all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual | Users Manual | 3.54 MiB | July 10 2020 | |||
1 2 |
|
Internal photo | Internal Photos | 3.56 MiB | July 10 2020 | |||
1 2 |
|
External Photo | External Photos | 3.84 MiB | July 10 2020 | |||
1 2 |
|
Label | ID Label/Location Info | 127.90 KiB | July 10 2020 | |||
1 2 | Block Diagram | Block Diagram | July 10 2020 | confidential | ||||
1 2 |
|
Channel Statement | Cover Letter(s) | 253.20 KiB | July 10 2020 | |||
1 2 |
|
Confidentiality Letter | Cover Letter(s) | 417.10 KiB | July 10 2020 | |||
1 2 |
|
Declaration Letter | Cover Letter(s) | 733.19 KiB | July 10 2020 | |||
1 2 |
|
MPE Report | RF Exposure Info | 342.60 KiB | July 10 2020 | |||
1 2 |
|
Operational Description | Operational Description | 28.45 KiB | July 10 2020 | |||
1 2 |
|
Power of Attorney Letter | Cover Letter(s) | 434.30 KiB | July 10 2020 | |||
1 2 | Schematics | Schematics | July 10 2020 | confidential | ||||
1 2 |
|
Test Report | Test Report | 3.32 MiB | July 10 2020 | |||
1 2 |
|
test Setup Photo | Test Setup Photos | 797.09 KiB | July 10 2020 | |||
1 2 | Schematic | Schematics | July 10 2020 | confidential |
1 2 | User Manual | Users Manual | 3.54 MiB | July 10 2020 |
User Manual 5/7-inch Linux Visible Light Product Version: 1.0 Date: June 2019 ZM 1 Important Statement Thank you for choosing our product. Before using this product, please read this user manual carefully to avoid risks of danger to the users of this product or those nearby and damaging the device. Follow these instructions to ensure that your product functions properly and completes verifications in a timely manner. Unless authorized by our company, no group or individual shall take excerpts of or copy all or part of these instructions nor transmit the contents of these instructions by any means. The products described in this manual may include software that is copyrighted by our company and its possible licensors. No one may copy, publish, edit, take excerpts of, decompile, decode, reverse-engineer, rent, transfer, sublicense, or otherwise infringe upon the software's copyright unless authorized by the copyright holder(s). This is subject to relevant laws prohibiting such restrictions. As this product is regularly updated, we cannot guarantee exact consistency between the actual product and the written information in this manual. Our company claims no responsibility for any disputes that arise due to differences between the actual technical parameters and the descriptions in this document. The manual is subject to change without prior notice. About This Manual This manual introduces the operations, interfaces and functions of Linux Visible Light Product. For installation, please refer to the Quick Start Guide of the product accordingly. Features and parameters with are not available in all devices. All pictures shown are for illustration purpose only. Pictures in this manual may not be exactly consistent with the actual products. Contents 1 Notice for Use ............................................................................................................................................................................................................................... 1 1.1 Finger Positioning
................................................................................................................................................................................................. 1 1.2 Standing Position, Facial Expression and Standing Posture ........................................................................................................... 1 1.3 Face Registration ......................................................................................................................................................................................................... 2 1.4 Standby Interface ....................................................................................................................................................................................................... 3 1.5 Virtual Keyboard .......................................................................................................................................................................................................... 5 1.6 Verification Mode ........................................................................................................................................................................................................ 6 1.6.1 Fingerprint Verification
...................................................................................................................................................................... 6 1.6.2 Password Verification ............................................................................................................................................................................... 10 1.6.3 Facial Verification ........................................................................................................................................................................................ 13 1.6.4 Combined Verification ............................................................................................................................................................................ 16 2 Main Menu .................................................................................................................................................................................................................................... 17 3 User Management .................................................................................................................................................................................................................... 18 3.1 Adding Users ................................................................................................................................................................................................................ 18 3.2 Search for Users .......................................................................................................................................................................................................... 23 3.3 Edit Users ......................................................................................................................................................................................................................... 24 3.4 Deleting Users.............................................................................................................................................................................................................. 24 4 User Role ......................................................................................................................................................................................................................................... 25 5 Communication Settings ..................................................................................................................................................................................................... 28 5.1 Network Settings ....................................................................................................................................................................................................... 28 5.2 PC Connection ............................................................................................................................................................................................................ 30 5.3 Cloud Server Setting ................................................................................................................................................................................................ 31 5.4 Wiegand Setup ............................................................................................................................................................................................................ 31 6 System Settings .......................................................................................................................................................................................................................... 35 6.1 Date and Time .............................................................................................................................................................................................................. 35 6.2 Attendance/Access Logs Setting .................................................................................................................................................................... 37 6.3 Face Parameters .......................................................................................................................................................................................................... 38 6.4 Fingerprint Parameters
..................................................................................................................................................................................... 40 6.5 Factory Reset ................................................................................................................................................................................................................ 41 6.6 USB Upgrade
........................................................................................................................................................................................................... 41 7. Personalize Settings ................................................................................................................................................................................................................ 42 7.1 Interface Settings ....................................................................................................................................................................................................... 42 7.2 Voice Settings ............................................................................................................................................................................................................... 44 7.3 Bell Schedules
........................................................................................................................................................................................................ 44 I 7.4 Punch State Options
.......................................................................................................................................................................................... 45 7.5 Shortcut Key Mappings
................................................................................................................................................................................... 47 8. Data Management .................................................................................................................................................................................................................. 50 8.1 Delete Data .................................................................................................................................................................................................................... 50 9. Access Control ............................................................................................................................................................................................................................ 53 9.1 Access Control Options ......................................................................................................................................................................................... 54 9.2 Time Schedule ............................................................................................................................................................................................................. 55 9.3 Holiday Settings .......................................................................................................................................................................................................... 57 9.4 Access Groups
........................................................................................................................................................................................................ 58 9.5 Combined Verification Settings........................................................................................................................................................................ 60 9.6 Duress Options Settings ........................................................................................................................................................................................ 61 10. USB Manager
...................................................................................................................................................................................................................... 63 10.1 Download .................................................................................................................................................................................................................... 63 10.2 Upload............................................................................................................................................................................................................................ 64 11. Attendance Search ............................................................................................................................................................................................................... 65 12. Autotest ....................................................................................................................................................................................................................................... 68 13. System Information.............................................................................................................................................................................................................. 69 14. Connect to ZKBioSecurity Software .......................................................................................................................................................................... 70 14.1 Set the Communication Address ................................................................................................................................................................. 70 14.2 Add Device on the Software ........................................................................................................................................................................... 71 14.3 Add Personnel on the Software .................................................................................................................................................................... 71 Statement on the Right to Privacy ..................................................................................................................................................................................... 73 Eco-friendly Use ............................................................................................................................................................................................................................. 74 II 1 Notice for Use 1.1 Finger Positioning accurately press onto the fingerprint reader. Proper fingerprint placement:
reader. Improper fingerprint placement:
Recommended fingers: index, middle, or ring fingers; avoid using the thumb or pinky, as they are difficult to Press your finger onto the fingerprint reader. Ensure that the center of your finger is aligned with the fingerprint Too close to the edge Vertical Crooked Too low NOTE: Please use the correct method when pressing your fingers onto the fingerprint reader for registration and identification. Our company will assume no liability for recognition issues that may result from incorrect usage of the product. We reserve the right of final interpretation and modification concerning this point. 1.2 Standing Position, Facial Expression and Standing Posture The recommended distance The distance between the device and a user whose height is within 1.4m-1.8m is recommended to be 0.5m. Users may slightly move forwards and backwards to improve the quality of facial images captured. Facial expression and standing posture Linux Visible Light Product User Manual 1 Note: During enrolment and verification, please remain natural facial expression and standing posture. 1.3 Face Registration registration. The page looks like this:
Try to keep the face in the center of the screen during registration. Please face the camera and stay still during face 2 Linux Visible Light Product User Manual 1.4 Standby Interface After connecting the power supply, enter the following standby interface:
Notes:
3. 1. Click to enter the User ID input interface. 2. When there is no super administrator set in the device, click to enter the menu. After setting the super administrator, it requires the super administrators verification before entering the menu operation. For the security of the device, it is recommended to register super administrator the first time you use the device. The switch of punch state can be done directly by using the screen shortcut keys. Click anywhere on the screen without icons, and six shortcut keys appear, as shown in the figure below:
Linux Visible Light Product User Manual 3 Press the corresponding shortcut key to select the current punch state, which is shown in green. Please refer to "7.5 Shortcut Key Mappings" below for the specific operation method. 4 Linux Visible Light Product User Manual 1.5 Virtual Keyboard Note: The device supports the input of English, numbers and symbols. Click [En] to switch to English keyboard. Press [123] to switch to the numeric and symbolic keyboard, and click [ABC] to return to the alphabetic keyboard. Click the input box, virtual keyboard appears. Click [ESC] to exit the input. Linux Visible Light Product User Manual 5 1.6 Verification Mode 1.6.1 Fingerprint Verification 1: N fingerprint verification mode stored in the device. scanner. Positioning. Verification is successful. Compares the fingerprint that is being pressed onto the fingerprint reader with all of the fingerprint data that is The device will enter the fingerprint authentication mode when a user presses his/her finger onto the fingerprint Please follow the correct way to place your finger onto the sensor. For details, please refer to section 1.1 Finger 6 Linux Visible Light Product User Manual Verification is failed. 1: 1 fingerprint verification mode User ID input via the virtual keyboard. authentication method. Compares the fingerprint that is being pressed onto the fingerprint reader with the fingerprints that are linked to Users may try verifying their identities with 1:1 verification mode when they cannot gain access with 1: N Click the button on the main screen to enter 1:1 fingerprint verification mode. 1. Input the user ID and press [OK]. Linux Visible Light Product User Manual 7 If the user has registered face and password in addition to his/her fingerprints and the verification method is set to fingerprint/ password/ face verification, the following screen will appear. Select the fingerprint icon to enter fingerprint verification mode. 2. Press the fingerprint to verify. 8 Linux Visible Light Product User Manual 3. Verification is successful. 4. Verification is failed. Linux Visible Light Product User Manual 9 1.6.2 Password Verification Compare the entered password with the registered User ID and password. Click the button on the main screen to enter the 1:1 password verification mode. 1. Input the user ID and press [OK]. If an employee registers face and fingerprint in addition to password, the following screen will appear. Select the icon to enter password verification mode. 10 Linux Visible Light Product User Manual 2. Input the password and press [OK]. Linux Visible Light Product User Manual 11 Verification is successful. Verification is failed. 12 Linux Visible Light Product User Manual 1.6.3 Facial Verification 1:N face verification box of comparison result. Compare the acquired facial images with all face data registered in the device. The following is the pop-up prompt 1:1 face verification Compare the face captured by the camera with the facial template related to the entered user ID. Press on the main interface and enter the 1:1 facial verification mode. 1. Enter the user ID and click [OK]. Linux Visible Light Product User Manual 13 If an employee registers password and fingerprint in addition to face, the following screen will appear. Select the icon to enter face verification mode. After successful verification, the prompt box "successfully verified" will appear. 14 Linux Visible Light Product User Manual If the verification is failed, it will prompts Please adjust your position!. Linux Visible Light Product User Manual 15 1.6.4 Combined Verification To increase security, this device offers the option of using multiple forms of verification methods. A total of 11 different verification combinations can be used, as shown below:
"/" means or, and "+" means and. You must register the required verification information before using the combination verification mode, otherwise the verification may fail. For example, if a user uses Face Registration but the verification mode is Face + Password, this user will never pass verification. Notes:
1 2 16 Linux Visible Light Product User Manual 2 Main Menu Press on the initial interface to enter the main menu, as shown below:
Items User Mgt. User Role COMM. System Personalize Data Mgt. USB Manager Attendance Search Descriptions To add, edit, view, and delete basic information about a user. To set the permission scope of the custom role and enroller, that is, the rights to operate the system. To set the relevant parameters of network, PC connection, cloud server and Wiegand. To set parameters related to the system, including date & time, attendance/access logs setting, face, fingerprint parameters , reset to factory and USB upgrade
. To customize settings of interface display, voice, bell, punch state options and shortcut key
. To delete all relevant data in the device. Access Control To set the parameters of the lock and the relevant access control device. To upload or download specific data from a USB drive. Query the specified attendance/access record, check attendance photos and blacklist photos. Linux Visible Light Product User Manual 17 To automatically test whether each module functions properly, including the LCD, voice, Autotest fingerprint sensor
, camera and real-time clock. System Info To view data capacity, device and firmware information of the current device. 3 User Management 3.1 Adding Users Click User Mgt. on the main menu. Click New User. Register a User ID and Name Enter the user ID and name. Notes:
1 2 3 A user name may contain 17 characters. The user ID may contain 1-9 digits by default. During the initial registration, you can modify your ID, which cannot be modified after registration. 18 Linux Visible Light Product User Manual If a message "Duplicated ID" pops up, you must choose another ID. 4 Setting the User Role There are two types of user accounts: the normal user and the super admin. If there is already a registered administrator, the normal users have no rights to manage the system and may only access authentication verifications. The administrator owns all management privileges. If a custom role is set, you can also select user defined role permissions for the user. Click User Role to select Normal User or Super Admin. Note: If the selected user role is the Super Admin, the user must pass the identity authentication to access the main menu. The authentication is based on the authentication method(s) that the super administrator has registered. Please refer to 1.6 Verification Method. Register fingerprint Click Fingerprint to enter the fingerprint registration page. Select the finger to be enrolled. Linux Visible Light Product User Manual 19 Press the same finger on the fingerprint reader three times. Green indicates that the fingerprint was enrolled successfully. 20 Linux Visible Light Product User Manual Register face Click Face to enter the face registration page. Please face the camera and stay still during face registration. The registration interface is as follows:
Register password Click Password to enter the password registration page. Enter a password and re-enter it. Click OK. If the two entered passwords are different, the prompt "Password not match" will appear. Linux Visible Light Product User Manual 21 Note: The password may contain one to eight digits by default. When a user registered with a photo passes the authentication, the registered photo will be displayed. Click User Photo, click the camera icon to take a photo. The system will return to the New User interface after Note: While registering a face, the system will automatically capture a picture as the user photo. If you do not want to register a user photo, the system will automatically set the picture captured as the default photo. Register user photo taking a photo. Access Control Role User access control sets the door unlocking rights of each person, including the group that the user belongs to, the verification mode, duress fingerprint and whether to apply group time period. Click Access Control Role > Access Group, assign the registered users to different groups for better management. New users belong to Group 1 by default, and can be reassigned to other groups. The device supports up to 99 access control groups. Select verification mode for the user, click Access Control Role > Verification Mode. Duress Fingerprint: The user may specify one or more fingerprints that have been registered as a duress fingerprint(s). When press the finger corresponding to the duress fingerprint on the sensor and pass the verification, the system will immediately generate a duress alarm. Select whether to apply group time period. 22 Linux Visible Light Product User Manual 3.2 Search for Users Click the search bar on the user list and enter the retrieval keyword (The keyword may be an ID, surname or full name.). The system will search for the users related to the information. Linux Visible Light Product User Manual 23 3.3 Edit Users Choose a user from the list and click Edit to enter the edit user interface:
Note: The operation of editing a user is the same as that of adding a user, except that the user ID cannot be modified when editing a user. Operation method refers to "3.1 new users". 3.4 Deleting Users deleted and click OK. Choose a user from the list and click Delete to enter the delete user interface. Select the user information to be Note: If you select Delete User, all information of the user will be deleted. 24 Linux Visible Light Product User Manual 4 User Role User Role menu. the operation menu. Click User Role on the main menu interface. If you need to assign some specific permissions to certain users, you may edit the User Defined Role under the You may set the permission scope of the custom role (up to 3 roles) and enroller
, that is, the permission scope of 1. Click any item to set a defined role. Click the row of Enable Defined Role to enable this defined role. Click Name and enter the name of the role. Linux Visible Light Product User Manual 25 2. Click Define User Role to assign the privileges to the role. The privilege assignment is completed. Click Return. Note: During privilege assignment, the main menu is on the left and its sub-menus are on the right. You only need to select the features in sub-menus. If the device has a role enabled, you may assign the roles you set to users by clicking User Mgt. > New User > User Role. 26 Linux Visible Light Product User Manual If no super administrator is registered, the device will prompt "Please enroll super admin first! after clicking the enable bar. Linux Visible Light Product User Manual 27 5 Communication Settings Set parameters of the network, PC connection, cloud server and Wiegand. Tap COMM. on the main menu. 5.1 Network Settings When the device needs to communicate with a PC over the Ethernet, you need to configure network settings and ensure that the device and the PC are connecting to the same network segment. Click Ethernet on the Comm. Settings interface. 28 Linux Visible Light Product User Manual Descriptions The factory default value is 192.168.1.201. Please adjust them according to the The factory default value is 255.255.255.0. Please adjust them according to the The factory default address is 0.0.0.0. Please adjust them according to the actual The factory default address is 0.0.0.0. Please adjust them according to the actual The factory default value is 4370. Please adjust them according to the actual actual network situation. actual network situation. network situation. network situation. network situation. Item IP Address Subnet Mask Gateway DNS TCP COMM. Port DHCP Dynamic Host Configuration Protocol, which is to dynamically allocate IP addresses for clients via server. Display in Status Bar To set whether to display the network icon on the status bar. Linux Visible Light Product User Manual 29 5.2 PC Connection To improve the security of data, please set a Comm Key for communication between the device and the PC. If a Comm Key is set, this connection password must be entered before the device can be connected to the PC software. Click PC Connection on the Comm. Settings interface. Descriptions Item Comm Key Comm Key: The default password is 0, which can changed. The Comm Key may contain1-6 digits. Device ID communication method is RS232/RS485, you need to input this device ID in the Identity number of the device, which ranges between 1 and 254. If the software communication interface. 30 Linux Visible Light Product User Manual 5.3 Cloud Server Setting This represents settings used for connecting with the ADMS server. Click Cloud Server Setting on the Comm. Settings interface. Description Item Enable Domain Name Name Enable Proxy Server When this function is enabled, the domain name mode http://... will be Server Address used, such as http://www.XYZ.com, while XYZ denotes the domain Disable Domain Server Address IP address of the ADMS server. name when this mode is turned ON. Server Port Port used by the ADMS server. When you choose to enable the proxy, you need to set the IP address and port number of the proxy server. 5.4 Wiegand Setup To set the Wiegand input and output parameters. Click Wiegand Setup on the Comm. Settings interface. Linux Visible Light Product User Manual 31 Wiegand input Item Descriptions Wiegand Format Values range from 26 bits, 34 bits, 36 bits, 37 bits, and 50 bits. Wiegand Bits Number of bits of Wiegand data. Pulse Width(us) Pulse Interval(us) ID Type The value of the pulse width sent by Wiegand is 100 microseconds by default, which can be adjusted within the range of 20 to 100 microseconds. The default value is 1000 microseconds, which can be adjusted within the range of 200 to 20000 microseconds. Select between User ID and badge number. Definitions of various common Wiegand formats:
Wiegand Format Definitions Wiegand26 ECCCCCCCCCCCCCCCCCCCCCCCCO 32 Linux Visible Light Product User Manual Consists of 26 bits of binary code. The 1st bit is the even parity bit of the 2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th bits. The 2nd to 25th bits are the card numbers. ESSSSSSSSCCCCCCCCCCCCCCCCO Wiegand26a Consists of 26 bits of binary code. The 1st bit is the even parity bit of the 2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th bits. The 2nd to 9th bits are the site codes, while the 10th to 25th bits are the card numbers. ECCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO Wiegand34 Consists of 34 bits of binary code. The 1st bit is the even parity bit of the 2nd to 17th bits, while the 34th bit is the odd parity bit of the 18th to 33rd bits. The 2nd to 25th bits are the card numbers. ESSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCO Wiegand34a Consists of 34 bits of binary code. The 1st bit is the even parity bit of the 2nd to 17th bits, while the 34th bit is the odd parity bit of the 18th to 33rd bits. The 2nd to 9th bits are the site codes, while the 10th to 25th bits are the card numbers. OFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCMME Consists of 36 bits of binary code. The 1st bit is the odd parity bit of the 2nd to 18th bits, Wiegand36 while the 36th bit is the even parity bit of the 19th to 35th bits. The 2nd to 17th bits are the device codes. The 18th to 33rd bits are the card numbers, and the 34th to 35th bits are the manufacturer codes. EFFFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCO Wiegand36a Consists of 36 bits of binary code. The 1st bit is the even parity bit of the 2nd to 18th bits, while the 36th bit is the odd parity bit of the 19th to 35th bits. The 2nd to 19th bits are the device codes, and the 20th to 35th bits are the card numbers. OMMMMSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCE Consists of 37 bits of binary code. The 1st bit is the odd parity bit of the 2nd to 18th bits, Wiegand37 while the 37th bit is the even parity bit of the 19th to 36th bits. The 2nd to 4th bits are the manufacturer codes. The 5th to 16th bits are the site codes, and the 21st to 36th bits are the card numbers. EMMMFFFFFFFFFFSSSSSSCCCCCCCCCCCCCCCCO Consists of 37 bits of binary code. The 1st bit is the even parity bit of the 2nd to 18th bits, Wiegand37a while the 37th bit is the odd parity bit of the 19th to 36th bits. The 2nd to 4th bits are the manufacturer codes. The 5th to 14th bits are the device codes, and15th to 20th bits are the site codes, and the 21st to 36th bits are the card numbers. ESSSSSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO Wiegand50 Consists of 50 bits of binary code. The 1st bit is the even parity bit of the 2nd to 25th bits, while the 50th bit is the odd parity bit of the 26th to 49th bits. The 2nd to 17th bits are the site codes, and the 18th to 49th bits are the card numbers. Linux Visible Light Product User Manual 33 C denotes the card number; E denotes the even parity bit; O denotes the odd parity bit; F denotes the facility code; M denotes the manufacturer code; P denotes the parity bit; and S denotes the site code. Wiegand output Descriptions Item Wiegand Format Values range from 26 bits, 34 bits, 36 bits, 37 bits, and 50 bits. Wiegand output bits in the Wiegand format After choosing the Wiegand format, you can select one of the corresponding output digits Failed ID Site Code Pulse Width(us) If the verification is failed, the system will send the failed ID to the device and replace the card number or personnel ID with the new ones. It is similar to the device ID. The difference is that a site code can be set manually, and is repeatable in a different device. The valid value ranges from 0 to 256 by default. The time width represents the changes of the quantity of electric charge with high-frequency capacitance regularly within a specified time. Pulse Interval(us) The time interval between pulses. ID Type Select between User ID and badge number. 34 Linux Visible Light Product User Manual 6 System Settings Set related system parameters to optimize the performance of the device. Click System on the main menu interface. 6.1 Date and Time Click Date Time on the System interface. Linux Visible Light Product User Manual 35 1. You can manually set date and time and click Confirm to save. 2. Click 24-Hour Time to enable or disable this format and select the date format. 3. Click Daylight Saving Time to enable or disable the function. If enabled, select a daylight saving mode and set the switch time. 36 Linux Visible Light Product User Manual When restoring the factory settings, the time (24-hour) and date format (YYYY-MM-DD) can be restored, but the Week mode Date mode device date and time cannot be restored. Note: For example, the user sets the time of the device (18:35 on March 15, 2019) to 18:30 on January 1, 2020. After restoring the factory settings, the time of the equipment will remain 18:30 on January 1, 2020. 6.2 Attendance/Access Logs Setting Click Attendance/Access Logs Setting on the System interface. Item Description Duplicate Punch Within the set time range, the attendance record of the same person will not be Period (m) saved; the valid value ranges from 1 to 999999 minutes. Whether to capture and save the current snapshot image during verification. There are 5 modes:
No Photo: No photo is taken during user verification. Camera Mode Take photo, no save: Photo is taken but is not saved during verification. Take photo and save: Photo is taken and saved during verification. Save on successful verification: Photo is taken and saved for each successful verification. Save on failed verification: Photo is taken and saved during each failed verification. Linux Visible Light Product User Manual 37 Display User Photo Whether to display the user photo when the user passes verification. Alphanumeric User ID Whether to support letters in a User ID. Attendance Log Alert/
Access Logs Warning Cyclic Delete ATT Data/Access Records Cyclic Delete ATT Photo Cyclic Delete Blacklist Photo When remaining record space reaches a set value, the device will automatically display a remaining record memory warning. Users may disable the function or set a valid value between 1 and 9999. When attendance/access records have reached full capacity, the device will automatically delete a set value of old attendance/access records. Users may disable the function or set a valid value between 1 and 999. When attendance photos have reached full capacity, the device will automatically delete a set value of old attendance photos. Users may disable the function or set a valid value between 1 and 99. When blacklisted photos have reached full capacity, the device will automatically delete a set value of old blacklisted photos. Users may disable the function or set a valid value between 1 and 99. Confirm Screen The length of time that the message of successful verification displays. Valid value:
To set the facial template matching time interval as needed. Valid value: 0~9 seconds. Delay(s) 1~9 seconds. Face Detect Interval
(s) 6.3 Face Parameters Click Face on the System interface. 38 Linux Visible Light Product User Manual Recommended FRR FAR matching thresholds 1:N 1:1 High Low 85 80 Medium Medium 82 75 Low High 80 70 Item Description Under 1:N verification mode, the verification will only be successful when the similarity between the acquired facial image and all registered facial templates is 1:N Match Threshold greater than the set value. The valid value ranges from 65 to 120. The higher the thresholds set, the lower the misjudgment rate, the higher the rejection rate, and vice Under 1:1 verification mode, the verification will only be successful when the similarity between the acquired facial image and the facial templates enrolled in the 1:1 Match Threshold device is greater than the set value. The valid value ranges from 55 to 120. The higher the thresholds set, the lower the misjudgment rate, the higher the rejection rate, and versa. vice versa. Face enrollment threshold During face registration, 1:N verification is used to determine whether the user has been registered. The current face is registered when the similarity between the acquired facial image and all registered facial templates is greater than the set value. Face pitch angle To limit the pitch angle of face in face recognition, the recommended threshold is 20. To limit the rotation angle of face in face recognition, the recommended threshold is Face rotation angle 20. Image Quality greater than the set value, the device will accept the facial images and start the To get the quality threshold of facial images. When the value of image quality is algorithm processing, otherwise, the device will filter the facial images out. LED light triggered threshold Detect ambient light intensity. When the ambient brightness is less than the threshold, the fill light is turned on; When ambient brightness is greater than this threshold, the fill light does not turn on. The default value is 80. During face verification, the moving facial images collected in time are compared Motion Detection with all the facial images in the device by the corresponding algorithm. If the value is Sensitivity greater than or equal to the set value, it means that the verification passes; otherwise, it means that the verification fails. If enabled, it will automatically detect whether there is a moving person in front of Live detection the device. Live detection threshold 100. Detect whether there is a moving person in front of the device to determine whether face recognition is enabled. The default value is 100. The valid value ranges from 0 to Notes performance of the device. Please adjust the exposure parameter only under the Improper adjustment of the exposure and quality parameters may severely affect the guidance of the after-sales service personnel of our company. Linux Visible Light Product User Manual 39 6.4 Fingerprint Parameters Click Fingerprint on the System interface. Recommended matching FRR FAR thresholds High Low Medium Medium Low High 1:N 45 35 25 1:1 25 15 10 Item 1:1 Match Threshold 1:N Match Threshold Descriptions Under 1:1 verification method, the verification will only be successful when the similarity between the acquired fingerprint data and the fingerprint template associated with the entered user ID enrolled in the device is greater than the set value. Under 1:N verification method, the verification will only be successful when the similarity between the acquired fingerprint data and the fingerprint templates enrolled in the device is greater than the set value. To set the sensibility of fingerprint acquisition. It is recommended to use the default level FP Sensor Medium. When the environment is dry, resulting in slow fingerprint detection, you can set Sensitivity the level to High to raise the sensibility; when the environment is humid, making it hard to identify the fingerprint, you can set the level to Low. 1:1 Retry In 1:1 Verification, users might forget the registered fingerprint, or press the finger Times improperly. To reduce the process of re-entering user ID, retry is allowed. Fingerprint To set whether to display the fingerprint image on the screen during fingerprint enrollment Image or verification. Four choices are available:
40 Linux Visible Light Product User Manual 6.5 Factory Reset registered user data). Click Reset on the System interface. Item Descriptions Show for enroll: to display the fingerprint image on the screen only during enrollment. Show for match: to display the fingerprint image on the screen only during verification. Always show: to display the fingerprint image on screen during enrollment and verification. None: not to display the fingerprint image. Restore the device, such as communication settings and system settings, to factory settings (Do not clear Click OK to reset. 6.6 USB Upgrade Click USB Upgrade on the System interface. The device's firmware program can be upgraded with the upgrade file in a USB drive. Before conducting this operation, please ensure that the USB drive contains the correct upgrade file and is properly inserted into the device. Linux Visible Light Product User Manual 41 7. Personalize Settings You may customize interface settings, voice, bell, punch state options and shortcut key mappings
. Click Personalize on the main menu interface. 7.1 Interface Settings You can customize the display style of the main interface. Click User Interface on the Personalize interface. 42 Linux Visible Light Product User Manual Description Item Wallpaper Language To select the main screen wallpaper according to your personal preference. To select the language of the device. Menu Screen Timeout
(s) When there is no operation, and the time exceeds the set value, the device will automatically go back to the initial interface. You can disable the function or set the value between 60 and 99999 seconds. Idle Time To Slide When there is no operation, and the time exceeds the set value, a slide show will be Show (s) played. It can be disabled, or you may set the value between 3 and 999 seconds. Slide Show Interval (s) This refers to the time interval switching different slide show pictures. The function can be disabled, or you may set the interval between 3 and 999 seconds. Idle Time To Sleep (m) enter standby mode. Press any key or finger to resume normal working mode. You If you have activated the sleep mode, when there is no operation, the device will can disable this function or set a value within 1-999 minutes. Main Screen Style To select the main screen style according to your personal preference. Linux Visible Light Product User Manual 43 7.2 Voice Settings Click Voice on the Personalize interface. Item Description Voice Prompt Select whether to enable voice prompts during operating. Touch Prompt Select whether to enable keypad sounds. Volume Adjust the volume of the device; valid value: 0-100. 7.3 Bell Schedules Click Bell Schedules on the Personalize interface. Add a bell 1. Click New Bell Schedule to enter the adding interface:
44 Linux Visible Light Product User Manual Item Bell Status Bell Time Repeat Ring Tone Description Set whether to enable the bell status. At this time of day, the device automatically rings the bell. Set the repetition cycle of the bell. Select a ring tone. Internal bell delay(s) Set the duration of the internal bell. Valid values range from 1 to 999 seconds. 2. Back to the Bell Schedules interface, click All Bell Schedules to view the newly added bell. Edit a bell On the All Bell Schedules interface, tap the bell to be edited. Click Edit, the editing method is the same as the operations of adding a bell. Delete a bell On the All Bell Schedules interface, tap the bell to be deleted. Tap Delete and select [Yes] to delete the bell. 7.4 Punch State Options Click Punch State Options on the Personalize interface. Linux Visible Light Product User Manual 45 Item Description To select a punch state mode, which can be:
Punch State Mode predefined schedule set under Shortcut Key Mappings. Off: To disable the punch state key function. The punch state key set under Shortcut Key Mappings menu will not work. automatically reset after timeout. Manual Mode: To switch the punch state key manually; the attendance status will be Auto Mode: The punch state key will switch to a specified status according to the Manual and Auto Mode: The main interface will display the auto-switch punch state key. However, users are still able to select alternative attendance statuses. After timeout, the manually switching punch state key will become auto-switch punch state key. Manual Fixed Mode: After the punch state key is manually switched, the punch state key will remain unchanged until being manually switched again. Fixed Mode: Only the fixed punch state key will be shown. Users cannot change the status by pressing other keys The time duration for the time out, i.e. remaining inactive in the main menu. To set whether an attendance status must be selected during verification. Punch State Timeout (s) Punch State Required 46 Linux Visible Light Product User Manual 7.5 Shortcut Key Mappings Users may define shortcuts as attendance status or functional keys. On the main interface, when the shortcut keys are pressed, the corresponding attendance status or function interface will quickly display. Click Shortcut Key Mappings on the Personalize interface. 1. Click the shortcut key to enter the shortcut key setting interface, and select the function as punch state key or function key (such as new user, all users, etc.), as shown in the figure below:
Linux Visible Light Product User Manual 47 2. If the key is defined as a function key, the setting is completed; If set to a punch state key, set the punch state value (valid value 0~250), the name and switch time. How to set the switch time?
The switch time is used in conjunction with the punch state options. When the punch state mode is set to auto mode, the switch time should be set. Select the switch period and set the switch time every day, as shown in the figure below:
48 Linux Visible Light Product User Manual Note: When the function is set to Undefined, the device will not enable the punch state key. Linux Visible Light Product User Manual 49 8. Data Management To delete the relevant data in the device. Click Data Mgt. on the main menu interface. 8.1 Delete Data Click Delete Data on the Data Mgt. interface. 50 Linux Visible Light Product User Manual Description Item Delete Attendance Records Delete Attendance Photo Photo Delete Blacklist Data/Access To delete attendance data/access records conditionally. To delete attendance photos of designated personnel. To delete the photos taken during verifications which are failed. Delete All Data To delete information and attendance logs/access records of all registered users. Delete Admin Role To remove administrator privileges. Delete Access Control To delete all access data. Delete User Photo To delete all user photos in the device. Delete Wallpaper To delete all wallpapers in the device. To delete the screen savers in the device. Delete screen savers Note: When deleting the attendance data/access records, attendance photos or blacklisted photos, you may select Delete All or Delete by Time Range. Selecting Delete by Time Range, you need to set a specific time range to delete Linux Visible Light Product User Manual 51 all data with the period. Select Delete by Time Range. Set the time range and click OK. 52 Linux Visible Light Product User Manual Access Control is used to set the schedule of door opening, locks control and other parameters settings related to 9. Access Control access control. Click Access Control on the main menu interface. To gain access, the registered user must meet the following conditions:
1. The current door unlock time should be within any valid time zone of the user time period. 2. The users group must be in the door unlock combination (when there are other groups in the same access combo, verification of members of those groups are also required to unlock the door). In default settings, new users are allocated into the first group with the default group time zone and access combo as 1 and set in unlocking state. Linux Visible Light Product User Manual 53 9.1 Access Control Options To set the parameters of the control lock of the terminal and related equipment. Click Access Control Options on the Access Control interface. Description Item
(s)
(s) Gate control mode Whether to turn on the gate control mode or not, when set to ON, on this interface will remove Door lock relay, Door sensor relay and Door sensor type function. Door Lock Delay (s) 1~10 seconds; 0 second represents disabling the function. The length of time that the device controls the electric lock to be unlock. Valid value:
Door Sensor Delay If the door is not closed and locked after opening for a certain duration (Door Sensor Delay), an alarm will be triggered. The valid value of Door Sensor Delay ranges from 1 to 255 seconds. There are three types: None, Normal Open, and Normal Close. None means door sensor is not in Door Sensor Type use; Normal Open means the door is always opened when electricity is on; Normal Close means the door is always closed when electricity is on. Door Alarm Delay When the state of the door sensor is inconsistent with that of the door sensor type, an alarm will be triggered after a specified time period, i.e. the Door Alarm Delay. The valid value ranges from 1 to 999 seconds. 0 means immediate alarm. Retry Times to When the number of failed verification reaches a set value, which ranges from 1 to 9 Alarm times, an alarm will be triggered. If the set value is None, the alarm will never be 54 Linux Visible Light Product User Manual triggered due to failed verifications. To set time period for door, so that the door is available only during this. Door available time period Normal Close Time Scheduled time period for Normal Close mode, so that no one can gain access during Period this period. Period during this period. Normal Open Time Scheduled time period for Normal Open mode, so that the door is always unlocked When setting up the master and slave, the status of the master can be set to out or in. Master device Out: The record verified on the host is the exit record. In: The record verified on the host is the entry record. Auxiliary input configuration Valid holidays Speaker Alarm Reset Access Setting Set the door unlock time period and auxiliary output type of the auxiliary terminal device. Auxiliary output types include None, Trigger door open, Trigger Alarm, Trigger door open and Alarm. To set if Normal Close Period or Normal Open Period settings are valid in set holiday time period. Choose ON to enable the functions during holiday. To transmit a sound alarm or disassembly alarm from the local. When the door is closed or the verification is successful, the system will cancel the alarm from the local. The restored access control parameters include door lock delay, door sensor delay, door sensor type, normal close time period, normal open time period, auxiliary input configuration and alarm. However, erased access control data in Data Mgt. is excluded. 9.2 Time Schedule The entire system can define up to 50 time periods. Each time period represents seven time zones, i.e. one week, and each time zone is a valid time period within 24 hours per day. User can only verify within the valid time period. Each time zone format of the time period: HH MM-HH MM, which is accurate to minutes according to the 24-hour clock. Click Time Schedule on the Access Control interface. 1. Click the grey box to input a time zone to search. Enter the number of time zone (maximum: 50 zones). Linux Visible Light Product User Manual 55 2. Click the date on which time zone settings is required. Enter the starting and ending time, and then press OK. 56 Linux Visible Light Product User Manual Notes:
valid. 1. When the ending time is earlier than the starting time, such as 23:57~23:56, it indicates that access is prohibited all day; when the ending time is later than the starting time, such as 00:00~23:59, it indicates that the interval is 2. The effective time period to unlock the door: open all day (00:00~23:59) or when the ending time is later than the starting time, such as 08:00~23:59. 3. The default time zone 1 indicates that door is open all day long. 9.3 Holiday Settings Whenever there is a holiday, you may need a special access time; but changing everyone's access time one by one is extremely cumbersome, so you can set a holiday access time which is applicable to all employees, and the user will be able to open the door during the holidays. Click Holidays on the Access Control interface. Linux Visible Light Product User Manual 57 Add a New Holiday Click Add Holiday on the Holidays interface and set the holiday parameters. On the Holidays interface, select a holiday item to be modified. Click Edit to modify holiday parameters. On the Holidays interface, select a holiday item to be deleted and click Delete. Click OK to confirm deletion. After deletion, this holiday is no longer displayed on All Holidays interface. Edit a Holiday Delete a Holiday 9.4 Access Groups This is to easily manage groupings and users in different access groups. Settings of an access group such as access time zones are applicable to all members in the group by default. However, users may manually set the time zones as needed. User authentication takes precedence over group authentication when group authentication modes overlap with the individual authentication methods. Each group can set a maximum of three time zones. By default, newly enrolled users are assigned to Access Group 1; they can be assigned to other access groups. Click Access Groups on the Access Control interface. 58 Linux Visible Light Product User Manual Add a New Group Click New Group on the Access Groups interface and set access group parameters. Note:
1. There is a default access group numbered 1, which cannot be deleted, but can be modified. 2. A number cannot be modified after being set. Linux Visible Light Product User Manual 59 3. When the holiday is set to be valid, personnel in a group may only open the door when the group time zone overlaps with the holiday time period. 4. When the holiday is set to be invalid, the access control time of the personnel in a group is not affected during On the All Groups interface, select the access group item to be modified. Click Edit and modify access group holidays. Edit a Group parameters. Delete a Group On the All Groups interface, select the access group item to be deleted and click Delete. Click OK to confirm deletion. The deleted access group is no longer displayed in All Groups. 9.5 Combined Verification Settings Access groups are arranged into different door-unlocking combinations to achieve multiple verifications and strengthen the security. In a door-unlocking combination, the range of the combined number N is: 0 N 5, and the number of members N may all belong to one access group or may belong to five different access groups. Click Combined Verification on the Access Control interface. Click the door-unlocking combination to be set. Click the up and down arrows to input the combination number, then press OK. 60 Linux Visible Light Product User Manual The door-unlocking combination 1 is set as (01 03 05 06 08), indicating that the unlocking combination 1 consists of 5 people, and the 5 individuals are from 5 groups, namely, access control group 1 (AC group 1), AC group 3, AC group 5, AC group 6, and AC group 8, respectively. The door-unlocking combination 2 is set as (02 02 04 04 07), indicating that the unlocking combination 2 consists of 5 people; the first two are from AC group 2, the next two are from AC group 4, and the last person is from AC Examples:
group 7. The door-unlocking combination 3 is set as (09 09 09 09 09), indicating that there are 5 people in this combination;
all of which are from AC group 9. The door-unlocking combination 4 is set as (03 05 08 00 00), indicating that the unlocking combination 4 consists of three people. The first person is from AC group 3, the second person is from AC group 5, and the third person is from AC group 8. Delete a door-unlocking combination Set all group number as 0 if you want to delete door-unlocking combinations. 9.6 Duress Options Settings If a user activated the duress verification function with specific authentication method(s), when he/she is under coercion during authentication with such method, the device will unlock the door as usual, but at the same time a signal will be sent to trigger the alarm. Click Duress Options on the Access Control interface. Linux Visible Light Product User Manual 61 Description Item Alarm on 1:1 Match When a user uses any fingerprint to perform the 1:1 verification, an alarm signal will be generated, otherwise there will be no alarm signal. Alarm on 1:N When a user uses any fingerprint to perform 1:N verification, an alarm signal will be Match generated, otherwise there will be no alarm signal. Alarm on Password otherwise there will be no alarm signal. When a user uses the password verification method, an alarm signal will be generated, Alarm Delay (s) ranges from 1 to 999 seconds. Alarm signal will not be transmitted until the alarm delay time is elapsed. The value Duress Password verification, an alarm signal will be generated. Set the 6-digit duress password. When the user enters this duress password for 62 Linux Visible Light Product User Manual 10. USB Manager Click USB Manager on the main menu interface. 10.1 Download You can import user information, access data and other data from a USB drive to computer or other devices. Before uploading or downloading data from or to the USB drive, insert the USB drive into the USB slot first. Descriptions Item Download access records To download access data within a specified time period or all data to a USB drive User Data To download all user information from the device to a USB drive User Portrait To download all user pictures from the device to a USB drive Attendance Photo Blacklist Photo To download attendance photos stored in the device within a specified time period or all attendance photos from the device to a USB drive. Picture format is JPG To download blacklisted photos taken after failed verifications within a specified time period or all pictures taken after failed verifications from the device to a USB drive Linux Visible Light Product User Manual 63 10.2 Upload Item Descriptions Screen To upload a screen saver from a USB drive to the device. Before uploading, you may select Upload Saver selected picture or Upload all pictures. To upload a wallpaper from a USB drive to the device. Before uploading, you may select Upload Wallpaper selected picture or Upload all pictures. The images will be displayed on the screen after manual settings. User Data To upload all user information from a USB drive to the device. User To upload a JPG picture named with a user ID from a USB drive to the device. Before uploading, you Portrait may select Upload Current Picture or Upload All Pictures. 64 Linux Visible Light Product User Manual When the identity of a user is verified, the attendance/access record will be saved in the device. This function 11. Attendance Search enables users to check their attendance/access logs. Click Attendance Search on the main menu interface. The process of searching for attendance and blacklist photos is similar to that of searching for attendance/access records. The following is an example of searching for attendance/access records. On the Attendance Search interface, click Attendance/Access Record. Linux Visible Light Product User Manual 65 1. Enter the user ID to be searched and click OK. If you 2. Select the time range in which the records you want want to search for records of all users, click OK without to search for. entering any user ID. 66 Linux Visible Light Product User Manual 3. The record search succeeds. Click the record in 4. The below figure shows the details of the selected green to view its details. record. Linux Visible Light Product User Manual 67 12. Autotest sensor
, camera and real-time clock (RTC). Click Autotest on the main menu interface. To automatically test whether all modules in the device function properly, which include the LCD, voice, fingerprint Description Item Test All Test LCD Test Voice Test Fingerprint Sensor Camera testing Test Clock RTC To automatically test whether the LCD, audio, camera and RTC are normal. To automatically test the display effect of LCD screen by displaying full-color, pure white, and pure black to check whether the screen displays colors normally. To automatically test whether the audio files stored in the device are complete and the voice quality is good. To test the fingerprint sensor by pressing a finger on the scanner to check if the acquired fingerprint image is clear. When you are pressing a finger on the scanner, the fingerprint image will display on the screen. clear enough. To test if the camera functions properly by checking the pictures taken to see if they are To test the RTC. The device tests whether the clock works normally and accurately with a stopwatch. Touch the screen to start counting and press it again to stop counting. 68 Linux Visible Light Product User Manual 13. System Information on. Click System Info on the main menu interface. With the system information option, you can view the storage status, the version information of the device, and so Item Description Displays the current device's user storage, password, fingerprint and face storage, Device Capacity administrators, attendance/access records, attendance and blacklist photos, and user photos. Device Info platform information, and manufacturer. Displays the device's name, serial number, MAC address, face algorithm version information, Firmware Info Displays the firmware version and other version information of the device. Linux Visible Light Product User Manual 69 14. Connect to ZKBioSecurity Software 14.1 Set the Communication Address Device side server address) 1. Click COMM. > Ethernet in the main menu to set IP address and gateway of the device. (Note: The IP address should be able to communicate with the ZKBioSecurity server, preferably in the same network segment with the 2. In the main menu, click COMM. > Cloud Server Setting to set the server address and server port. Server address: Set as the IP address of ZKBioSecurity server. Server port: Set as the service port of ZKBioSecurity (The default is 8088). Software side Login to ZKBioSecurity software, click System > Communication > Communication Device to set the adms service port, as shown in the figure below:
70 Linux Visible Light Product User Manual 14.2 Add Device on the Software Add device by searching. The process is as follows:
1 Click Access Control > Device > Search Device, to open the Search interface. 2 Click Search, and it will prompt [Searching]. 3 After searching, the list and total number of access controllers will be displayed. 4 Click Add after the device to complete adding. 14.3 Add Personnel on the Software 1. Click Personnel > Person > New:
Linux Visible Light Product User Manual 71 2. After setting all parameters, click OK. Note: For other specific operations, please refer to ZKBioSecurity User Manual. 72 Linux Visible Light Product User Manual Note:
1. 2. Statement on the Right to Privacy Dear Customers:
Thank you for choosing this hybrid biometric recognition product, which was designed and manufactured by ZKTeco. As a world-renowned provider of core biometric recognition technologies, we are constantly developing and researching new products, and strive to follow the privacy laws of each country in which our products are sold. We Declare That:
involve privacy protection. 1. All of our civilian fingerprint recognition devices capture characteristics, not fingerprint images, and do not 2. None of the fingerprint characteristics that we capture can be used to reconstruct an image of the original fingerprint, and do not involve privacy protection. 3. As the provider of this device, we will assume no direct or indirect responsibility for any consequences that 4. If you would like to dispute human rights or privacy issues concerning your use of our product, please directly may result from your use of this device. contact your employer. Our other police fingerprinting devices or development tools can capture original images of citizens' fingerprints. As to whether or not this constitutes infringement of your rights, please contact your government or the final supplier of the device. As the manufacturers of the device, we will assume no legal liability. Chinese law includes the following provisions on the personal freedoms of its citizens:
There shall be no illegal arrest, detention, search, or infringement of persons;
Personal dignity as related to personal freedom shall not be infringed upon;
3. A citizen's house may not be infringed upon;
4. A citizen's right to communication and the confidentiality of that communication is protected by law. As a final point we would like to further emphasize that biometric recognition is an advanced technology that will undoubtedly be used in e-commerce, banking, insurance, legal, and other sectors in the future. Every year the world is subjected to major losses due to insecure nature of passwords. Biometric products serve to protect your identity in high-security environments. Linux Visible Light Product User Manual 73 Eco-friendly Use this manual. This product's "eco-friendly use period" refers to the period during which this product will not leak toxic or hazardous substances, when used in accordance with the conditions in The eco-friendly use period indicated for this product does not include batteries or other components that are easily worn down and must be periodically replaced. The battery's eco-friendly use period is 5 years. Hazardous or Toxic Substances and Their Quantities Hazardous/Toxic Substance/Element Component Name Lead (Pb) Mercury Cadmium
(Hg)
(Cd) Hexavalent chromium
(Cr6+) Polybrominated biphenyls (PBB) Polybrominated diphenyl ethers
(PBDE) Chip Resistor Chip capacitor Chip inductor Diode ESD component Buzzer Adapter Screws requirements specified in SJ/T 113632006. requirements specified in SJ/T 113632006. indicates that the total amount of toxic content in all of the homogeneous materials is below the limit indicates that the total amount of toxic content in all of the homogeneous materials exceeds the limit Note: 80% of this project's components are made using non-toxic, eco-friendly materials. Those which contain toxins or harmful materials or elements are included due to current economic or technical limitations which prevent their replacement with non-toxic materials or elements. Disposal of a battery into fire or a hot oven, or mechanically crushing or cutting of a battery, that can result in an explosion Leaving a battery in an extremely high temperature surrounding environment that can result in an explosion or the leakage of flammable liquid or gas A battery subjected to extremely low air pressure that may result in an explosion or the leakage of flammable liquid or gas 74 Linux Visible Light Product User Manual FCC warning:
Any Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna.
-Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. The device has been evaluated to meet general. This equipment should be installed and operated with minimum distance 20cm between the radiator and your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference,
(2) This device must accept any interference received, including interference that may cause undesired operation. ZK Building, Wuhe Road, Gangtou, Bantian, Buji Town, Longgang District, Shenzhen China 518129 Tel: +86 755-89602345 Fax: +86 755-89602394 www.zkteco.com Copyright2019 ZKTECO CO., LTD. All rights reserved.
1 2 | Label | ID Label/Location Info | 127.90 KiB | July 10 2020 |
4 ZK Tzca Smart Access Control Terminal Model: FaceDepot-7BL a3 ps4 Input: DC 12V=3A Operating Temperature: 0C-45C MU Sete Ce) oes RR OLA ROS So eSReE ete eaLL Peer rae Made in China Riese a
1 2 | Channel Statement | Cover Letter(s) | 253.20 KiB | July 10 2020 |
2.4G WLAN Channels used in US and/or Canada We, ZKTECO CO., LTD. declare that this equipment (FCC ID: 2AJ9T-7MW) doesnt have ad Hoc Mode function on non-US/Canada frequencies. In addition, the frequency selection feature is disabled by firmware for devices marketed to the US/
Canada. For DTS part of this device, only channels 1-11 will be used in North America. Country code selection is disabled. Should you have any questions or comments regarding this matter, Please have my best attention. Print Name: Zhonglie Ge Title: Engineer On behalf of Company: ZKTECO CO., LTD. Telephone: +86 0755 89602277 E-mail: GZL@ZKTECO.COM Signature: ote be (Z
1 2 | Confidentiality Letter | Cover Letter(s) | 417.10 KiB | July 10 2020 |
To:
Federal Communications Commission Office of Engineering and Technology Laboratory Division 7435 Oakland Mills Rd. Columbia MD 21046 Regarding: Confidentiality Request regarding application for FCC ID: 2AJ9T-7MW LONG TERM CONFIDENTIALITY Pursuant to 47 CFR Section 0.459 and 0.457 of the commissions rules, the applicant hereby request confidential treatment of the documents listed below, associated with the certification application referenced above. Schematic(s) Block Diagrams Operational Descriptions The documents above contain proprietary information not released to the public. Public disclosure of this information may prove harmful to the business of the applicant. SHORT TERM CONFIDENTIALITY Additionally, the applicant requests the following documents be held confidential for 0 days from the grant date. If the device is marketed within aforementioned days of the Grant Date, the applicant will notify the TCB per FCC KDB 726920 DO1 Confidentiality Request Procedures. External Photos Internal Photos Test Setup Photos User manual(s) Sincerely, Print Name: Zhonglie Ge Title: Engineer On behalf of Company: ZKTECO CO., LTD. Telephone: +86 0755 89602277 E-mail: GZL@ Met Signature: Sa
1 2 | Declaration Letter | Cover Letter(s) | 733.19 KiB | July 10 2020 |
SGS North America Inc. i i 620 Old Peachtree Road Applicant Declaration SUITE 100 Suwanee, Georgia 30024 United States No.26,Pingshan 188 Industry zone, Tangxia Town, Dongguan City,Guangdong Province, 523728 China GZL@ZKTECO.COM
+86 0755 89602277
|, the undersigned, certify that | am an authorized signatory for the Applicant and therefore declare;
a) in accordance with 47CFR2.911(d), all of the statements herein and the exhibits attached hereto are true and correct to the best of my knowledge and belief. b) in accepting a Grant of Equipment Authorization issued by a TCB, under the authority of the FCC, as a result of the representations made in this application, the Applicant is responsible for:
(1) labeling the equipment with the exact FCC ID as specified in this application,
(2) compliance statement labeling pursuant to the applicable rules,
(3) compliance of the equipment with the applicable technical rules, c) if the Applicant is not the actual manufacturer of the equipment, appropriate arrangements have been made with the manufacturer to ensure that production units of this equipment will continue to comply with the FCCs technical requirements. d) in accordance with 47 CFR 2.909 and KDB394321, the Applicant has read, understood and agrees to accept that they are the responsible party and agree to abide by their responsibilities as specified under 47 CFR 2.909 and KDB394321. e) in accordance with |IS017065, FCC KDB641163, FCC KDB610077, KDB394321 and RSP-100, the Applicant has read, understood, accepts and agrees to abide by the post market surveillance requirements.
(1) the Applicant understands, accepts and agrees that a sample may be requested for surveillance testing.
(2) the Applicant shai make provisions to always have a production sample available upon request by SGS, FCC and/or ISED.
(3) the Applicant shai, upon request by SGS, at the Applicants expense, provide a production sample of the requested product to SGS, FCC and/or ISED as instructed. The sample shall include all support devices, cables, software, accessories or other hardware or software required for evaluation, review, certification and audit surveillance of products certified by SGS. f) neither the Applicant nor any party to the application is subject to a denial of Federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 862 because of a conviction for possession or distribution of a controlled substance. See 47CFR 1.2002(b) for the definition of a party for these purposes. g) the Applicant has read, understood, accepts and agrees to abide by the SGS North America, Inc.(TCB) terms and conditions. Link to CFRs: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-requlations-title-47 Link to KDBs: https://apps.fcc.gov/oetcf/kdb/index.cfm Link to RSP-100: https://www.ic.gc.ca/eic/site/smt-gst.nsfleng/sf01130.html Applicant Signature: U Date: 2020/06/01 WIT Zhonglie Ge NOTE: This dectaration cannot be signed by an Agent, it shail be signed by an authorized person listed in the FCC database Applicant Declaration Rev:0.0
1 2 | Operational Description | Operational Description | 28.45 KiB | July 10 2020 |
Operation Description The whole system circuit is mainly composed of the motherboard, camera module, LED light supplementing module, fingerprint head module, RFID module, LCD display screen, TP touch screen and speaker. The working principle is as follows:
DC 12V is used to supply power to the motherboard, and the voltage is adjusted by DC to DC module to supply power to various functional modules.The motherboard is integrated with MCU (HI3516), EMMC, DDR, WIFI module (RTL8723BS) and other functional modules, USB HUB extension connection fingerprint module and RFID The main unit and the NFC part can not function separately. module (IC01). The camera communicates with the CPU through a serial port, fingerprint module through the USB interface communication with CPU, WIFI module communicates with the CPU through the SDIO interface, RFID module and fingerprint module communicate with the CPU through the USB interface, and the LCD display screen communicates with the CPU through the IIC interface. Each module of the product interacts with the CPU according to the custom protocol to achieve all functions of the product. The EUT is working base on the MCU HI3516(Crystal: 24MHz, 32.768KHz). The EUT equipped with two GL852G (USB HUB) (Crystal: 12MHz). The EUT equipped with RTL8201F (RJ45) (Crystal: 25MHz). The EUT equipped with RF module RTL8723BS (WIFI) (Crystal: 26MHz). The EUT equipped with chip STM8S003F3P6 (Crystal:11.0592MHz) The EUT equipped with RFID Module IC01 (Crystal:32.768KHz, 25MHz) Wifi Antenna Type PIFA Antenna, 1.78dBi NFC Antenna Type LOOP Anetnna
1 2 | Power of Attorney Letter | Cover Letter(s) | 434.30 KiB | July 10 2020 |
Date: 2020/06/01 TO: Federal Communication Commission Equipment Authorization Branch 7435 Oakland Mills Road Columbia, MID 21046 Regarding: FCC ID: 2AJ9T-7MW To whom it may concern:
We, the undersigned, hereby authorize SGS-CSTC Standards Technical Services Co., Ltd. (SGS) Shenzhen Branch and Jing Song in SGS-CSTC Standards Technical Services Co., Ltd. (SGS) Shenzhen Branch to act on our behalf in all manners relating to application for equipment authorization with respect to the FCC ID above, including signing of all documents relating to these matters. Any and all acts carried out by the agent on our behalf shall have the same effect as acts of our own. We, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). Where our agent signs the application for certification on our behalf, | acknowledge that all responsibility for complying with the terms and conditions for Certification, as specified by SGS North America, Inc., still resides with ZKTECO CO., LTD. This authorization is valid until further written notice from the applicant. Print Name: Zhonglie Ge Title: Engineer On behalf of Company: ZKTECO CO., LTD. Telephone: +86 0755 89602277 E-mail: GZL@ZKTECO.COM
) Signature: ge
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2020-07-10 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
2 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2020-07-10
|
||||
1 2 | Applicant's complete, legal business name |
ZKTECO CO., LTD.
|
||||
1 2 | FCC Registration Number (FRN) |
0026008086
|
||||
1 2 | Physical Address |
No.26, Pingshan 188 Industry zone, Tangxia Town, Dongguan City, Guangdong Province, China 523728
|
||||
1 2 |
No.26, Pingshan 188 Industry zone, Tangxia Town
|
|||||
1 2 |
Dongguan, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 | Grantee Code |
2AJ9T
|
||||
1 2 | Equipment Product Code |
7MW
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
Z**** G******
|
||||
1 2 | Title |
Engineer
|
||||
1 2 | Telephone Number |
+86 0******** Extension:
|
||||
1 2 | Fax Number |
+86 0********
|
||||
1 2 |
G******@ZKTECO.COM
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd
|
||||
1 2 |
SGS-CSTC Standards Technical Services Co., Ltd.
|
|||||
1 2 | Name |
K******** X********
|
||||
1 2 | Physical Address |
No.1 Workshop, M-10, Middle Section
|
||||
1 2 |
Shenzhen, 518057
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
86-75********
|
||||
1 2 | Fax Number |
86-75********
|
||||
1 2 |
k******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | DXX - Part 15 Low Power Communication Device Transmitter | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Smart Access Control Terminal | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output Power listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. This device has 20 and 40 MHz bandwidth modes. | ||||
1 2 | The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. | |||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd
|
||||
1 2 | Name |
K******** X****
|
||||
1 2 | Telephone Number |
+86 (********
|
||||
1 2 |
K******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2412 | 2462 | 0.0927 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC | 2422 | 2452 | 0.0678 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 13.56000000 | 13.56000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC