all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 |
|
User Manual | Users Manual | 1.23 MiB | July 31 2020 | |||
1 2 |
|
Internal Photos | Internal Photos | 2.10 MiB | July 31 2020 | |||
1 2 |
|
External Photos | External Photos | 708.58 KiB | July 31 2020 | |||
1 2 |
|
Label | ID Label/Location Info | 155.22 KiB | July 31 2020 | |||
1 2 |
|
Applicant Declaration Letter | Cover Letter(s) | 1.11 MiB | July 31 2020 | |||
1 2 | Block Diagram | Block Diagram | July 31 2020 | confidential | ||||
1 2 |
|
Channel Statement | Cover Letter(s) | 588.96 KiB | July 31 2020 | |||
1 2 |
|
Confidentiality Letter | Cover Letter(s) | 766.00 KiB | July 31 2020 | |||
1 2 |
|
MPE Report | RF Exposure Info | 327.73 KiB | July 31 2020 | |||
1 2 | Operational Description | Operational Description | July 31 2020 | confidential | ||||
1 2 |
|
Power of Attorney Letter | Cover Letter(s) | 810.57 KiB | July 31 2020 | |||
1 2 | Schematic | Schematics | July 31 2020 | confidential | ||||
1 2 |
|
Test Report | Test Report | 3.20 MiB | July 31 2020 | |||
1 2 |
|
Test Setup Photo | Test Setup Photos | 746.51 KiB | July 31 2020 | |||
1 2 | Operation Description | Operational Description | July 31 2020 | confidential |
1 2 | User Manual | Users Manual | 1.23 MiB | July 31 2020 |
USER MANUAL 5/7-inch Linux Visible Light Product Version: 1.0 Date: June 2019 1 Important Statement Thank you for choosing our product. Before using this product, please read this user manual carefully to avoid risks of danger to the users of this product or those nearby and damaging the device. Follow these instructions to ensure that your product functions properly and completes verifications in a timely manner. Unless authorized by our company, no group or individual shall take excerpts of or copy all or part of these instructions nor transmit the contents of these instructions by any means. The products described in this manual may include software that is copyrighted by our company and its possible licensors. No one may copy, publish, edit, take excerpts of, decompile, decode, reverse-engineer, rent, transfer, sublicense, or otherwise infringe upon the software's copyright unless authorized by the copyright holder(s). This is subject to relevant laws prohibiting such restrictions. As this product is regularly updated, we cannot guarantee exact consistency between the actual product and the written information in this manual. Our company claims no responsibility for any disputes that arise due to differences between the actual technical parameters and the descriptions in this document. The manual is subject to change without prior notice. Contents 1 Notice for Use ............................................................................................................................................................................................................................... 1 1.1 Method of Pressing Fingerprint ........................................................................................................................................................................ 1 1.2 Standing Position, Facial Expression and Standing Posture ........................................................................................................... 1 1.3 Face Registration ......................................................................................................................................................................................................... 2 1.4 Verification Mode ........................................................................................................................................................................................................ 3 1.4.1 Password Verification ................................................................................................................................................................................ 3 1.4.2 Fingerprint Verification ............................................................................................................................................................................ 4 1.4.3 Facial Verification ......................................................................................................................................................................................... 7 1.4.4 Card Verification ...................................................................................................................................................................................... 8 1.4.5 Combined Verification ............................................................................................................................................................................. 8 2 Main Menu .................................................................................................................................................................................................................................... 10 3 User Management .................................................................................................................................................................................................................... 11 3.1 Adding Users ................................................................................................................................................................................................................ 11 3.2 Search for Users .......................................................................................................................................................................................................... 15 3.3 Edit Users ......................................................................................................................................................................................................................... 15 3.4 Deleting Users.............................................................................................................................................................................................................. 16 4 User Role ......................................................................................................................................................................................................................................... 17 5 Communication Settings ..................................................................................................................................................................................................... 19 5.1 Network Settings ....................................................................................................................................................................................................... 19 5.2 PC Connection ............................................................................................................................................................................................................ 20 5.3 WIFI Setting .................................................................................................................................................................................................................... 21 5.4 Cloud Server Setting ................................................................................................................................................................................................ 22 6 System Settings .......................................................................................................................................................................................................................... 24 6.1 Date and Time .............................................................................................................................................................................................................. 24 6.2 Access Logs Setting ................................................................................................................................................................................................. 25 6.3 Face Parameters .......................................................................................................................................................................................................... 26 6.4 Fingerprint Parameters........................................................................................................................................................................................... 27 6.5 Factory Reset ................................................................................................................................................................................................................ 28 6.6 USB Upgrade ................................................................................................................................................................................................................ 29 7. Personalize Settings ................................................................................................................................................................................................................ 30 7.1 Interface Settings ....................................................................................................................................................................................................... 30 7.2 Voice Settings ............................................................................................................................................................................................................... 31 7.3 Punch States Settings ............................................................................................................................................................................................. 32 7.4 Shortcut Keys Settings ........................................................................................................................................................................................... 33 8. Data Management .................................................................................................................................................................................................................. 34 8.1 Delete Data .................................................................................................................................................................................................................... 34 I 8.2 Backup Data .................................................................................................................................................................................................................. 35 8.3 Restore Data .................................................................................................................................................................................................................. 36 9. Access Control ............................................................................................................................................................................................................................ 37 9.1 Access Control Options ......................................................................................................................................................................................... 37 10. USB Manager ............................................................................................................................................................................................................................ 39 10.1 USB Download .......................................................................................................................................................................................................... 39 10.2 USB Upload ................................................................................................................................................................................................................. 40 10.3 Download Options ................................................................................................................................................................................................ 40 11. Attendance Search ............................................................................................................................................................................................................... 41 12. Autotest ....................................................................................................................................................................................................................................... 43 13. System Information.............................................................................................................................................................................................................. 44 Statement on the Right to Privacy ..................................................................................................................................................................................... 45 Eco-friendly Use ............................................................................................................................................................................................................................. 46 II 1 Notice for Use 1.1 Method of Pressing Fingerprint Recommended fingers: index, middle, or ring fingers; avoid using the thumb or pinky, as they are difficult to accurately press onto the fingerprint reader. Diagram of how to correctly press your fingers onto the fingerprint reader. Press your finger onto the fingerprint reader. Ensure that the center of your finger is aligned with the center of the fingerprint reader. Incorrect ways of pressing your fingers onto the fingerprint reader. Off-center Not the fingerprints Off-center Not the fingerprints center center Note: Please use the correct method when pressing your fingers onto the fingerprint reader for registration and identification. Our company will assume no liability for recognition issues that may result from incorrect usage of the product. We reserve the right of final interpretation and modification concerning this point. 1.2 Standing Position, Facial Expression and Standing Posture The recommended distance The distance between the device and a user whose height is within 1.55m-1.85m is recommended to be 0.5m. Users may slightly move forwards and backwards to improve the quality of facial images captured. 2.8-inch Linux Visible Light Product User Manual 1 Facial expression and standing posture Note: During enrolment and verification, please remain natural facial expression and standing posture. 1.3 Face Registration registration. The page looks like this:
Try to keep the face in the center of the screen during registration. Please face the camera and stay still during face 2 2.8-inch Linux Visible Light Product User Manual 1.4 Verification Mode 1.4.1 Password Verification Compare the entered password with the registered User ID and password. Enter the User ID on the main screen to enter the 1:1 password verification mode. 1. Enter the user ID and press M/OK. If the user registers face and fingerprint in addition to password, the following screen will appear. Select the Password icon to enter password verification mode. 2. Input the password and press M/OK. 2.8-inch Linux Visible Light Product User Manual 3 Verification is successful. Verification is failed. 1.4.2 Fingerprint Verification 1:N fingerprint verification stored in the device. Compare the fingerprint that is being pressed onto the fingerprint reader with all of the fingerprint data that is To enter fingerprint verification mode, simply press your finger on the fingerprint reader. Make sure that you correctly press your fingerprint onto the fingerprint reader. 4 2.8-inch Linux Visible Light Product User Manual Successful verification:
Verification is failed:
1:1 fingerprint verification Compares the fingerprint that is being pressed onto the fingerprint reader with the fingerprints that are linked to Employee ID input via the virtual keyboard. This method can be used when the system has trouble recognizing an employee's fingerprints. Enter the User ID on the main screen to enter 1:1 fingerprint verification mode:
1. Enter the User ID and press M/OK. If the user has registered a face, a password and badge in addition to his/her fingerprints and the verification method is set to password/ fingerprint/ badge/ face verification, the following screen will appear. Select the fingerprint icon to enter fingerprint verification mode:
2.8-inch Linux Visible Light Product User Manual 5 2. Press the finger on the fingerprint reader to proceed with verification. 3. Successfully verified. 6 2.8-inch Linux Visible Light Product User Manual 4. Verification is failed. 1.4.3 Facial Verification 1:N face verification box of comparison result. Compare the acquired facial images with all face data registered in the device. The following is the pop-up prompt 1:1 face verification Compare the face captured by the camera with the facial template related to the entered user ID. Enter the User ID on the main interface and enter the 1:1 facial verification mode. If an employee registers password in addition to face, the following screen will appear. Select the face icon to enter 1. Enter the user ID and select M/OK. face verification mode. 2.8-inch Linux Visible Light Product User Manual 7 After successful verification, the prompt box "Successfully verified" will appear. 1.4.4 Card Verification Only the product with the card module offers the card verification function. Please place the registered card on the card reader. 1.4.5 Combined Verification To increase security, this device offers the option of using multiple forms of verification methods. A total of 5 different verification combinations can be used, as shown below:
8 2.8-inch Linux Visible Light Product User Manual
"/" means or, and "+" means and. You must register the required verification information before using the combination verification mode, otherwise the verification may fail. For example, if a user uses Face Registration but the verification mode is Face + Password, this user will never pass verification. Notes:
1 2 2.8-inch Linux Visible Light Product User Manual 9 2 Main Menu Click M/OK on the initial interface to enter the main menu, as shown below:
Items User Mgt. User Role COMM. System To add, edit, view, and delete basic information about a user. Descriptions To set the permission scope of the custom role and enroller, that is, the rights to operate the system. To set the relevant parameters of Ethernet, PC connection, Wireless network, cloud server setting. To set parameters related to the system, including date & time, attendance, face, fingerprint, reset, USB upgrade. Personalize To customize settings of interface display, including user interface, voice, punch state options and shortcut key mappings. Data Mgt. To delete all relevant data in the device. Access Control To set the parameters of the lock and the relevant access control device. USB Manager To transfer data such as user data and attendance logs from the USB disk to the supporting software or other devices. Attendance Search Query the specified access record, check attendance photos and blacklist photos. Autotest To automatically test whether each module functions properly, including the screen, audio, camera and real-time clock. System Info To view data capacity, device and firmware information of the current device. 10 2.8-inch Linux Visible Light Product User Manual 3 User Management 3.1 Adding Users Select User Mgt. on the main menu. Select New User. Register a User ID and Name Enter the user ID and name. Notes:
1 2 3 4 A user name may contain 17 characters. The user ID may contain 1-9 digits by default. During the initial registration, you can modify your ID, which cannot be modified after registration. User ID cannot be repeated. If there is a voice prompt, you must choose another ID. 2.8-inch Linux Visible Light Product User Manual 11 Setting the User Role There are two types of user accounts: the normal users and the super admin. If there is already a registered administrator, the normal users have no rights to manage the system and may only access authentication verifications. The administrator owns all management privileges. If a custom role is set, you can also select custom role permissions for the user. Select User Role to set Normal User or Super Admin. Note: If the selected user role is the Super Admin, the user must pass the identity authentication to access the main menu. The authentication is based on the authentication method(s) that the super administrator has Setting the Verification Mode Including password/fingerprint/face, fingerprint only, user ID only, password, user ID + fingerprint, fingerprint +
password, user ID + fingerprint + password, face only, face + fingerprint, face + password, face + fingerprint +
Select Verification Mode to set Individual verification mode of the user. Select M/OK to save and return to the registered. password. New User interface. 12 2.8-inch Linux Visible Light Product User Manual Register fingerprint Select Fingerprint to enter the enroll fingerprint page. User can choose one or more fingerprint(s) to enroll. Press the finger horizontally onto the fingerprint sensor. The registration interface is as follows:
Register face registration interface is as follows:
Select Face to enter the face registration page. Please face the camera and stay still during face registration. The 2.8-inch Linux Visible Light Product User Manual 13 Register password Select Password to enter the password registration page. Enter a password and re-enter it. Select M/OK. If the two entered passwords are same, the system will return to the New User interface. Note: The password may contain one to eight digits by default. Register user photo When a user registered with a photo passes the authentication, the registered photo will be displayed. Select User Photo, Select M/OK to take a photo. Then Select ESC to exit and return to the New User interface. Note: While registering a face, the system will automatically capture a picture as the user photo. If you do not want to register a user photo, the system will automatically set the picture captured as the default photo. 14 2.8-inch Linux Visible Light Product User Manual 3.2 Search for Users search for the users related to the information. Enter the retrieval keyword on the user list (The keyword may be an ID, surname or full name.). The system will 3.3 Edit Users Choose a user from the list and select Edit to enter the edit user interface:
Note: The operation of editing a user is the same as that of adding a user, except that the user ID cannot be modified when editing a user. 2.8-inch Linux Visible Light Product User Manual 15 3.4 Deleting Users deleted and click M/OK. Choose a user from the list and select Delete to enter the delete user interface. Select the user information to be Note: If you select Delete User, all information of the user will be deleted. 16 2.8-inch Linux Visible Light Product User Manual If you need to assign some specific permissions to certain users, you may edit the User Defined Role under the You may set the permission scope of the custom role (up to 3 roles) and enroller, that is, the permission scope of 4 User Role User Role menu. the operation menu. Select User Role on the main menu interface. 1. Select any item to set a defined role. Select the row of Enable Defined Role to enable this defined role. Select Name and enter the name of the role. 2. Select Define User Role to assign the privileges to the role. The privilege assignment is completed. Click ESC to save and return. 2.8-inch Linux Visible Light Product User Manual 17 Note: You need to select the features in sub-menus. If the device has a role enabled, you may assign the roles you set to users by selecting User Mgt. > New User > User Role. If no super administrator is registered, the device will prompt "Please register super administrator user first! after Selecting the enable bar. 18 2.8-inch Linux Visible Light Product User Manual 5 Communication Settings Set parameters of the network, PC connection, WIFI and cloud server. Select COMM. on the main menu. 5.1 Network Settings When the device needs to communicate with a PC over the Ethernet, you need to configure network settings and ensure that the device and the PC are connecting to the same network segment. Select Ethernet on the Comm. Settings interface. 2.8-inch Linux Visible Light Product User Manual 19 Descriptions The factory default value is 192.168.1.201. Please adjust them according to the The factory default value is 255.255.255.0. Please adjust them according to the The factory default address is 0.0.0.0. Please adjust them according to the actual actual network situation. actual network situation. network situation. network situation. TCP COMM. Port The factory default value is 4370. Please adjust them according to the actual Dynamic Host Configuration Protocol, which is to dynamically allocate IP addresses for clients via server. Display in Status Bar To set whether to display the network icon on the status bar. Item IP Address Subnet Mask DNS DHCP 5.2 PC Connection To improve the security of data, please set a Comm Key for communication between the device and the PC. If a Comm Key is set, this connection password must be entered before the device can be connected to the PC software. Select PC Connection on the Comm. Settings interface. Item Descriptions Comm Key The default password is 0, which can changed. The Comm Key may contain1-6 digits. Identity number of the device, which ranges between 1 and 254. If the Device ID communication method is RS232/RS485, you need to input this device ID in the software communication interface. 20 2.8-inch Linux Visible Light Product User Manual 5.3 WIFI Setting Select Wireless Network on the Comm. Settings interface. When WIFI is enabled, select the searched network. Enter the password, and select Connect to WIFI (OK). The connection succeeds, with icon displayed on the status bar. Adding WIFI Network If the desired Wi-Fi network is not in on the list, you can add the Wi-Fi network manually. Select Add WIFI Network. Enter the parameters of the Wi-Fi network. (The added network must exist.) After adding, find the newly added Wi-Fi network in list and connect to it in the above way. Advanced This is used to set Wi-Fi network parameters. 2.8-inch Linux Visible Light Product User Manual 21 Short for Dynamic Host Configuration Protocol, which involves allocating dynamic Item DHCP IP Address Subnet Mask Gateway Description IP addresses to network clients. IP address of the Wi-Fi network. Subnet mask of the Wi-Fi network. Gateway address of the Wi-Fi network. 5.4 Cloud Server Setting This represents settings used for connecting with the ADMS server. Select Cloud Server Setting on the Comm. Settings interface. 22 2.8-inch Linux Visible Light Product User Manual Item Description Enable Domain Name such as http://www.XYZ.com, while XYZ denotes the domain name when this When this function is enabled, the domain name mode http://... will be used, mode is turned ON. Server Address IP address of the ADMS server. Server Port Port used by the ADMS server. Enable Proxy Server number of the proxy server. When you choose to enable the proxy, you need to set the IP address and port 2.8-inch Linux Visible Light Product User Manual 23 6 System Settings Set related system parameters to optimize the performance of the device. Select System on the main menu interface. 6.1 Date and Time Select Date Time on the System interface. 1. You can manually set date and time and click M/OK to save. 2. Select 24-Hour Time to enable or disable this format and select the date format. When restoring the factory settings, the time (24-hour) and date format (YYYY-MM-DD) can be restored, but the 24 2.8-inch Linux Visible Light Product User Manual device date and time cannot be restored. Note: For example, the user sets the time of the device (18:35 on March 15, 2019) to 18:30 on January 1, 2020. After restoring the factory settings, the time of the equipment will remain 18:30 on January 1, 2020. 6.2 Access Logs Setting Select Access Logs Setting on the System interface. Item Description Duplicate Punch Period Within a set time period (unit: minutes), the duplicated attendance logs will not be
(m) reserved (value ranges from 1 to 999999 minutes). Whether to capture and save the current snapshot image during verification. There are 5 modes:
No Photo: No photo is taken during user verification. Take photo, no save: Photo is taken but is not saved during verification. Camera Mode Take photo and save: Photo is taken and saved during verification. Save on successful verification: Photo is taken and saved for each successful Save on failed verification: Photo is taken and saved during each failed verification. verification. Display User Photo Whether to display the user photo when the user passes verification. Alphanumeric User ID Whether to support letters in an User ID. Attendance Log Alert automatically alert users to the remaining storage information. It can be disabled or When the remaining storage is smaller than the set value, the device will set to a value ranged from 1 to 9999. 2.8-inch Linux Visible Light Product User Manual 25 Cyclic Delete ATT Data maximum storage is attained. It can be disabled or set to a value ranged from 1 to The number of attendance logs allowed to be deleted in one time when the Cyclic Delete ATT Photo delete a set value of old attendance photos. Users may disable the function or set a When attendance photos have reached full capacity, the device will automatically 999. valid value between 1 and 99. Cyclic Delete Blacklist Photo When blacklisted photos have reached full capacity, the device will automatically delete a set value of old blacklisted photos. Users may disable the function or set a valid value between 1 and 99. The length of time that the message of successful verification displays. Valid value:
To set the facial template matching time interval as needed. Valid value: 0~9 Confirm Screen Delay(s) 1~9 seconds. Face Detect Interval (s) seconds. 6.3 Face Parameters Select Face on the System interface. Recommended FRR FAR matching thresholds 1:N 1:1 High Low 85 80 Medium Medium 82 75 Low High 80 70 Item Description Under 1:N verification mode, the verification will only be successful when the similarity between the acquired facial image and all registered facial templates is 1:N Match Threshold greater than the set value. The valid value ranges from 65 to 120. The higher the thresholds set, the lower the misjudgment rate, the higher the rejection rate, and vice versa. 1:1 Match Threshold Under 1:1 verification mode, the verification will only be successful when the 26 2.8-inch Linux Visible Light Product User Manual similarity between the acquired facial image and the facial templates enrolled in the device is greater than the set value. The valid value ranges from 55 to 120. The higher the thresholds set, the lower the misjudgment rate, the higher the rejection rate, and vice versa. Face registration threshold During face registration, 1:N verification is used to determine whether the user has been registered. The current face is registered when the similarity between the acquired facial image and all registered facial templates is greater than the set value. Pitch angle threshold To limit the pitch angle of face in face recognition, the recommended threshold is 20. Rotation angle To limit the rotation angle of face in face recognition, the recommended threshold is threshold 20. Image Quality greater than the set value, the device will accept the facial images and start the To get the quality threshold of facial images. When the value of image quality is algorithm processing, otherwise, the device will filter the facial images out. Threshold of turning Detect ambient light intensity. When the ambient brightness is less than the on the supplement threshold, the fill light is turned on; When ambient brightness is greater than this LED threshold, the fill light does not turn on. The default value is 80. Alive body detection If enabled, it will automatically detect whether there is a moving person in front of switch the device. Alive body detection threshold 100. Detect whether there is a moving person in front of the device to determine whether face recognition is enabled. The default value is 100. The valid value ranges from 0 to Notes performance of the device. Please adjust the exposure parameter only under the Improper adjustment of the exposure and quality parameters may severely affect the guidance of the after-sales service personnel of our company. 6.4 Fingerprint Parameters Select Fingerprint on the System interface. Match Threshold FRR FAR 1:N 1:1 High Low 45 25 Medium Medium 35 15 Low High 25 10 2.8-inch Linux Visible Light Product User Manual 27 Item Description 1:1 Match Threshold fingerprint and the users registered fingerprint is greater than this value can the Under 1:1 Verification Method, only when the similarity between the verifying 1:N Match Threshold fingerprint and all registered fingerprints is greater than this value can the verification Under 1:N Verification Method, only when the similarity between the verifying verification succeed. succeed. To set the sensibility of fingerprint collection. It is recommended to use the default FP Sensor Sensitivity level Medium. When the environment is dry, resulting in slow fingerprint detection, you can set the level to High to raise the sensibility; when the environment is humid, making it hard to identify the fingerprint, you can set the level to Low. In 1:1 Verification or Password Verification, users might forget the registered 1:1 Retry Times fingerprint or password, or press the finger improperly. To reduce the process of re-entering user ID, retry is allowed; the number of retry can be within 1~9. To set whether to display the fingerprint image on the screen in registration or Fingerprint Image verification. Four choices are available: Show for enroll, Show for match, Always show, None. 6.5 Factory Reset registered user data). Select Reset on the System interface. Select OK to reset. Restore the device, such as communication settings and system settings, to factory settings (Do not clear 28 2.8-inch Linux Visible Light Product User Manual 6.6 USB Upgrade Insert the U disk with upgrade file into the devices USB port, and in the initial interface, press [M/OK] > System >
USB Upgrade to complete firmware upgrade operation. Select USB Upgrade on the System interface. Note: If upgrade file is needed, please contact out technical support. Firmware upgrade is not recommenced under normal circumstances. 2.8-inch Linux Visible Light Product User Manual 29 7. Personalize Settings You may customize interface settings. Select Personalize on the main menu interface. 7.1 Interface Settings You can customize the display style of the main interface. Select User Interface on the Personalize interface. Item Wallpaper Language Description To select the main screen wallpaper according to your personal preference. To select the language of the device. 30 2.8-inch Linux Visible Light Product User Manual Menu Screen Timeout (s) automatically go back to the initial interface. You can disable the function or set When there is no operation, and the time exceeds the set value, the device will the value between 60 and 99999 seconds. When there is no operation, and the time exceeds the set value, a slide show will Idle Time To Slide Show (s) be played. It can be disabled, or you may set the value between 3 and 999 Slide Show Interval (s) function can be disabled, or you may set the interval between 3 and 999 This refers to the time interval switching different slide show pictures. The seconds. seconds. Idle Time To Sleep (m) will enter standby mode. Press any key or finger to resume normal working If you have activated the sleep mode, when there is no operation, the device mode. You can disable this function or set a value within 1-999 minutes. Main Screen Style To select the main screen style according to your personal preference. 7.2 Voice Settings Select Voice on the Personalize interface. Item Voice Prompt Keyboard Prompt Volume Description Select whether to enable voice prompts during operating, press [M/OK] to enable it. enable it. decrease the volume. Select whether to enable keyboard voice while pressing keyboard, press [M/OK] to et the volume of device. Press key to increase the volume, press key to 2.8-inch Linux Visible Light Product User Manual 31 7.3 Punch States Settings Select Punch State Options on the Personalize interface. Item Description Punch State Mode key will be switched automatically. To choose the Punch State Mode, which includes the following modes:
Off: To disable the punch state key function. The punch state key set under Shortcut Key Mappings menu will become invalid. Manual Mode: To switch the punch state key manually, and the punch state key will disappear after Punch State Timeout. Auto Mode: After this mode is chosen, set the switching time of punch state key in Shortcut Key Mappings; when the switching time is reached, the set punch state Manual and Auto Mode: Under this mode, the main interface will display the auto-switching punch state key, meanwhile supports manually switching punch state key. After timeout, the manually switching punch state key will become auto-switching punch state key. Manual Fixed Mode: After punch state key is manually switched, the punch state key will remain unchanged until being manually switched next time. Fixed Mode: Only the fixed punch state key will be shown and it cannot be Punch State Timeout (s) The timeout time of the display of punch state. The value ranges from 5~999 switched. seconds. Punch State Required ON: Choosing attendance state is needed after verification. Whether it is necessary to choose attendance state in verification. OFF: Choosing attendance state is not needed after verification. Remarks: There are four punch states: Check-In, Check-Out, Overtime-In, Overtime-Out. 32 2.8-inch Linux Visible Light Product User Manual 7.4 Shortcut Keys Settings Shortcut keys can be defined as punch state keys or menu function key. When the device is on the main interface, pressing the set shortcut key will display the attendance state or enter the menu operation interface. Select Shortcut Key Mappings on the Personalize interface. To set Auto Switching Time:
Choose any shortcut key, and select Punch State Options in Function, so that auto switching time can be set. Auto Switch: When the set time is reached, the device will switch the attendance state automatically. When the shortcut key is set to Punch State Key, but OFF mode is selected in the Punch State Mode
(Personalize > Punch State Options > Punch State Mode > Select OFF), then the shortcut key will not be enabled. 2.8-inch Linux Visible Light Product User Manual 33 8. Data Management To delete the relevant data in the device. Select Data Mgt. on the main menu interface. 8.1 Delete Data Select Delete Data on the Data Mgt. interface. Item Description Delete Attendance Data To delete all attendance data in the device. Delete Attendance Photo To delete attendance photos of designated personnel. 34 2.8-inch Linux Visible Light Product User Manual Delete Blacklist Photo To delete the photos taken during verifications which are failed. Delete All Data To delete information and access records of all registered users. Delete Admin Role To remove administrator privileges. Delete Access Control To delete all access data. Delete User Photo To delete all user photos in the device. Delete Wallpaper To delete all wallpapers in the device. Delete screen savers To delete the screen savers in the device. the period. Note: When deleting the access records, attendance photos or blacklisted photos, you may select Delete All or Delete by Time Range. Selecting Delete by Time Range, you need to set a specific time range to delete all data with Select Delete by Time Range. Set the time range and Select Confirm(OK). 8.2 Backup Data Select Backup Data on the Data Mgt. interface. 2.8-inch Linux Visible Light Product User Manual 35 Insert the USB disk. In the initial interface, press [M/OK] > Data Mgt. > Backup Data > Backup to USB Disk >
Backup Content > choose content to be backed up (Business Data / System Data) > Backup Start to start backup. Restarting the device is not needed after backup is completed. 8.3 Restore Data Select Restore Data on the Data Mgt. interface. Insert the USB disk. In the initial interface, click M/OK > Data Mgt. > Restore Data > Restore from USB Disk >
Content > choose content to be restored (Business Data / System Data) > Start Restore > select Yes to start restoring. After restoration completes, select OK to automatically restart the device. 36 2.8-inch Linux Visible Light Product User Manual 9. Access Control Select Access Control on the main menu interface. 9.1 Access Control Options To set the parameters of the control lock of the terminal and related equipment. Select Access Control Options on the Access Control interface. Item Description Door Lock Delay (s) 1~10 seconds; 0 second represents disabling the function. The length of time that the device controls the electric lock to be unlock. Valid value:
2.8-inch Linux Visible Light Product User Manual 37 Door Sensor Delay (s) an alarm will be triggered. The valid value of Door Sensor Delay ranges from 1 to 255 If the door is not closed and locked after opening for a certain duration (Door Sensor Delay), seconds. Door Sensor Type not in use; Normal Open means the door is always opened when electricity is on; Normal There are three types: None, Normal Open, and Normal Closed. None means door sensor is Closed means the door is always closed when electricity is on. When the state of the door sensor is inconsistent with that of the door sensor type, Door Alarm Delay (s) alarm will be triggered after a time period; this time period is the Door Alarm Delay
(the value ranges from 1 to 999 seconds). To transmit a sound alarm or disassembly alarm from the local. When the door is closed or the verification is successful, the system will cancel the alarm from the local. Speaker Alarm 38 2.8-inch Linux Visible Light Product User Manual 10. USB Manager Upload or download data between device and the corresponding software by USB disk. Before uploading/downloading data from/to the USB disk, insert the USB disk into the USB slot first. Select USB Manager on the main menu interface. 10.1 USB Download Select Download on the USB Manager interface. Item Description Attendance Data Import all the attendance data from the device to a USB disk. User Data Import all the user information, fingerprints and facial images from the device to a USB disk. User Portrait Import the employees' photos from the terminal to a USB disk. Attendance Photo Download attendance photos saved in device to U disk. The format of photo is JPG. Blacklist Photo Download black list photos saved in device to U disk. The format is JPG. 2.8-inch Linux Visible Light Product User Manual 39 10.2 USB Upload Select Upload on the USB Manager interface. Item Description To upload all screen savers from USB disk into the device. You can choose [Upload selected Screen Saver picture] or [Upload all pictures]. The images will be displayed on the devices main interface after upload. Wallpaper To upload all wallpapers from USB disk into the device. You can choose [Upload selected picture] or [Upload all pictures]. The images will be displayed on the screen after upload. User Data Upload the message stored in a USB disk to the terminal. Upload the JPG documents that are named after the user IDs and stored in a USB disk to the terminal, so that user photos can be displayed after the employees pass the verification. User Portrait 10.3 Download Options Select Download Options on the USB Manager interface. Click [M/OK] to enable or disable the [Encrypt Attendance Data] and [Delete ATT Data] options. Remarks: The encrypt attendance data can only be imported in the software of Access 3.5. 40 2.8-inch Linux Visible Light Product User Manual When the identity of a user is verified, the record will be saved in the device. This function enables users to check 11. Attendance Search their access records. 1. Attendance Record Select Attendance Search on the main menu interface. The process of searching for attendance and blacklist photos is similar to that of searching for access records. The following is an example of searching for access records. On the Attendance Search interface, Select Access Records. 1) Enter the user ID to be searched and Select OK. If 2) Select the time range in which the records you want to you want to search for records of all users, Select OK search for. without entering any user ID. 2.8-inch Linux Visible Light Product User Manual 41 3) The record search succeeds. Select the record in green to view its details. record. 4) The below figure shows the details of the selected 2. Attendance Photo and Blacklist ATT Photo The operations are similar to those performed to Attendance Record. 42 2.8-inch Linux Visible Light Product User Manual The auto test enables the system to automatically test whether functions of various modules are normal, including 12. Autotest the LCD, voice, sensor, keyboard and clock tests. Select Autotest on the main menu interface. Description Item Test All Test LCD Test Voice To automatically test whether the LCD, audio, camera and RTC are normal. To automatically test the display effect of LCD screen by displaying full-color, pure white, and pure black to check whether the screen displays colors normally. To automatically test whether the audio files stored in the device are complete and the voice quality is good. The terminal tests whether every key on the keyboard works normally. Press any key on the Test Keyboard
[Keyboard Test] interface to check whether the pressed key matches the key displayed on screen. The keys are dark-gray before pressed, and turn blue after pressed. Press [ESC] to The terminal automatically tests whether the fingerprint collector works properly by Test Fingerprint checking whether the fingerprint images are clear and acceptable. When the user places Sensor his/her finger in the fingered guide, the collected fingerprint image is displayed on the screen in real-time. Press [ESC] to exit the test. Test Clock RTC To test the RTC. The device tests whether the clock works normally and accurately with a stopwatch. Touch the screen to start counting and press it again to stop counting. exit the test. 2.8-inch Linux Visible Light Product User Manual 43 13. System Information on. Select System Info on the main menu interface. With the system information option, you can view the storage status, the version information of the device, and so Item Description Device Capacity records, attendance and blacklist photos, and user photos. Displays the current device's user storage, password and face storage, administrators, access Device Info platform information, and manufacturer. Displays the device's name, serial number, MAC address, face algorithm version information, Firmware Info Displays the firmware version and other version information of the device. 44 2.8-inch Linux Visible Light Product User Manual Note:
1. 2. Statement on the Right to Privacy Dear Customers:
Thank you for choosing this hybrid biometric recognition product, which was designed and manufactured by ZKTeco. As a world-renowned provider of core biometric recognition technologies, we are constantly developing and researching new products, and strive to follow the privacy laws of each country in which our products are sold. We Declare That:
involve privacy protection. 1. All of our civilian fingerprint recognition devices capture characteristics, not fingerprint images, and do not 2. None of the fingerprint characteristics that we capture can be used to reconstruct an image of the original fingerprint, and do not involve privacy protection. 3. As the provider of this device, we will assume no direct or indirect responsibility for any consequences that 4. If you would like to dispute human rights or privacy issues concerning your use of our product, please directly may result from your use of this device. contact your employer. Our other police fingerprinting devices or development tools can capture original images of citizens' fingerprints. As to whether or not this constitutes infringement of your rights, please contact your government or the final supplier of the device. As the manufacturers of the device, we will assume no legal liability. Chinese law includes the following provisions on the personal freedoms of its citizens:
There shall be no illegal arrest, detention, search, or infringement of persons;
Personal dignity as related to personal freedom shall not be infringed upon;
3. A citizen's house may not be infringed upon;
4. A citizen's right to communication and the confidentiality of that communication is protected by law. As a final point we would like to further emphasize that biometric recognition is an advanced technology that will undoubtedly be used in e-commerce, banking, insurance, legal, and other sectors in the future. Every year the world is subjected to major losses due to insecure nature of passwords. Biometric products serve to protect your identity in high-security environments. Disposal of a battery into fire or a hot oven, or mechanically crushing or cutting of a battery, that can result in an explosion. Leaving a battery in an extremely high temperature surrounding environment that can result in an explosion or the leakage of flammable liquid or gas. A battery subjected to extremely low air pressure that may result in an explosion or the leakage of flammable liquid or gas. 2.8-inch Linux Visible Light Product User Manual 45 Eco-friendly Use this manual. This product's "eco-friendly use period" refers to the period during which this product will not leak toxic or hazardous substances, when used in accordance with the conditions in The eco-friendly use period indicated for this product does not include batteries or other components that are easily worn down and must be periodically replaced. The battery's eco-friendly use period is 5 years. Hazardous or Toxic Substances and Their Quantities Hazardous/Toxic Substance/Element Component Name Lead (Pb) Mercury Cadmium
(Hg)
(Cd) Hexavalent chromium
(Cr6+) Polybrominated biphenyls (PBB) Polybrominated diphenyl ethers
(PBDE) Chip Resistor Chip capacitor Chip inductor Diode ESD component Buzzer Adapter Screws requirements specified in SJ/T 113632006. requirements specified in SJ/T 113632006. 46 2.8-inch Linux Visible Light Product User Manual indicates that the total amount of toxic content in all of the homogeneous materials is below the limit indicates that the total amount of toxic content in all of the homogeneous materials exceeds the limit Note: 80% of this project's components are made using non-toxic, eco-friendly materials. Those which contain toxins or harmful materials or elements are included due to current economic or technical limitations which prevent their replacement with non-toxic materials or elements. FCC warning:
Any Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
-Reorient or relocate the receiving antenna.
-Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help. The device has been evaluated to meet general. This equipment should be installed and operated with minimum distance 20cm between the radiator and your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference,
(2) This device must accept any interference received, including interference that may cause undesired operation. Supplier's Declaration of Conformity 47 CFR 2.1077 Compliance Information Unique Identifier Trade Name:Smart Access Control Terminal, Model No.: SpeedFace-V5L Responsible Party U.S. Contact Information ZK Technology LLC DBA ZK Teco 200 Centennial Avenue, Suite 211, Piscataway, NJ 08854,US https://www.zktechnology.com/
ZK Building, Wuhe Road, Gangtou, Bantian, Buji Town, Longgang District, Shenzhen China 518129 Tel: +86 755-89602345 Fax: +86 755-89602394 www.zkteco.com Copyright2019 ZKTECO CO., LTD. All rights reserved.
1 2 | Label | ID Label/Location Info | 155.22 KiB | July 31 2020 |
4 ZK Tzca Smart Access Control Terminal Model: SpeedFace-H5L C et Input: DC 12V=3A Operating Temperature: 0C-45C Se eee asi ce) ee ROL EROS See ee ta cee Made in China Peete
1 2 | Applicant Declaration Letter | Cover Letter(s) | 1.11 MiB | July 31 2020 |
~~ ee ae SCS North America Inc. Auwrniwnlinawnt RaaAlawatinewas aS A aac A ee te rm ENoCHEEe BIW WIC QUI RON Old Dasa DAad PP cee ee ee eee. ey C\QLiiiyvTo ann VMUWAIOS, VOCUlyla VUUe'T leg aaa gt amigos a UIE olales if te ee Bede se a
| Applicant Legal business Name | ZK 1 ECO CU, LID, ee pee mee a xe Seaieay ee | INO.Z0,6 INZSNAaN 166 MGuUstry ZONE, Lanexld LOWNVONSsuan City, WuUAaneadones rrovince, EEE ae ee
| 523728 China
| Grantee Code | 2DAJ9OT
| FCC ID | 2AJOT-HSMW
| Authorized Contact Name | Zhonglie Ge
| Contact Email | GZL(WZK TL ECO.COM
} Contact Fnone |} TOO USI OF0ULL//
l tha tindearcinnad rartify that lam an aiithnrigad cinnatary far tha Annilicant and therafnra docrlara:
ey eee Pe eee, ee eee ee ee ee ee a a oa ee ae L AIROMD NAA/.d\
Se a Rea ee eR ae. Ma a) WE GUCUIUGIICS WHET SPUD INE. OE IU), Gl Ul UID SLAG iito HIST OCHT GI WIG CALVING GUAUNOCU NGeIGW GIG UUG aU UVC ULLW WIS VEOlLUrIly Se SURE EA ee Boner alte at ae os creat KMOWICaGe dla Denver. Db) In accepting a Grant of Equipment Autnorization Issued by a | Cb, under the authority of the FCC, as a result of the representations made in this application, the Applicant is responsible for:
fu oi ee
(1) labeling the equipment with the exact FCC ID as specified in this application.
(2) compliance statement labeling nursuant to the annlicable rules. sete mime eee ern cence OTR ain NCEA MALMO Tg 2 aE ey anne pe
(2\ enmniiance of the an; Art with the annlicahle tachnical rijlac OTN SR Sy Se Tea a | naan rhs Stace Atm ltmeend cet Siew se bicce) seeonaer ited ee ok tie CU ee Ge: San ee eae bonne: beouenee pee Kaelin blac Secenas she abe tea ee te ree
) UE EUS PNM MUIR tO PIL UI Che Be ay ee eae eee TAHA VE ee NER CAR PRE RRA Re CAE EAE Ee E ENE ERR PECAN RON E ECA RU EREE GE PRs EE TCAR ERAECANORRAE NE O87 Nel ORE aly lg i aR sm Ulal PrOUUCUOl! UTS OF US CQUINTHOCTL WHT COMUIUS WW CUITIDIY WItT Ue Polk > LOU HUG! POQUICITEI Io. q) in accordance with 4/ CFR 2.909 and KUBSY4521, tne Applicant Nas read, understood and agrees to accept tnat they are the responsible party and agree to abide by their responsibilities as specified under 47 CFR 2.909 and KDB394321. e) in accordance with |SO17065. FCC KDB641163, FCC KDB610077, KDB394321 and RSP-100. the Applicant has read. understood. accepts and aarees to abide bv the vost market surveillance requirements. f1\ tha Annlirant rndearctande arrante and anroac that a camnia may hea ranitactad far ciirvaillanra tactinn ee eS 2 See eee Sees POS be | Miceli eenk Sec melee HPI:
mk i ACN ea sn Na Ra Al allel emt a lla a ate aati Oe a as iy a te a a pk a tn MR i al catia J cin bm ealintmere [eens a Teale Sorin: esuniisnikia +c eect bs Ome CPR walla (OL af SINS ENN ES ee eee fe Se BSS Mes See Nee ee ee eee oe ae eee ee ee eee ee eee ee Se ee NE Ee eee te FE eg FO SRE NE SOR: (BN te ets:
SN A a a a yg Ne i a a I RR IR, gg RS i AY) EIS PAP BUCO orseeds, UVPUTLTOUUC OL UY OUI, GLU APPIN S CAVCHOS, PIUVING Ga VIVUUCUUL oa@IIViG UF Ue eNO Pee Wwove, a gigs oe ae a a aes ee a Sane new =
ee a es ei real eds PO dila/OPr lob do HlsuUuCcted, Ie eS nell ee all SEES Bev Pee: pO ELVALE, BVES SoClICS OF OWler NarQWale OF sortware required tor evaiuation, review, Certincation and audit Surveillance of proaucis certilied Dy oGo. f) neither the Applicant nor any party to the application is subject to a denial of Federal benefits, that includes FCC benefits. pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988. 21 U.S.C. 8862 because of a conviction for possession or distribution of a controlled substance See ATOER 4 CONDI) for the:dahniionat anarhk? for ikede numrneac. eM oa Ee a n\ them AnnhAnnnt hae raat tintarstann Anmanto and AArace tr-oahina: Kurtha CRO Alartkh Amanae lan (TCU. tarneacnnad AAm Shane ws ee ee ene ae Fy See eee ee ee ae SE ee ee, SN Oe ee ee a ee ae Oe ae ee SET eT Oe ee re Swe ERE Se ee Ree Nee hy LINK TO UPINS: DUDS //WWW.ICC.QOV/WITEieSS/DUreaU-IVISIONSTECNNOlOGIES-SYStEMS-ang-INNOVatlONn-iVISION/FUIES -TEQuiatlons-uue-4 LINK tO KUDS: NttpS//appS.ICC.gOov/Oetci/Kad/INdex.ciIm Link to RSP-100: https://Awww.ic.gc.ca/eic/site/smt-qst.nsf/eng/sf01130.html an ie Annlicant Siqnatiire: } ides Mant. ININD/INL/N1 pe acer MAW. 2ULUWIUUIYE SSYU"A VV VS
| PrintName: | Zhonglie Ge Titla: Bragineer a ee ee eg aa ane AIRES E SS Bec Nom RN ye ed Bn RC) er a TE oe) REL OR eR Me ec a cee IRL, eet Ee on eR ORC eg MRR erg 7S INNATE, Gio GGG art Gare WAG OygeiGd WY Girl AAYCLil, Mh ONG UE OIGIGCU LY GS GUEIOMESU POP OUT) HOt Hi Wit FO Udiaiaot Applicant Veciaration Rev:0.0 pt
1 2 | Channel Statement | Cover Letter(s) | 588.96 KiB | July 31 2020 |
pe a
as D2 alr WIAN Channels 1eed 1n [JS and/or C'anada Se eC eee ee < See Ree ee rn ren a ee ee Seite en en el nt Ty aS SS AECL ae TT We, ZK Lecnnology LLU UbDA ZAK Lleco. declare that this equipment (FCC ILD:
Mm A TMT YTYTeF.R Xt 1 son 4 4ttff wef pr ae rN fom Z4AJI7 L-TLOIVL WV) GOCSN T Nave ad Moe wioge function ON Non-Us/Canada requencies. A a MRcig nat)
=e. dil dadQ@Qiuiohl, UIC MOCQUCHCY SseieCulOnl ICdalure Is AQisdDICca DY TWiTWadale LOL GCvices i ee AN co ee I eS ee ES eS HUAI BOLO tO WIS Ud/s Udilatd, POL Ilo padall OF UllS CUVICE, OLY ClidilIeis T-il Will O Ee ee! Se ee CO So eee Oe ee ne ea ck Me ene Been HOU TAL ANUEULE CAIRN. WUULILL Y VUE SUELEUULU EE 1s UL aut. Qhanld van have any anectinne ar cammente recardino thie matter Pleace have my Re ee gp ee Cet! See Oo) Re eR | Rn rs Se eS Oey ES Me ee eS Ee a eee a See See: ee See See ee SMR Ne SNC hect attention. ee oe Print Name: Znonglie Ge litie: Engineer tf er waywemmnmmroeOmG ro Tr UN DeNall OF COMpany:. ZNILECCU CY., LIV. ThA) A CU KF COO KGL ONZLARAT LELOPUOUe., TOU UII OFUULLI I Bi amails OZTT CSTV TECH CAVA ay A4i00LL. seg arora Nene ee 4 fw Ww iv Qionatire: adn f~pwls Ae \7fOo
= eee ee ee ee eo 7
iD 2 es. | et is 7 a i
i ry a oF iT a ee ae |
pete - fF a tal
. im ZKTECO CO., LTD.
1 2 | Confidentiality Letter | Cover Letter(s) | 766.00 KiB | July 31 2020 |
= s =
an
-= 3S. 10:
Federal Communications Commission ge ge MeN Se ee ne ee DS See ee eee Tiggm Gerete ree mea mre ae re egiee mn agen) re FIN MITUS MI EEIGIIGRIITTYy GNM DCU yy SAMMY MivioMtt
(4359 Oakiand MiIIS Rd. Caliimhia MND 91046 ee eee, ee a a DnnarAlince PARA antinlings Dawmi tet rAanarcinn annlinatinn far COT IF): SA InP eA MWe ysl Uiliyg: NAAT TENANT EIOCAEEL Pwwoyeiveevet oe Ne Sees Sa ee a ee ee ee SD ee LOAAICQN TEDAA COHOAICINGCAITIAI ITV we Fe FN eee ea 2 ae Re. er Pursuant to 47 CFR Section 0.459 and 0.457 of the commissions rules. the aoplicant hereby request balm See ae Cat cares ees SS REED ed a ee ee See a ee eg 2 Hi oa a =
pte leuk ional Lerncwmbwncakk mi tax alLanimantn Katine bales meses vant than pramrtitinmtinwn armenian RVI GOCCUEIGIIG UE UI UU EO HOO MTA ADOT CAR HE VERE RE ER Ne PREAMP MEV referenced above. Pee os ee WULIOTMCAULA Sf BIOocK Diagrams Onaratinnal Mocerrintinne ge ee ee eee eee The documents above contain proprietary information not released to the public. Public disclosure of this a, nN may nrnwso Aarmfiil ta tha Aricinogce nf tho annlicrant iIntarma eth SE Se AT, REE OE A ae Pe Oe eee Ne Spe eae ee ee a ee SHORT TERM CONFIDENTIALITY Adaitionally, the applicant requests tne frolowing qocuments be neia contidential for U Gays trom tne grant date If the davica ie markated within aforementioned dave of the Grant Date the annlicant will notify the TR |. ~. rmRmeme Vera VFaARHNAH PANMA f-R.. . a eR PUD PS! Ted AYD 42094 YU T UUHTGCIIAILy INGCQUG ot FIUUeUUloo. Eyternal Photos WO ical bP Test cetup FNOtos Lear maniualle) Sincerely, Drint Alama: Vhanalia Ca Titla: Enninaar i SOtiene e a e e SCT ee ee ee ee ee On behalf of Comvnanv: ZKTECO CO.. LTD. lTelepnone: tod U/o00 odJ0UZZS S
=e Me on, OE FCStCT ee As SAAS Tit lcalt. Vvelee ! Pee rea Qinnatira: Saw Ve lf eZ a te Se ee ar
(he ae
1 2 | Power of Attorney Letter | Cover Letter(s) | 810.57 KiB | July 31 2020 |
71 2 2 ee. Se RMAtAn. QHNIONHRINAINA Maw. 424VU4UIUUIU I EO: Federal Communication Commission Enqrninmant Aiithorizvatinn Rranch ee oe eee ee Chee eee rm. ee
@37~sAnAm om _1.1. 2. LIRA PS OO Udtidlli@ Wills TRQOaUd Columbia, MID 21046 Si ee megalraing: FUU IU! ZASY 1 -MonVivy i a PU WHEE TL Thay GUTIOUSIIT. Wa thatindereciqned herehyv aithorize SGS-CSTC Standards Technical Services Co Itd (SGS) See fee ee ee ER ee Ree ee ed eee ae gee ame tia ahem i a I I, a Sm a Oe eR NE a
~b VUSUZUSI DIAHUH ali JIty OOUNY HT DOOM TY DIG IAIN SS TRS DIVERS SONY EN NDI Oe Branch to act on our behalf in all manners relating to application for equioment authorization with respect ix tha. COE IF-aRAUA IRA Ree AR Ae At Sill darnmante calotinge tA thaaen matarce AAW ann oll acta marcen NE Te ee ee, a eee Ne ee es a a Ae ae in vee see See: Se ee Coe ee SON ee ee out DY he agent Of) OUF DEMall Silall NaVe WIE salll CHECt ds aCls OF OUT OWT?TT.
{Alan thm anntarcinnanl harcnkhws martitos thabvascn arn nrtaiiaat tn a Aanial vat fadaral hannatfita thatiineh rine WWM, Chi MAE ENA SEE EN Ny EEE DAME) SENSE YF) BSS: Ve SE Se LE eS oe SE MEE SE NE EE NE EERE BE EAE EK Se ee pare a. oe: ee ed es ee Tk ee We ee pee me A st J aa ox aes hk ia Ee pice SS FOO peneits, pursuant tO Section voUT OT Ine ANU-Vrug ANUSE ACT OT lYoo, 21 U.0.U. GOA). a a I I NI ee ae ci arta ee ae ce MI ie Nee el ee cl ae OR ee i ee ea i VWVHICIS UU ne ye ee) tic See Ss wet IVT UOSPUuUauUUrt Vit UU ee i Fa ence a ee Abicat call tee eee Tor complying with the terms and conaitions for Certification, aS specitied Dy oGo Norin America, INnc., Sull racidae with ZICTERO CO ITM ee meee s =
aa ee ee Thie aiithnarivzatinn ie valid runtil fiirthar wsrittan naticra fram tha annlicant wer SE Se A SE. OES CR SEE ee Se NT SEE Tee ee ee ee ee ee Ee ek Eee PODOOINQGUIII@., GIMVIiNs Wa SPRING Bee Ott NONE as On hehalf anf Comnanv: 7KTECO CO |1Th an Telephone: +86 0755 89602277 Pe Te ee Te ee eT C-Tldil. SGZLWMEANICUY.UUN,
= eal i al ae Keny Xu
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2020-07-31 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
2 | 13.56 ~ 13.56 | DXX - Part 15 Low Power Communication Device Transmitter |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 | Effective |
2020-07-31
|
||||
1 2 | Applicant's complete, legal business name |
ZKTECO CO., LTD.
|
||||
1 2 | FCC Registration Number (FRN) |
0026008086
|
||||
1 2 | Physical Address |
No.26, Pingshan 188 Industry zone, Tangxia Town, Dongguan City, Guangdong Province, China 523728
|
||||
1 2 |
No.26, Pingshan 188 Industry zone, Tangxia Town
|
|||||
1 2 |
Dongguan, N/A
|
|||||
1 2 |
China
|
|||||
app s | TCB Information | |||||
1 2 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 2 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
1 2 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 | Grantee Code |
2AJ9T
|
||||
1 2 | Equipment Product Code |
H5MW
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 | Name |
Z**** G******
|
||||
1 2 | Title |
Engineer
|
||||
1 2 | Telephone Number |
+86 0******** Extension:
|
||||
1 2 | Fax Number |
+86 0********
|
||||
1 2 |
G******@ZKTECO.COM
|
|||||
app s | Technical Contact | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 2 | Name |
K******** X******
|
||||
1 2 |
K**** X******
|
|||||
1 2 | Physical Address |
No.1 Workshop, M-10, Middle Section
|
||||
1 2 |
Shenzhen, 518057
|
|||||
1 2 |
China
|
|||||
1 2 | Telephone Number |
86-75********
|
||||
1 2 | Fax Number |
86-75********
|
||||
1 2 |
k******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 | DXX - Part 15 Low Power Communication Device Transmitter | |||||
1 2 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Smart Access Control Terminal | ||||
1 2 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 | Modular Equipment Type | Does not apply | ||||
1 2 | Purpose / Application is for | Original Equipment | ||||
1 2 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 | Grant Comments | Output Power listed is conducted. The antenna used for this transmitter must be installed to provide a separation distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter product procedures. Users and installers must be provided with antenna installation instructions and transmitting operating conditions for satisfying RF exposure compliance. The device supports 20 and 40 MHz bandwidth modes. | ||||
1 2 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd
|
||||
1 2 | Name |
K**** X********
|
||||
1 2 | Telephone Number |
+86 (********
|
||||
1 2 |
K******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2412 | 2462 | 0.095 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC | 2422 | 2452 | 0.07 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15C | CC | 13.56000000 | 13.56000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC