD and Face. Valid User Valid users are the ones that have unlock permission. Doors can be unlocked only when the number of users to unlock the doors equals the valid user number. Valid users cannot exceed the total number of users in a group. If valid users equal total user numbers in a group, doors can only be unlocked by all the users in the group. If valid users are less than the total number of users in a group, doors can be unlocked by any users whose number equals the valid user number. Step 3 Tap to go back to the previous interface. Step 4 Tap to save the settings. 21 Step 5 Enable the Group Combination. means enabled. means not enabled. 3.8.3 Alarm Configuration Administrators can manage visitors unlock permission through alarm configuration. Select Access > Alarm. Figure 3-11 Alarm means enabled. means not enabled. Table 3-5 Parameters on the alarm interface Parameter Description After the anti-passback is enabled, users need to verify identities both for entry and exit; otherwise an alarm will be triggered. If a person enters with the identity checked and exits without the identity checked, an alarm will be triggered when the person tries to enter again and the person will have no permission to unlock the door any more. If a person enters without the identity checked, an alarm will be triggered when the person tries to exit with the identity checked, and the person will have no permission to unlock the door any more. After enabling the duress function, an alarm will be triggered when a duress card or duress password is used to unlock the door. After an unauthorized card is used to unlock the door more than 5 times in 50 seconds, an alarm will be triggered. An intrusion alarm will be triggered if a door is unlocked without having the door contact released. Anti-passback Duress Illegal Card Exceeding Time Intrusion Door Sensor A timeout alarm will be triggered if the time that a user takes to unlock the 22 Parameter Description Timeout door exceeds the Door Sensor Timeout time. The Door Sensor Timeout time range is 19999 seconds. Door Sensor On Only when the Door Sensor On is enabled can the intrusion alarm and door sensor timeout alarm be triggered. 3.8.4 Door Status There are three options: NO, NC, and Normal. NO: If NO is selected, the door status is normally open, which means the door will never be NC: If NC is selected, the door status is normally closed, which means the door will not be Normal: If Normal is selected, the door will be unlocked and locked depending on your closed. unlocked. settings. 3.8.5 Lock Holding Time Lock Holding Time is the duration in which the lock is unlocked. If the lock has been unlocked for a period that exceeds the duration, the lock will be automatically locked. 3.9 Network Communication To make the access controller work normally, you need to configure parameters for network, serial ports and Wiegand ports. 3.9.1 IP Address 3.9.1.1 IP Configuration Configure an IP address for the access controller and connect it to the network. 23 Figure 3-12 IP address configuration Table 3-6 IP configuration parameters Parameter Description NIC 1/2 Tap to configure parameters for the Ethernet port. IP Address/Subnet Mask/Gateway IP Address The IP address, subnet mask, and gateway IP address must be on the same network segment. DHCP (Dynamic Host Configuration Protocol). When the DHCP is enabled, the IP address can be automatically acquired, and the IP address, subnet mask and gateway IP address cannot be manually configured. P2P (peer-to-peer) technology enables users to manage devices without requiring DDNS, port mapping or transit server. Make sure that the computer used to log in to the web is in the same LAN with the device. 7-inch model X access controllers of have dual NICs. The default management address for ETH1 is 192.168.1.108, and for ETH2 is 192.168.2.108. 3.9.1.2 Active Register By active registering, you can connect the access controller to the management platform, and then you can manage the access controller through the management platform. Configurations you have made can be cleared on the managing platform, and the access controller can be initialized, you need to protect the platform managing permission in case of data loss caused by improper operation. For active register parameter. DHCP P2P Table 3-7 Active register 24 Name Parameter Server IP Address IP address of the managing platform. Port Device ID Port number of the managing platform. Subordinate device number on the managing platform. 3.9.1.3 Wi-Fi You can connect the access controller to the network through Wi-Fi if the access controller has Wi-Fi function. 3.9.2 Serial Port Settings Select serial input or serial output according to the use of the external devices. Select Connection > Serial Port. Figure 3-13 Serial port Select Serial Input when external devices that are with card reading and writing functions are connected to the access controller. Serial Input is selected to enable access card information to be sent to the access controller and the management platform. For access controllers with face recognition, card reading and writing functions, if you select Serial Output, access controller will send lock/unlock information to the access controller. There are two types of lock/unlock information:
User ID Card No. Select OSDP Input when card reader of OSDP protocol is connected to the access controller. The access controller can send card information to the management platform. 3.9.3 Wiegand Configuration Select Wiegand Input or Wiegand Output accordingly. Select Connection > Wiegand. 25 Figure 3-14 Wiegand Select Wiegand Input when an external card swipe mechanism is connected to the Select Wiegand Output when the access controller works as a reader that can be access controller. connected to the controller. Parameter Description Table 3-8 Wiegand output The Wiegand Output Type determines the card number or the digit of the number that can be recognized by the access controller. Wiegand Output Type Pulse Width Pulse Interval Wiegand26, three bytes, six digits. Wiegand34, four bytes, eight digits. Wiegand66, eight bytes, sixteen digits. You can set pulse width and pulse interval. You can select the types of output data. Output Data Type User ID: If User ID is selected, and then user ID will be output. Card No.: If Card No. is selected, and then card number will be output. 3.10 System 3.10.1 Time You can do date format setting, date setting, time setting, DST setting, NTP check, and time zone settings. When you select Network Time Protocol (NTP), you need to enable the NTP Check function first. Server IP Address: enter the IP address of the time server, time of the access controller will be synchronized with the time server. Port: Enter the port number of the time server. Interval (min): NPT check interval. Tap the save icon to save. 26 3.10.2 Face Parameter Figure 3-15 Face parameter Tap a parameter and do configuration, and then tap
. Name Description Table 3-9 Face parameter Face Recognition Threshold Face recognition accuracy can be adjusted. The larger the value is, the higher the accuracy will be. Max. Angle of Face Recognition Set the control panel shooting angle of profiles. The larger the value is, the wider range of the profiles will be recognized. Pupillary distance is the pixel value of the image between the centers of the pupils in each eye. You need to set an appropriate value so that the access controller can recognize faces as needed. The value changes according to the face sizes and the distance between faces and the lens. The closer the face is to the lens, the greater the value should be. If an adult is 1.5 meters away from the lens, the pupillary distance value can be within 50 to 70. When a person who does not have the access permission stands in front of the access controller and gets the face recognized, the controller will prompt that face recognition failed. The prompt interval is called recognition timeout. When a face has no access permission stands in front of the access controller, the controller will prompt that the face is invalid. The prompt interval is invalid face prompt interval. Pupillary Distance Recognition Timeout
(S) Invalid Face Prompt Interval (S) 27 Name Description Anti-fake Threshold This function prevents people from unlocking by human face images or face models. Set whether to enable the body temperature monitoring. Temp Unit: Select a temperature unit. Temp Rect: Set whether to display the temperature monitoring box or not. Temp Threshold (C): Set the temperature threshold. The monitored body temperature will be judged as high temperature if it is greater than or equal to the set value. the temperature deviation between Temp Correction Value: This parameter is for testing. The difference of the temperature monitoring environment might cause the monitored temperature and the actual temperature. You can select multiple monitored samples for testing, and then correct the temperature deviation by this parameter according to the comparison between the monitored temperature and the actual temperature. For example, if the monitored temperature is 0.5C lower than the actual temperature, the correction value is set to 0.5C; if the monitored the actual temperature, the correction value is set to -0.5C. is 0.5C higher temperature than Only the access controller with a temperature monitoring unit supports this parameter. No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed. Mask intercept: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is not allowed. Temp Parameters Mask Parameters 3.10.3 Image Mode There are three options:
Indoor: Select Indoor when the access controller is installed indoors;
Outdoor: Select Outdoor when the access controller is installed outdoors;
Other: Select Other when the access controller is installed at places with backlights like corridors and hallways. 3.10.4 Fill Light Mode Setting You can select fill light modes according to your needs. There are three modes:
Auto: When the photo sensor detects that the ambient environment is not dark, the fill light is normally off; otherwise, the fill light will be on. 28 NO: The fill light is normally on. NC: The fill light is normally closed. 3.10.5 Fill Light Brightness Setting You can select fill light brightness according to your needs. 3.10.6 Volume Adjustment You can adjust the beeping and voice volume. Step 1 Step 2 Select System > Volume. Select Beep Volume or Mic Volume as needed. Step 3 Tap or to adjust the volume. 3.10.7 IR Light Brightness Adjustment The larger the value is, the clearer the images will be; otherwise the more unclear the images will be. 3.10.8 Restore to Factory Settings changed. Data will be lost if you restore the access controller to the factory settings. After the access controller is restored to the factory settings, IP address will not be You can select whether to retained user information and logs. You can select to restore the access controller to the factory settings with all user You can select to restore the access controller to the factory settings with user information information and device information deleted. and device information retained. 3.10.9 Reboot Select Setting > Reboot, tap Reboot, and the access controller will be rebooted. 29 3.11 USB Make sure that the USB is inserted before exporting user information and updating. During exporting or updating, do not pull out the USB or do other operations; otherwise the exporting or updating will fail. You need to import information from one access controller to the USB before using USB to import information to another access controller. USB can also be used to update the program. 3.11.1 USB Export You can export data from the access controller to the USB after inserting the USB. The data exported is encrypted and cannot be edited. Step 1 Select USB > USB Export. Figure 3-16 USB export Step 2 Step 3 Select the data type that you want to export. Tap OK. Data exported will be saved in the USB. 30 3.11.2 USB Import Only data in the USB that was exported from one access controller can be imported into another access controller. Step 1 Select USB > USB Import. Figure 3-17 USB Import Step 2 Step 3 Select the data type that you want to import. Tap OK. Data in the USB flash drive will be imported into the access controller. 3.11.3 USB Update USB flash drive can be used to update the system. Step 1 Rename the updating file name to "update.bin", and save the "update.bin" file in the root directory of the USB flash drive. Step 2 Step 3 Select USB > USB Update. Tap OK. The update starts, and the access controller restarts after the update is finished. 3.12 Features You set privacy, card number reverse, security module, door sensor type, and result feedback. 31 Figure 3-18 Features Table 3-10 Feature description Parameter Description Privacy Setting See "3.12.1 Privacy Setting" for details. Card No. Reverse Security Module If the third-party card reader needs to be connected to the access controller through the wiegand output port, you need to enable the Card No. Reverse function; otherwise the communication between the access controller and the third party card reader might fail due to protocol discrepancy. If the security module is enabled, you need to purchase access control security module separately. The security module needs separate power supply to provide power. Once the security module is enabled, the exit button, lock control Thermogram Display Display a heat map at the upper-left corner. and firefighting linkage will be invalid. External Reader Turn it on and the temperature of the person will be monitored when Temp Monitoring he/she swipes the card. Door Sensor Type There are two options: NO and NC. Result Feedback Displays whether the unlock succeeded or failed. 32 3.12.1 Privacy Setting Figure 3-19 Privacy setting Parameter Description Table 3-11 Features PWD Reset Enable If the PWD Reset Enable function is enabled, you can reset the password. The PWD Reset function is enabled by default. Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands;
otherwise HTTP will be used. HTTPS CGI SSH When HTTPS is enabled, the access controller will restart automatically. Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications running on a server that generates web pages dynamically. When CGI is enabled, CGI commands can be used. The CGI is enabled by default. Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. When SSH is enabled, SSH provides cryptographic service for the data transmission. 33 Parameter Description Capture Photo Clear All Captured Photos If you select ON, when a user unlocks the door, the users photo will be automatically taken. This function is ON by default. Tap the icon, and you can delete all captured photos. Face Privacy Set different levels to blur the standby interface. 3.12.2 Result Feedback You can select a result feedback mode as needed. Select Features > Result Feedback. Photo & Name Figure 3-20 Photo & name 34 User Photo & Name Figure 3-21 User photo & name Only Name Figure 3-22 Only name 35 Success or Failure Figure 3-23 Success or failure 3.13 Record You can search for all unlocking records. Select Record > Search Punch Records. 36 Figure 3-24 Search punch records 37 3.14 Auto Test When you use the access controller for the first time or when the access controller malfunctioned, you can use auto test function to check whether the access controller can work normally. Do actions according to the prompts. When you select Auto Test, the access controller will guide you to do all the auto tests. 3.15 System Info You can view data capacity, device version, and hardware version of the access controller on the System Info interface. Figure 3-25 Auto test 38 4 Web Operations The access controller can be configured and operated on the web. Through the web you can set network parameters, video parameters, and access controller parameters; and you can also maintain and update the system. 4.1 Initialization You need to set a password and an email address before logging in to the web for the first time. Step 1 Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of the access controller in the address bar, and then press Enter. IE 8 and later are supported. Otherwise you might not log in to the web. Make sure that the computer used to log in to the web is in the same LAN with the device. 7-inch model X access controllers of have dual NICs. The default IP address for ETH1 is 192.168.1.108, and for ETH2 is 192.168.2.108. Figure 4-1 Initialization Step 2 Enter the new password, confirm password, enter an email address, and then click Next. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Set a password of high security level according to the password strength prompt. For security, keep the password properly after initialization and change the password regularly. 39 When you need to reset the administrator password by scanning the QR code, you need an email address to receive the security code. Step 3 Click Next. Figure 4-2 Auto check Step 4 You can decide whether to select Auto Check or not. Step 5 Click Next. It is recommended that Auto Check be selected to get the latest program in time. Figure 4-3 Finished configuration Step 6 Click Complete, and the initialization is completed. 40 4.2 Login and press Enter. Step 1 Open IE web browser, enter the IP address of the access controller in the address bar, IE 8 and later are supported. Otherwise you might not log in to the web. Make sure that the computer used to log in to the web is in the same LAN with the device. 7-inch model X access controllers of have dual NICs. The default management address for ETH1 is 192.168.1.108, and for ETH2 is 192.168.2.108. Login Figure 4-4 Step 2 Enter the user name and password. The default administrator name is admin, and the password is the login password after initializing the access controller. Modify the administrator regularly and keep it properly for the sake of security. If you forget the administrator login password, you can click Forgot password? to reset it. See "4.3 Resetting the Password."
Step 3 Click Login. The web interface is logged in. 4.3 Resetting the Password When resetting the password of the admin account, your email address will be needed. Step 1 Click Forgot password? on the login interface. 41 Figure 4-5 Tips Step 2 Step 3 Read the tips. Click OK. Figure 4-6 Reset Password Step 4 Scan the QR code on the interface, and you will get the security code. At most two security codes will be generated by scanning the same QR code. If security codes become invalid, to get more security codes, refresh the QR code. You need to send the content that you get after you scan the QR code to the designated email address, and then you will get the security code. Please use the security code within 24 hours after you receive it. Otherwise, it will become invalid. 42 If wrong security codes are entered for consecutive five times, the administrator will be frozen for five minutes. Enter the security code you have received. Click Next. Reset and confirm the new password. Step 5 Step 6 Step 7 The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character
(excluding ' " ; : &). Step 8 Click OK, and the reset is completed. 4.4 Alarm Linkage 4.4.1 Setting Alarm Linkage Alarm input devices can be connected to the access controller, and you can change the alarm linkage parameter as needed. Step 1 Select Alarm Linkage on the navigation bar. Figure 4-7 Alarm linkage Step 2 Click
, and then you can modify alarm linkage parameters. 43 Figure 4-8 Modifying alarm linkage parameter Table 4-1 Alarm linkage parameter description Parameter Alarm Input Name Description You cannot modify the value. Keep it default. Enter a zone name. Alarm Input Type Fire Link Enable There are two options: NO and NC. If alarm input type of the alarm device that you purchased is NO, select NO; otherwise you should select NC. If fire link is enabled the access controller will output alarms when fire alarms are triggered. The alarm details will be displayed in the alarm log. Alarm output and access link are NO by default if fire link is enabled. Alarm Output Enable The relay can output alarm information (will be sent management platform) if the Alarm Output is enabled. to the Duration (Sec.) The alarm duration, and the range is 1300 seconds. You can select an alarm output channel according to the alarming device that you have installed. Each alarm device can be regarded as a channel. After the Access Link is enabled, the access controller will be normally on or normally closed when there are input alarm signals. Channel Type There are two options: NO and NC. Alarm Output Channel Access Link Enable Step 3 Click OK. The configuration on the web will be synchronized with the configuration in the client if the access controller is added to a client. 44 4.4.2 Alarm Log You can view the alarm type and time range in the Alarm Log interface. Step 1 Select Alarm Linkage > Alarm Log. Figure 4-9 Alarm log Step 2 Select a time range and alarm type, and then click Query. Figure 4-10 Query results 4.5 Call Configuration The access controller can work as a door station and call other devices. 4.5.1 Configuring the Access Controller Set the device type and number. 4.5.1.1 Access Controller as SIP Server Step 1 Step 2 Log in to the web. Select Talkback Setting > Local. 45 Step 3 Configure the parameters. Figure 4-11 Local (1) Parameter Description Table 4-2 Parameter description Device Type The access controller can only work as a unit door station. Centre Call No. Enter a number to be identified by the management center. It should be
"888888" plus three numbers. VTO No. Cannot be configured. Group Call Transmission Mode Step 4 Click Confirm. When enabled, a call from the access controller to a master indoor station will also be sent to all its extention indoor stations. Mode1: Real-time call but the video and sound may be lagging with poor network. Mode2: Not real-time call but ensures smooth video and sound. 4.5.1.2 Other Device as SIP Server Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > Local. Configure the parameters. Figure 4-12 Local (2) Parameter Description Table 4-3 Parameter description Device Type Centre Call No. The access controller can work as a unit door station or fence station. Enter a number to be identified by the management center. It should be "888888" plus three numbers. Enter a number for the access controller. VTO No. It should be four digits. The first two should be 80 and the last two starts with 01, such as 8001. If there are multiple door stations, VTO numbers cannot be 46 Parameter Description the same. Mode1: Real-time call but the video and sound may be Transmission Mode lagging with poor network. Mode2: Not real-time call but ensures smooth video and sound. 4.5.2 SIP Server On the web, you can add door stations and indoor stations to the SIP server so that they can talk to each other. The SIP server can be the access controller or other door stations. When the access controller works as the SIP server, it can connect up to 50 other access controllers and indoor monitors combined. 4.5.2.1 Access Controller as SIP Server Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > SIP Server. Enable SIP Server and keep other parameters as default. Figure 4-13 SIP server (1) Step 4 Click OK and the access controller will restart. 47 4.5.2.2 Other Device as SIP Server Step 1 Step 2 Step 3 Step 4 Log in to the web. Select Talkback Setting > SIP Server. Select Server Type as VTO and do not enable SIP Server. Configure the parameters Figure 4-14 SIP server (2) Table 4-4 SIP server parameter description (1) The IP address of the door station working as the SIP server. Description 5060 by default. Keep the default values. SIP Domain Must be VDP. SIP server login username and password. Parameter IP Address Port Username Password SIP Server Username SIP Server Password Step 5 Click OK. 4.5.3 Door Station Management When the access controller works as the SIP server, add other door stations to call them. 48 Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > VTO No. Management. Click Add. Figure 4-15 VTO No. management Step 4 Configure the parameters. Figure 4-16 Add a door station Table 4-5 Parameter description Parameter Rec No. Description Number of the door station. Register Password Keep the default value. 49 Description Cannot be configured. Cannot be configured. IP address of the door station. Parameter Build No. Unit No. IP Address Username Password Step 5 Click OK. Web login username and password for the door station. 4.5.4 Indoor Monitor Management When the access controller works as the SIP server, add all relevant indoor monitors to call them. When there are master and extension indoor monitors, you need to enable group call function first before adding them. 4.5.4.1 Add One Indoor Monitor Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > Room No. Management. Click Add. Figure 4-17 Room No. Management Step 4 Enter the information. 50 Figure 4-18 Add one indoor monitor Parameter First Name Last Name Nick Name Room No. Table 4-6 Parameter description Description To differentiate each indoor monitor. Room number of the indoor monitor. It can contain up to five digits and must be the same as the one configured on the indoor monitor. When there are master and extension indoor monitors, the room number of master indoor monitor should end with "-0", and that of extension indoor monitors with "-1", "-2", "-3"For example, the master indoor monitor is 101-0, extension monitors are 101-1, 101-2 and 101-3. Register Type Register Password Step 5 Click OK. Keep the default value. You can also click Export to export the room number and import to other devices. 4.5.4.2 Add Indoor Monitors in Batches You can add up to 1024 indoor monitors. Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > Room No. Management. At the bottom, enter numbers for Unit Layer Amount, Room Amount in One Layer, First Floor Number and Second Floor Number. Unit layer amount can be 199, room amount in one layer 199, and floor number 199999. 51 Step 4 Click Add. Figure 4-19 Add indoor monitors in batches 4.5.5 Configuring the Managing Device When the access controller works as the SIP server, add other managing devices to call them. Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > VTS Management. Click Add. Figure 4-20 Add managing devices Step 4 Enter the information. VTS No. contains up to 9 digits. Login password for the managing device. Keep the default value. Step 5 Click OK. 52 Figure 4-21 Added a managing device Modify a managing device. You need to update the information when the register password or IP address of the managing device change. Click and enter the new password or IP address, and then click OK. Delete a managing device. Click
. 4.5.6 Online Status When the access controller works as the SIP server, administrators can log in to the web and check the information of online devices. Step 1 Step 2 Log in to the web. Select Talkback Setting > Status. 53 Figure 4-22 Status 4.5.7 Call Logs You can check up to 1024 call logs. Step 1 Step 2 Step 3 Log in to the web. Select Talkback Setting > Call.
(Optional) Click Export Data to export all the logs. Figure 4-23 Call logs 54 4.6 Data Capacity You can see how many users, cards and face images that the access controller can hold on the Data Capacity interface. Figure 4-24 Data capacity 4.7 Video Setting You can set parameters including data rate, image parameters (brightness, contrast, hue, saturation, and more), and exposure on the Video Setting interface. 4.7.1 Data Rate Figure 4-25 Data rate 55 Parameter Video Standard Channel Table 4-7 Data rate parameter description Description There are two options: NTSC and PAL. Select a standard according to the video standard of your region. There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera. There are four options: D1, VGA, 720p and 1080p. Select an option according to the video quality you want. Video Format Main Format Frame Rate Bit Rate 720p is set by default. If you need the call function, do not set it to 1080p. The rate at which consecutive frames appear on a display. The frame rate range is 130 fps. The number of bits that are conveyed or processed per unit of time. There are five options: 2 Mbps, 4 Mbps, 6 Mbps, 8 Mbps, and 10 Mbps. Video Format There are three options: D1, VGA, and QVGA. Frame Rate Extra Format Bit Rate The rate at which consecutive frames appear on a display. The frame rate range is 130 fps. The number of bits that are conveyed or processed per unit of time. There are options: 512 Kbps, 640 Kbps, 768 Kbps, 896 Kbps, 1024 Kbps, 1.25 Mbps, 1.5 Mbps, 1.75 Mbps, and 2 Mbps. 4.7.2 Image There are two channels, and you need to configure parameters for each channel. Step 1 Select Video Setting > Video Setting > Image. Figure 4-26 Image 56 Step 2 Select Wide Dynamic in the Backlight Mode. Table 4-8 Image parameter description Description The larger the value is, the brighter the images will be. Contrast is the difference in luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the brightness and color contrast will be. Hue The larger the value is, the deeper the color will be. The larger the value is, the brighter the colors will be. The value does not change image brightness. Close: Without modes. Auto: The system automatically adjusts scene modes. Sunny: In this mode, image hue will be reduced. Night: In this mode, image hue will be increased. Sunny is selected by default. Day/Night mode decides the working status of the fill light. Auto: The system automatically adjusts the day/night modes. Colorful: In this mode, images are with colors. Black and white: In this mode, images are in black and white. Close: Without backlight compensation. BLC: Backlight compensation corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in focus. WDR: In the wide dynamic range mode, the system dims bright areas and compensates dark areas to ensure the definition of objects in the bright areas and dark areas. When human faces are in the backlight, you need to enable WDR. HLC: Highlight compensation is needed to compensate for overexposure of highlights or strong light sources such as spotlights, headlights and porch lights. to create an image that is usable and not overtaken by a bright light. When the function is enabled, images will be displayed with left and right side reversed. When this function is enabled, images can be flipped over. Parameter Brightness Contrast Saturation Scene Mode Day/Night Mode Back Light Mode Mirror Flip 4.7.3 Exposure Table 4-9 Exposure parameter description Parameter Description Anti-flicker 50Hz: When the utility frequency of alternating current is 50Hz, the exposure is automatically adjusted to make sure that there are no stripes on images. 57 Parameter Description 60Hz: When the utility frequency of alternating current is 60Hz, the exposure is automatically adjusted to make sure that there are no stripes on images. Outdoor: When Outdoor is selected, the exposure mode can be switched. You can select from:
images. Auto: The access controller will automatically adjust brightness of Shutter Priority: The access controller will adjust image brightness according to shutter exposure value range. If the image brightness is not enough and the shutter value has reached upper or lower limit, the access controller will adjust gain value automatically to get ideal brightness. Manual: You can configure gain and shutter value manually to adjust image brightness. Exposure Mode When you select Outdoor in the Anti-flicker drop-down list, you can select Shutter Priority as the exposure mode. Exposure modes of different devices might vary, and the actual product shall prevail. Shutter The larger the shutter value is and the shorter the exposure time is, the darker the images will be. Shutter Value Range If you select Customized Range, you can customize the shutter value range. Gain Value Range When the gain value range is set, video quality will be improved. Exposure Compensation You can increase video brightness by adjusting exposure compensation value. 3D NR Grade When 3D Noise Reduction (RD) is enabled, video noise can be reduced, and high definition videos will be produced. You can adjust the value of the 3D NR when 3D NR is enabled. The larger the value is, the less the noise there will be. 4.7.4 Motion Detection Set a range in which moving objects can be detected. Step 1 Select Video Setting > Video Setting > Motion Detection. 58 Figure 4-27 Motion detection Step 2 Press and hold the left mouse button, and then drag the mouse in the red area. The red rectangles are motion detection area. The default motion detection range is all the rectangles. To draw a motion detection area, you need to click Remove All first. The motion detection area you draw will be a non-motion detection area if you draw in the default motion detection area. Figure 4-28 Motion detection area Step 3 Set sensitivity and threshold. Sensitivity represents the ability of each grid to sense motion. The larger the value is, the higher the sensitivity is. Threshold is the condition of motion detection. When grid number reaches the threshold, motion detection will be triggered. The smaller the value is, the more likely the motion detection will be triggered. 59 When grid number is smaller than the threshold, green line will appear; when grid number is more than the threshold, red line will appear. See. Step 4 Click OK to finish the setting. 4.7.5 Volume Setting You can adjust volume of the access controller speaker. Volume setting Figure 4-29 4.7.6 Image Mode There are three options: indoor, outdoor and other. Select Indoor when the access controller is installed indoors; select Outdoor when the access controller is installed outdoors; and select Other when the access controller is installed at places with backlights like corridors and hallways. Figure 4-30 Image mode 4.7.7 Local Coding Set up the area to be displayed on the indoor monitors. Step 1 Step 2 Step 3 Log in to the web. Select Video Setting > Local Coding. Enable the function. 60 Figure 4-31 Local coding 61 Step 4 Click OK. 4.8 Face Detect You can configure human face related parameters on this interface to increase the accuracy of the face recognition. Step 1 Select Face Detect. Figure 4-32 Face detect Step 2 Configure parameters. Parameter Description Face Recognition Threshold Table 4-10 Face detect parameter description The larger the value is, the higher the accuracy will be. Max. Angle of Face Recognition The larger the angle is, the wider range of the profiles will be recognized. Anti-fake Threshold Fill Light Brightness Setting Light Mode Fill Setting This function prevents people from unlocking by human face images or face models. There are two options: Enable and Close. You can set fill light brightness. There are three fill light modes. NO: Fill light is normally on. NC: Fill light is normally closed. Auto: Fill light will be automatically on when a motion detection When Auto is selected, the fill light will not be on even if Infrared Light event is triggered. 62 Parameter Description value is greater than 19. Infrared Light Adjust IR brightnees by dragging the scroll bar. Recognition Timeout When a person who does not have the access permission stands in front of the access controller and gets the face recognized, the controller will prompt that face recognition failed. The prompt interval is called recognition timeout. Invalid Face Prompt Interval When a face has no access permission stands in front of the access controller, the controller will prompt that the face is invalid. The prompt interval is invalid face prompt interval. Enable Exposure Face After face exposure is enabled, human face will be clearer when the access controller is installed outdoors. Pupillary Distance Channel Id Draw Target Detect Region Face Brightness Target Face Interval Exposure Temperature Monitoring Pupillary distance is the pixel value of the image between the centers of the pupils in each eye. You need to set an appropriate value so that the access controller can recognize faces as needed. The value changes according to the face sizes and the distance between faces and the lens. The closer the face is to the lens, the greater the value should be. If an adult is 1.5 meters away from the lens, the pupillary distance value can be within 50 to 70. There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera. Click Draw Target, and then you can draw the minimum face detection frame. Click Remove All, and you can remove all the frames you drew. Click Detect Region, move your mouse, and you can adjust the face detection region. Click Remove All, and you can remove all the detection regions. The default value is 50. Adjust the brightness as needed. After a face is detected, the access controller will give out light to illuminate the face, and the access controller will not give out light again until the interval you set has passed. Set whether to enable the body temperature monitoring. Temp Unit: Select a temperature unit. Temp Rect: Set whether to display the temperature monitoring box or not. Temp Monitoring Distance (cm): the end user cannot adjust the setting to below 20 cm distance between end user and the device. Temp Threshold (C): Set the temperature threshold. The monitored body temperature will be judged as high temperature if it is greater than or equal to the set value. Temp Correction Value: This parameter is for testing. The difference of the temperature monitoring environment might cause the monitored temperature and the actual temperature. You can select multiple monitored samples for testing. According to the comparison temperature deviation between the 63 Parameter Description between the monitored temperature and the actual temperature, you can correct the temperature deviation by this parameter. For example, if the monitored temperature is 0.5C lower than the actual temperature, the correction value is set to 0.5C; if the the actual monitored temperature, the correction value is set to -0.5C. is 0.5C higher temperature than Only the access controller with a temperature monitoring unit supports this parameter. No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed. Mask intercept: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is not allowed. Mask Mode Step 3 Click OK to finish the setting. 4.9 Network Setting 4.9.1 TCP/IP You need to configure IP address and DNS server to make sure that the access controller can communicate with other devices. Make sure that the access controller is connected to the network correctly. Step 1 Select Network Setting > TCP/IP. Figure 4-33 TCP/IP Step 2 Configure parameters. 64 Table 4-11 TCP/IP Parameter Description Ethernet Card Select to configure parameters of the card. IP Version There is one option: IPv4. MAC Address MAC address of the access controller. Mode Static DHCP Set IP address, subnet mask, and gateway address manually. After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured. If DHCP is effective, IP address, subnet mask, and gateway address will be displayed automatically; if DHCP is not effective, IP address, subnet mask, and gateway address will all be zero. If you want to see the default IP when DHCP is effective, you need to disable DHCP. IP Address Enter IP address, and then configure subnet mask and gateway address. IP address and gateway address must be in the same network segment. Subnet Mask Default Gateway Preferred DNS Server Alternate DNS Server Set IP address of the preferred DNS server. Set IP address of the alternate DNS server. Step 3 Click OK to complete the setting. Set the maximum connections clients that the access controller can be connected to and port numbers. Step 1 Step 2 Select Network Setting > Port. Configure port numbers. See the following table. Except max connection, you need to reboot the access controller to make the configuration effective after modifying values. Parameter Description Table 4-12 Port description You can set the maximum connections of clients that the access controller can be connected to. Max Connection Platform clients like Smart PSS are not counted. TCP Port Default value is 37777. HTTP Port Default value is 80. If other value is used as port number, you need to add this value behind the address when logging in through browsers. HTTPS Port Default value is 443. RTSP Port Default value is 554. 65 4.9.2 Port Step 3 Click OK to complete the setting. 4.9.3 Register When connected to external network, the access controller will report its address to the server that is designated by the user so that clients can get access to the access controller. Step 1 Step 2 Select Network Setting > Auto Register. Select Enable, and enter host IP, port, and sub device ID. Table 4-13 Auto register description Parameter Description Host IP Port Server IP address or server domain name. Server port used for auto registeration. Sub Device ID Access controller ID assigned by the server. Step 3 Click OK to complete the setting. 4.9.4 P2P Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Users can download mobile application by scanning QR code, and then register an account so that more than one access controller can be managed on the mobile app. You do not need to apply dynamic domain name, do port mapping or do not need transit server. If you are to use P2P, you must connect the access controller to external network; otherwise the access controller cannot be used. Figure 4-34 P2P 66 Step 1 Step 2 Step 3 Select Network Setting > P2P. Select Enable to enable P2P function. Click OK to complete the setting. Scan the QR code on your web interface to get the serial number of the access controller. 4.10 Safety Management 4.10.1 IP Authority Select a cybersecurity mode as needed. Figure 4-35 IP authority 4.10.2 Systems 4.10.2.1 System Service There are four options: SSH, PWD Reset Enable, CGI, and HTTPS. Refer to "3.12 Features to select one or more than one of them. The system service configuration done on the web page and the configuration on the Features interface of the access controller will be synchronized. 67 Figure 4-36 System service 4.10.2.2 Creating Server Certificate Click Create Server Certificate, enter needed information, click Save, and then the access controller will reboot. 4.10.2.3 Downloading Root Certificate Step 1 Click Download Root Certificate. Select a path to save the certificate on the Save File dialog box. Step 2 Double-click on the Root Certificate that you have downloaded to install the certificate. Install the certificate by following the onscreen instructions. 4.11 User Management You can add and delete users, modify users passwords, and enter an email address for resetting the password when you forget your password. 4.11.1 Adding Users Click Add on the User Mgmt. interface to add users, and then enter username, password, confirmed password, and remark. Click OK to complete the user adding. 4.11.2 Modifying User Information You can modify user information by clicking on the User Mgmt. interface. 68 Figure 4-37 User management 4.11.3 Onvif User Open Network Video Interface Forum (ONVIF), a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. When ONVIF is used, administrator, operator, and user have different permission of ONVIF server. Create onvif users as needed. Figure 4-38 Onvif user 4.12 Maintenance You can make the access controller reboot itself in idle time to improve the running speed of the access controller. You need to set the auto reboot date and time. The default reboot time is at 2 Oclock in the morning on Tuesday. Click Reboot Device, the access controller will reboot immediately. Click OK, the access controller will reboot at 2 Oclock in the morning every Tuesday. 69 Figure 4-39 Maintenance 4.13 Configuration Management You need to do configuration management, select unlock result feedback, Wiegand and serial settings for the access controller. When more than one access controller needs the same configuration, you can configure parameters for them by importing or exporting configuration files. Figure 4-40 Configuration management 4.14 Upgrade You can select Auto Check to upgrade the system automatically. You can also select Manual Check to upgrade the system manually. Figure 4-41 Upgrade 70 4.15 Version Information You can view information including MAC address, serial number, MCU version, web version, security baseline version, and system version. 4.16 Online User You can view username, IP address, and user login time on the Online User interface. Figure 4-42 Online user 4.17 System Log You can view and backup the system log on the System Log interface. 71 Figure 4-43 System log 72 4.17.1 Querying Logs Select a time range and its type, click Query, and logs meet the conditions will be displayed. 4.17.2 Backup Logs Click Backup to back up the logs displayed. 4.17.3 Admin Log Enter Admin ID on the Admin Log interface, click Query, and then you will see the administrators operation records. Hover the mouse cursor over
, and then you can see detailed information of the current user. 4.18 Exit Click
, click OK, and then you will log out the web interface. Figure 4-44 Admin log 73 5 FAQ 1 The access controller fails to start after power-on. Check whether the 12V power supply is correctly connected, and whether the power button is pressed. 2 Faces cannot be recognized after the access controller powers on. Make sure that Face is selected in the unlock mode. See 3.8.2 Unlock. Make sure that Face is selected as unlock mode in Access > Unlock Mode > Group Combination. See 3.8.2.3 Group Combination. 3 There is no output signal when the access controller and the external controller are connected to the Wiegand port. Check whether the GND cable of access controller and the external controller are connected. 4 Configurations cannot be made after the administrator and password are forgotten. Delete administrators through the platform, or contact technical support to unlock the access controller remotely. 5 User information, and face images cannot be imported into the access controller. Check whether names of XML files and titles of tables were modified because the system will identify the files through their titles. 6 When a users face is recognized, but other users information is displayed. Make sure that when importing human faces, there are no other people around. Delete the original face, and import it again. 74 Appendix 1 Notes of Temperature Monitoring Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. Install the temperature monitoring unit in an indoor windless environment, and maintain the indoor ambient temperature at 15C to 32C. Avoid direct sunlight on the temperature monitoring unit. Avoid installing the temperature monitoring unit facing at the light source and glass. Keep the temperature monitoring unit away from sources of thermal interference. The factors such as sunlight, wind, cold air, and air conditioning cold and warm air will affect the surface temperature of human body, which will cause the temperature deviation between the monitored temperature and the actual temperature. Sweating is also a way for the body to automatically cool down and dissipate heat, which will also cause the temperature deviation between the monitored temperature and the actual temperature. Maintain the temperature monitoring unit regularly (every 2 weeks). Use a soft dust-free cloth to gently wipe the dust on the surface of the temperature sensor and the distance sensor to keep it clean. 75 Appendix 2 Notes of Face Recording/Comparison Before Registration Glasses, hats, and beards might influence face recognition performance. Do not cover your eyebrows when wearing hats. Do not change your beard style greatly if you will use the device; otherwise face recognition might fail. Keep your face clean. Keep the device at least two meters away from light source and at least three meters away from windows or doors; otherwise backlight and direct sunlight might influence face recognition performance of the device. During Registration You can register faces through the access controller or through the platform. For registration through the platform, see the platform user manual. Make your head center on the photo capture frame. A picture of your face will be captured automatically. Appendix Figure 2-1 Registration 76 Do not shake your head or body, otherwise the registration might fail. Avoid two faces appear in the capture frame at the same time. Face Position If your face is not at the appropriate position, face recognition effect might be influenced. Appendix Figure 2-2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. Do not wear glasses, hats, heavy beards, or other face ornaments that influence face With eyes open, without facial expressions, and make your face toward the center of image recording. camera. When recording your face or during face recognition, do not keep your face too close to or 77 too far from the camera. Appendix Figure 2-3 Head position Appendix Figure 2-4 Face distance When importing face images through the management platform, make sure that image resolution is within the range 150 300600 1200; image pixels are more than 500 500; image size is less than 75 KB, and image name and person ID are the same. Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area, and the aspect ratio does not exceed 1:2. 78 Appendix 3 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: its something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your device (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the device is connected to the public network, it is recommended to enable the "auto-check for updates"
the function manufacturer. firmware updates released by information of to obtain timely We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection We suggest that you perform physical protection to device, especially storage devices. For example, place the device in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable device (such as USB flash disk, serial port), etc. 2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 3. Set and Update Passwords Reset Information Timely The device supports password reset function. Please set up related information for password reset in time, including the end users mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed. 4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. 5. Change Default HTTP and Other Service Ports 79 We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission. Reminder: encrypted transmission will cause some loss in transmission efficiency. 11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is logged in without authorization. Check device log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations. 12. Network Log Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing. 13. Construct a Safe Network Environment In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. 80 Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. 81
1 2 | Label and Label Location | ID Label/Location Info | 1.54 MiB | April 29 2021 |
Face Recognition Access Controller DHI-ASI7213X-V1-T1 12V ,4A P/N:1.0.01.25.11282 MAC1: AA:BB:CC:11:22:00 MAC2:
AA:BB:CC:11:22:33 6M078BDPAG00001 S/N:
FCC ID: SVN-ASI7213X-T1 MADE IN CHINA ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD.
1 2 | Authorization Letter | Cover Letter(s) | 210.32 KiB | April 29 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Date: 2021-03-23 Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 To whom it may concern:
I, the undersigned, hereby authorize UL-CCIC COMPANY LIMITED to act on our behalf in all manners relating to application for equipment authorization, including signing of all documents relating to these matters. Any and all acts carried out by UL-CCIC COMPANY LIMITED on our behalf shall have the same effect as acts of our own. I, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). In authorizing UL-CCIC COMPANY LIMITED as our representative, we still recognize that we are responsible to:
a) comply with the relevant provisions of the certification program;
b) c) d) e) f) make all necessary arrangements for the conduct of the evaluation, including provision for examining documentation and access to all areas, records (including internal audit reports) and personnel for the purposes of evaluation (e.g. testing, inspection, assessment, surveillance, reassessment) and resolution of complaints;
make claims regarding certification only in respect of the scope for which certification has been granted;
do not use our product certification in such a manner as to bring the Certification Division into disrepute and not make any statement regarding our product certification which the Certification Division may consider misleading or unauthorized;
upon suspension or cancellation of certification, discontinue use of all advertising matter that contains any reference thereto and return any certification documents as required by the Certification Division;
use certification only to indicate the products are certified as being in conformity with specified standards;
g) h) i) j) endeavor to ensure that no certificate or report nor any part thereof is used in a misleading manner;
ensure that any reference to our product certification in communication media such as documents, brochures or advertising, complies with the requirements of the Certification Division;
keep a record of all complaints made known to us relating to the products compliance with requirements of the relevant standard and to make these records available to the when requested;
take appropriate action with respect to such complaints and any deficiencies found in products or services that affect compliance with the requirements for certification;
k) document the actions taken. This authorization is valid until further written notice from the applicant. Sincerely Yours, Signed by:
Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Contact Name: Yolanda chen Title of PersonCertificate Engineer Address: No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China
1 2 | Confidentiality Letter | Cover Letter(s) | 153.80 KiB | April 29 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Request for Confidentiality Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 Subject:
FCC IDSVN-ASI7213X-T1 To Whom It May Concern:
Pursuant to the provisions of Sections 0.457 and 0.459 of the Commissions rules (47 CFR 0.457, 0.459), we are requesting the Commission to withhold the following attachments as confidential document from public disclosure indefinitely. Schematic Diagram Block Diagram Theory of Operation Above mentioned document contains detailed system and equipment description are considered as proprietary information in operation of the equipment. The public disclosure of above documents might be harmful to our company and would give competitor an unfair advantage in the market. It is our understanding that all measurement test reports, FCC ID label format and correspondent during certification review process cannot be granted as confidential documents and those information will be available for public review once the grant of equipment authorization is issued. Best Regards Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Contact Name: Yolanda chen Title of PersonCertificate Engineer Address: No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China Date:2021/03/23
1 2 | Declaration Letter | Cover Letter(s) | 198.91 KiB | April 29 2021 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Address: No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China Confirmation Letter We, ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. The product: Face Recognition Access Controller And model No.:
DHI-ASI7213X-V1-T1;DH-ASI7213X-V1-T1;ASI7213X-V1-T1;DHI-ASI7213X-T1;
DH-ASI7213X-T1;ASI7213X-T1;DHI-ASI7213X;DH-ASI7213X;ASI7213X;K1X DH-ASI7213X-V1-T1;ASI7213X-V1-T1;DHI-ASI7213X-T1;DH-ASI7213X-T1;ASI7213X-
T1;DHI-ASI7213X;DH-ASI7213X;ASI7213X;K1X have the same technical construction including circuit diagram, PCB Layout, components and component layout, all electrical construction and mechanical construction, with DHI-ASI7213X-V1-T1. The difference is only Lens/trademark/ or the name of the models Best Regards Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Contact Name: Yolanda chen Title of PersonCertificate Engineer Address: No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2021-04-29 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
2 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2021-04-29
|
||||
1 2 | Applicant's complete, legal business name |
Zhejiang Dahua Vision Technology Co., Ltd
|
||||
1 2 | FCC Registration Number (FRN) |
0028432326
|
||||
1 2 | Physical Address |
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
|
||||
1 2 |
No.1199, Bin'an Road, Binjiang District, Hangzhou
|
|||||
1 2 |
Hangzhou, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
L******@ul.com
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 | Grantee Code |
SVN
|
||||
1 2 | Equipment Product Code |
ASI7213X-T1
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
Y****** c******
|
||||
1 2 | Telephone Number |
0571-********
|
||||
1 2 | Fax Number |
0571-********
|
||||
1 2 |
c******@dahuatech.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | DXX - Part 15 Low Power Communication Device Transmitter | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Face Recognition Access Controller | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Power Output listed is average conducted. This device has 20 MHz and 40MHz bandwidth mode. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filling. | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
UL-CCIC Company Limited
|
||||
1 2 | Name |
C****** Z********
|
||||
1 2 | Telephone Number |
+86 5********
|
||||
1 2 |
C******@ul.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2412.00000000 | 2462.00000000 | 0.0290000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 13.56000000 | 13.56000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC