DS-K1T331 Series Face c n n
Terminal
User Manual
UD15529B
Legal n m n
User Manual
©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
About this Manual
This Manual is subject to m tic and n rn ti n copyright r cti n Hangzhou Hikvision Digital Technology Co., Ltd.
("Hikvision") reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, rti y or wholly, by any means, without the prior wr n
permission of Hikvision.
Please use this user manual under the guidance of professionals.
Trademarks
|
|
|
and other Hikvision marks are the |
property of Hikvision and are registered trademarks or the |
|||
subject of |
c ti n |
for the same by Hikvision and/or its |
|
|
Other trademarks m nti n in this manual are the |
||
r |
rti |
of their r |
ctiv owners. No right of license is given |
to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Data |
c n |
During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision
i
devices incorporates privacy by design principles. For example,
for device with facial r c |
n ti n features, biometrics data is |
|
stored in your device with |
ncry |
ti n method; for n r r n |
device, only n r r n template will be saved, which is |
||
impossible to reconstruct a n |
r r n image. |
As data controller, you are advised to collect, store, process and
transfer data in accordance with the applicable data |
r |
cti n |
||
laws and r |
ti n including without |
m ti n c |
n |
ctin |
security controls to safeguard personal data, such as, |
|
|
||
m m ntin |
reasonable m n r tiv |
and physical security |
||
controls, conduct periodic reviews and assessments of the |
||||
ctiv n |
of your security controls. |
|
|
|
ii
Symbol C nv n |
|
n |
|
|
|
|
|
|||
The symbols that may be found in this document are |
n as |
|||||||||
follows. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Symbol |
|
c |
n |
|
|
|
|
|
|
|
|
|
|
|
|
||||||
Danger |
Indicates a hazardous |
ti |
n which, if not avoided, |
|||||||
will or could result in death or serious injury. |
||||||||||
|
|
|||||||||
|
|
|
|
|
|
|
||||
|
|
Indicates a |
nti |
y hazardous |
ti |
n which, if |
||||
C |
n |
not avoided, could result in equipment damage, data |
||||||||
loss, performance |
r |
ti |
n or unexpected |
|||||||
|
|
results. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
Note |
|
Provides |
|
ti n |
n |
rm ti |
n to emphasize or |
|||
|
supplement important points of the main text. |
|||||||||
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
iii
Regulatory n m |
n |
|
FCC n m |
n |
|
Please take |
nti n that changes or m c ti n not expressly |
approved by the party responsible for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable |
r |
cti |
n against harmful interference in a |
|
r |
nti |
n |
ti |
n This equipment generates, uses and can |
radiate radio frequency energy and, if not installed and used in
accordance with the n |
r cti n |
may cause harmful interference |
|
to radio c mm n c ti n |
However, there is no guarantee that |
||
interference will not occur in a |
rtic r n |
ti n If this |
equipment does cause harmful interference to radio or television r c ti n which can be determined by turning the equipment and on, the user is encouraged to try to correct the interference by one or more of the following measures:
—Reorient or relocate the receiving antenna. |
|
|
—Increase the |
r ti n between the equipment and receiver. |
|
—Connect the equipment into an outlet on a circuit |
r n |
|
from that to which the receiver is connected. |
|
—Consult the dealer or an experienced radio/TV technician for help
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.
FCC n ti n |
|
This device complies with part 15 of the FCC Rules. |
r ti n is |
subject to the following two c n ti n |
|
1.This device may not cause harmful interference.
2.This device must accept any interference received, including
interference that may cause undesired |
r ti n |
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under
iv
the EMC r ctiv 2014/30/EU, RE r ctiv 2014/53/EU,the RoHS r ctiv 2011/65/EU
2012/19/EU (WEEE r ctiv ) Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at
designated c |
cti |
n points. For more |
|||
n rm ti |
n see: www.recyclethis.info |
||||
2006/66/EC (b |
ry r |
ctiv ) This product |
|||
contains a b |
ry that cannot be disposed of as |
||||
unsorted municipal waste in the European |
|||||
Union. See the product |
c m n |
ti n for |
|||
c c b |
ry n |
rm ti n The b |
ry is |
marked with this symbol, which may include
r n to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the
bry to your supplier or to a designated
c cti n point. For more n rm ti n see:www.recyclethis.info
v
Safety n c n
These n r cti n are intended to ensure that user can use the product correctly to avoid danger or property loss.
The r c |
ti |
n measure is divided into Dangers and |
ti |
n |
|
|||||||||
Dangers: N |
ctin |
any of the warnings may cause serious injury |
||||||||||||
or death. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
C |
n |
N |
ctin |
any of the c |
|
ti |
n may cause injury or |
|
||||||
equipment damage. |
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dangers: Follow these safeguards |
C |
|
n |
Follow these |
r c |
ti |
n |
|||||||
to prevent |
nti injury or |
|
||||||||||||
to prevent serious injury or death. |
|
|||||||||||||
material damage. |
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Danger: |
|
|
|
|
|
|
|
|
|
|
|
|
|
• |
All the electronic |
r |
ti |
n should be strictly compliance with |
||||||||||
|
the electrical safety r |
|
ti n |
|
r |
r |
v nti |
n r |
ti |
n |
and |
|||
|
other related r |
ti |
n |
in your local region. |
|
|
|
•Please use the power adapter, which is provided by normal company. The power c n m ti n cannot be less than the required value.
•Do not connect several devices to one power adapter as
adapter overload may cause over-heat or r hazard.
•Please make sure that the power has been disconnected before you wire, install or dismantle the device.
•When the product is installed on wall or ceiling, the device
shall be rm y |
x |
|
|
|
|
|
|
|
• If smoke, odors or noise rise from the device, turn |
the |
|
||||||
power at once and unplug the power cable, and then please |
||||||||
contact the service center. |
|
|
|
|
|
|||
• Do not ingest b |
ry Chemical Burn Hazard. |
|
|
|
||||
This product contains a c |
|
n b |
n cell b |
ry If the c |
n |
|||
b |
n cell b |
ry is swallowed, it can cause severe internal |
||||||
burns in just 2 hours and can lead to death. |
|
|
|
|||||
Keep new and used b |
r |
away from children. If the b |
ry |
|||||
compartment does not close securely, stop using the product |
||||||||
and keep it away from children. If you think b |
r |
might |
||||||
have been swallowed or placed inside any part of the body, |
||||||||
seek immediate medical |
|
nti |
n |
|
|
|
• If the product does not work properly, please contact your dealer or the nearest service center. Never m to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
C n
• Do not drop the device or subject it to physical shock, and do not expose it to high c r m n ti m r ti n Avoid the
vi
equipment n |
ti n on v br ti n |
surface or places subject |
||
to shock (ignorance can cause equipment damage). |
||||
• Do not place the device in extremely hot (refer to the |
||||
c c ti n of the device for the detailed |
r tin |
|||
temperature), cold, dusty or damp |
c ti |
n |
and do not |
|
expose it to high |
c r m n tic r |
ti |
n |
|
•The device cover for indoor use shall be kept from rain and moisture.
• Exposing the equipment to direct sun light, low v nti ti n or heat source such as heater or radiator is forbidden (ignorance can cause r danger).
• Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise (which is not a
m ncti n however), and ctin the endurance of sensor at the same tim
•Please use the provided glove when open up the device cover, avoid direct contact with the device cover, because the acidic
sweat of the n r may erode the surface c tin of the device cover.
•Please use a and dry cloth when clean inside and outside surfaces of the device cover, do not use alkaline detergents.
• |
Please keep all wrappers |
r unpack them for future use. In |
||
|
case of any failure occurred, you need to return the device to |
|||
|
the factory with the original wrapper. |
r n r ti n without |
||
|
the original wrapper may result in damage on the device and |
|||
|
lead to |
ti n costs. |
|
|
• |
Improper use or replacement of the b |
ry may result in |
hazard of explosion. Replace with the same or equivalent type
only. Dispose of used b |
r |
according to the n r cti n |
|||
provided by the b |
ry manufacturer. |
||||
• Biometric r c |
n ti |
n products are not 100% applicable to |
|||
nti |
n |
environments. If you require a higher security |
|||
level, use m |
ti |
|
ntic ti |
n modes. |
•Input voltage should meet both the SELV (Safety Extra Low Voltage) and the Limited Power Source with 100~240 VAC or 12 VDC according to the IEC60950-1 standard. Please refer to
technical |
c c ti n for detailed n rm ti n |
vii
Product Name |
|
Model |
|
|
|
|
|
Face c n ti |
n Terminal |
DS-K1T331 |
|
|
|||
DS-K1T331W |
|||
|
|
||
|
|
|
Use only power supplies listed in the user n |
r cti n |
||
|
|
|
|
Model |
Manufacturer |
Standard |
|
|
|
|
|
ADS-26FSG-12 |
Shenzhen Honor |
PG |
|
12018EPG |
Electronic Co., Ltd. |
||
|
|||
|
|
|
|
ADS-26FSG-12 |
Shenzhen Honor |
PI |
|
12018EPI-01 |
Electronic Co., Ltd. |
||
|
|||
|
|
|
|
ADS-26FSG-12 |
Shenzhen Honor |
PCU |
|
12018EPCU |
Electronic Co., Ltd. |
||
|
|||
|
|
|
|
ADS-26FSG-12 |
Shenzhen Honor |
PB |
|
12018EPB |
Electronic Co., Ltd. |
||
|
|||
|
|
|
|
MSA-C1500IC12.0- |
MOSO Technology Co., |
PBR |
|
18P-BR |
Ltd. |
||
|
|||
|
|
|
viii
|
|
|
Contents |
|
|
|
1 Overview .................................................................. |
|
|
|
1 |
||
1.1 Overview ............................................................... |
|
|
1 |
|||
1.2 |
Features |
................................................................ |
|
|
1 |
|
2 Appearance .............................................................. |
|
|
|
1 |
||
3 n |
|
n ............................................................... |
|
|
|
2 |
3.1 |
n |
ti |
n Environment ....................................... |
|
2 |
|
3.2 Base M |
ntin ...................................................... |
|
|
3 |
||
3.3 |
Install with Gang Box ............................................ |
|
3 |
|||
4 Wiring ...................................................................... |
|
|
|
|
5 |
|
4.1 |
Terminal |
cr ti |
n ............................................. |
|
6 |
|
4.2 Wire Device ........................................................... |
|
|
7 |
|||
4.3 Wiring with Power Cable ...................................... |
|
7 |
||||
5 c v |
n ................................................................. |
|
|
|
7 |
|
5.1 |
ctiv |
via Device ................................................ |
|
|
8 |
|
5.2 |
ctiv |
via SADP .................................................. |
|
|
8 |
|
5.3 |
ctiv |
Device via Client |
w r |
...................... 9 |
||
6 Basic |
|
n ...................................................... |
|
|
10 |
|
6.1 |
n |
r ti n Flow of Device .............................. |
|
10 |
||
6.2 Set |
|
c ti n Mode ......................................... |
|
11 |
||
6.3 |
Login ................................................................... |
|
|
|
11 |
|
|
6.3.1 Login by Administrator .............................. |
|
11 |
|||
|
6.3.2 Login For First Time ................................... |
|
12 |
|||
6.4 |
mm n c ti n |
n ..................................... |
|
12 |
||
|
6.4.1 Set Network Parameters ............................ |
12 |
||||
|
6.4.2 Set Wi-Fi Parameters ................................. |
|
13 |
|||
|
6.4.3 Set RS-485 Parameters .............................. |
|
14 |
|||
6.5 |
Set Access Control Parameters ........................... |
14 |
||||
6.6 User Management .............................................. |
|
|
16 |
ix
6.6.1 Add Administrator ..................................... |
|
|
|
16 |
||||
6.6.2 Add Face Picture ........................................ |
|
|
|
17 |
||||
6.6.3 Add Card .................................................... |
|
|
|
|
|
18 |
||
6.6.4 Add Password ............................................ |
|
|
|
|
19 |
|||
6.6.5 Set |
ntic ti |
n Mode |
.......................... |
|
20 |
|||
6.6.6 Search and Edit User |
.................................. |
|
|
20 |
||||
6.7 Import and Export Data ...................................... |
|
|
|
21 |
||||
6.7.1 Export Data ................................................ |
|
|
|
|
|
21 |
||
6.7.2 Import Data |
............................................... |
|
|
|
|
21 |
||
6.8 |
nti y |
ntic |
ti |
n ....................................... |
|
|
|
22 |
6.8.1 |
ntic |
via Face ................................ |
|
|
22 |
|||
6.8.2 |
ntic |
via M |
ti |
r |
nti ....... |
22 |
||
6.9 System |
n ................................................... |
|
|
|
|
|
22 |
|
6.9.1 Set Basic Parameters |
................................. |
|
|
22 |
||||
6.9.2 Set Face Picture Parameters ...................... |
|
23 |
||||||
6.9.3 Set Time ..................................................... |
|
|
|
|
|
24 |
||
6.10 Time and |
n |
nc |
Status |
n |
............... |
24 |
||
6.10.1 Set Manual |
|
n |
nc |
via Device .......... |
25 |
|||
6.10.2 Set Auto |
n |
nc |
via Device .............. |
25 |
||||
6.10.3 Set Manual and Auto |
n |
nc via Device |
||||||
............................................................................. |
|
|
|
|
|
|
|
26 |
6.10.4 Disable |
n |
nc |
Mode via Device ...... |
27 |
||||
6.11 Maintenance ..................................................... |
|
|
|
|
|
28 |
||
6.11.1 Upgrade Firmware ................................... |
|
|
|
28 |
||||
6.11.2 Data Management ................................... |
|
|
|
28 |
||||
6.11.3 Log Query ................................................ |
|
|
|
|
|
29 |
||
6.12 View System n |
rm ti n |
.................................. |
|
|
29 |
|||
7 Client |
ftw |
C n |
|
n ................................. |
|
|
|
31 |
7.1 |
n r ti |
n Flow of Client |
w r |
................ |
31 |
|||
7.2 Device Management ........................................... |
|
|
|
|
31 |
x
7.2.1 Add Device ................................................. |
|
|
|
|
|
|
|
31 |
||||
7.2.2 Reset Device Password .............................. |
|
|
|
|
38 |
|||||||
7.3 Group Management ........................................... |
|
|
|
|
|
|
|
39 |
||||
7.3.1 Add Group ................................................. |
|
|
|
|
|
|
|
39 |
||||
7.3.2 Import Resources to Group ....................... |
|
|
|
39 |
||||||||
7.3.3 Edit Resource Parameters .......................... |
|
|
|
|
40 |
|||||||
7.3.4 Remove Resources from Group ................. |
|
|
40 |
|||||||||
7.4 Person Management ........................................... |
|
|
|
|
|
|
|
40 |
||||
7.4.1 Add |
r |
n ti |
n ....................................... |
|
|
|
|
|
|
40 |
||
7.4.2 |
n |
|
r |
Basic n |
rm ti |
n ...................... |
|
|
|
41 |
||
7.4.3 Issue a Card to One Person ........................ |
|
|
|
41 |
||||||||
7.4.4 Upload a Face Photo from Local PC |
........... |
42 |
||||||||||
7.4.5 Take a Photo via Client ............................... |
|
|
|
|
43 |
|||||||
7.4.6 Collect Face via Access Control Device ...... |
44 |
|||||||||||
7.4.7 |
n |
|
r |
Access Control n |
rm ti ....... |
n |
44 |
|||||
7.4.8 Customize Person n |
rm ti |
n .................. |
|
|
45 |
|||||||
7.4.9 |
n |
|
r |
Resident n |
rm ti |
n ................ |
|
|
46 |
|||
7.4.10 |
n |
r |
|
ti |
n |
n |
rm ti |
n ............ |
|
46 |
||
7.4.11 Import and Export Person |
nti y |
|
|
|||||||||
n rm ti |
n ......................................................... |
|
|
|
|
|
|
|
|
|
47 |
|
7.4.12 Import Person n |
rm ti |
n ...................... |
|
|
|
47 |
||||||
7.4.13 Import Person Pictures ............................ |
|
|
|
|
48 |
|||||||
7.4.14 Export Person n |
rm ti |
n ...................... |
|
|
|
48 |
||||||
7.4.15 Export Person Pictures ............................. |
|
|
|
|
49 |
|||||||
7.4.16 Get Person n |
rm ti |
n from Access Control |
||||||||||
Device |
................................................................. |
|
|
|
|
|
|
|
|
|
|
49 |
7.4.17 Move Persons to Another |
r |
n |
ti |
n |
||||||||
............................................................................. |
|
|
|
|
|
|
|
|
|
|
|
49 |
7.4.18 ...............Issue Cards to Persons in Batch |
|
|
50 |
|||||||||
7.4.19 ......................................Report Card Loss |
|
|
|
|
|
|
50 |
|||||
7.4.20 ....................Set Card Issuing Parameters |
|
|
51 |
xi
7.5 |
n |
r |
Schedule and Template ...................... |
|
|
52 |
|||||
|
7.5.1 Add Holiday |
............................................... |
|
|
|
|
|
52 |
|||
|
7.5.2 Add Template ............................................. |
|
|
|
|
|
53 |
||||
7.6 Set Access Group to Assign Access |
r |
ti |
n to |
||||||||
Persons ..................................................................... |
|
|
|
|
|
|
|
|
|
54 |
|
7.7 |
n |
r |
Advanced ........................... |
ncti |
n |
|
|
|
55 |
||
|
7.7.1 |
n |
r |
Device ....................Parameters |
|
|
55 |
||||
|
7.7.2 |
n |
r |
Remaining ...........Open/Closed |
|
59 |
|||||
|
7.7.3 |
n |
r |
M ...... |
ti |
c |
r |
ntic |
ti |
n |
61 |
|
7.7.4 |
n |
r |
Custom ...............Wiegand Rule |
|
|
63 |
||||
|
7.7.5 |
n |
r |
Card Reader |
ntic ti |
n Mode |
|||||
|
and Schedule ...................................................... |
|
|
|
|
|
|
|
64 |
||
|
7.7.6 |
n |
r |
First ............................Person In |
|
|
|
65 |
|||
|
7.7.7 |
n |
r |
nti ............................ |
b |
c |
|
|
|
66 |
|
|
7.7.8 |
n |
r |
Device ....................Parameters |
|
|
67 |
||||
7.8 |
n |
r |
Linkage ..... |
cti |
n for Access Control |
72 |
|||||
|
7.8.1 |
n |
r |
Client |
cti |
n |
for Access Event |
72 |
|||
|
............................................................................. |
|
|
|
|
|
|
|
|
|
|
|
7.8.2 |
n |
r |
Device |
cti |
n |
for Access Event |
||||
|
............................................................................. |
|
|
|
|
|
|
|
|
|
73 |
|
7.8.3 |
n |
r |
Device |
cti |
n |
for Card Swiping |
||||
|
............................................................................. |
|
|
|
|
|
|
|
|
|
74 |
7.9 Door Control ....................................................... |
|
|
|
|
|
|
|
74 |
|||
|
7.9.1 Control Door ...................................Status |
|
|
|
|
75 |
|||||
|
7.9.2 Check Real-Time ...............Access Records |
|
|
75 |
|||||||
7.10 Event Center ..................................................... |
|
|
|
|
|
|
|
76 |
|||
|
7.10.1 Enable Receiving Event N ti c ti |
n from |
|||||||||
|
Devices ............................................................... |
|
|
|
|
|
|
|
|
76 |
|
|
7.10.2 View Real-Time .............................Events |
|
|
|
76 |
||||||
|
7.10.3 Search Historical ...........................Events |
|
|
78 |
|||||||
7.11 Time and |
n ........................................ |
nc |
|
|
|
|
|
80 |
|||
|
7.11.1 |
n |
r ........... |
n |
nc Parameters |
|
81 |
xii
7.11.2 Add Timetable ......................................... |
|
|
85 |
||||
7.11.3 Add |
.................................................. |
|
|
|
|
86 |
|
7.11.4 Manage |
|
Schedule ............................ |
|
87 |
|||
7.11.5 Manually Correct Check-in/out Record ... |
90 |
||||||
7.11.6 Add Leave and Business Trip .................... |
|
91 |
|||||
7.11.7 Calculate |
|
n |
nc Data ...................... |
|
92 |
||
7.11.8 |
n |
nc |
ti tic ............................... |
|
93 |
||
7.12 Remote |
n |
|
r ti |
n via Client |
w r ........ |
95 |
|
7.12.1 Check Device n |
rm ti n ........................ |
|
95 |
||||
7.12.2 Edit Device Name |
.................................... |
|
95 |
||||
7.12.3 Edit Time .................................................. |
|
|
|
|
95 |
||
7.12.4 Set System Maintenance ......................... |
|
96 |
|||||
7.12.5 |
n |
r |
RS-485 Parameters .................. |
|
97 |
||
7.12.6 Manage User |
........................................... |
|
|
97 |
|||
7.12.7 Set Security .............................................. |
|
|
|
97 |
|||
7.12.8 |
n |
r |
Network Parameters ............... |
98 |
|||
7.12.9 |
n |
r |
Report Strategy ....................... |
|
98 |
||
7.12.10 |
n |
r |
Network Center Parameters |
|
|||
............................................................................. |
|
|
|
|
|
|
98 |
7.12.11 |
n |
r |
Advanced Network ................ |
98 |
|||
7.12.12 |
n |
r |
Wi-Fi ...................................... |
|
|
99 |
|
7.12.13 Set Face |
c |
n ti n Terminal Parameters |
|||||
............................................................................. |
|
|
|
|
|
|
99 |
7.12.14 |
n |
r |
Face Picture Parameters ........ |
99 |
7.12.15n r Supplement Light Parameters
........................................................................... |
|
|
101 |
A. Tips When C |
c n C m |
n Face Picture ..... |
102 |
B. Tips for n |
n Environment ......................... |
103 |
|
C. Dimension ........................................................... |
|
|
104 |
xiii
Face r c n ti n terminal is a kind of access control device for face r c n ti n which is mainly applied in security access control systems, such as tic centers, airports, university campuses, alarm centrals, dwellings, etc.
•3.97-inch LCD touch screen
•2 MP wide-angle dual-lens
• |
Face nti |
n |
• |
Face r c |
n ti n distance: 0.3 m to 1.5 m |
• |
Suggested height for face r c n ti n between 1.4 m and 1.9 |
|
|
m |
|
•Deep learning algorithm
•300 face capacity, 1500 card capacity (when c nn ctin external card reader), 150,000 event capacity, and 20,000 captured pictures storage
• |
Face r c n ti n |
r ti n 0.2 s/User; face r c n ti n |
||
|
accuracy rate ≥ 99% |
|
|
|
• |
Capture linkage and captured pictures storage |
|
||
• |
Transmits card and user data from or to the client |
w r via |
||
|
TCP/IP protocol and saves the data on the client |
w r |
||
• |
Imports pictures from the USB |
drive to the device or |
||
|
export pictures, events, from the device to the USB |
drive |
||
• |
Stand-alone |
r ti n |
|
|
• |
Manage, search and set device data |
r logging in the device |
||
|
locally |
|
|
|
•Connects to one external card reader via RS-485 protocol
•Connects to secure door control unit via RS-485 protocol to avoid the door opening when the device is destroyed
•Audio prompt
• Watchdog design and tamper ncti n
Refer to the following contents for detailed n rm ti n of the face r c n ti n terminal:
1
|
Figure 2-1 Face |
c n |
n Terminal Diagram |
|||||
|
Table 2-1 |
c |
n of Face c |
n |
n Terminal |
|||
|
|
|
|
|
|
|
|
|
No. |
|
Name |
|
|
c |
|
n |
|
|
|
|
|
|
|
|||
1 |
|
Display Screen |
3.97-inch LCD touch |
|||||
|
screen. |
|
|
|||||
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
2 |
|
Supplement |
|
Supplement light camera. |
||||
|
Light |
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
3 |
|
Camera 1 |
|
Recording or capturing |
||||
|
|
videos or pictures. |
||||||
|
|
|
|
|
||||
|
|
|
|
|
|
|||
4 |
|
Camera 2 |
|
Recording or capturing |
||||
|
|
videos or pictures. |
||||||
|
|
|
|
|
||||
|
|
|
|
|
|
|
||
|
|
microUSB |
|
Connect to USB |
drive |
|||
5 |
|
|
via a microUSB to USB |
|||||
|
Interface |
|
||||||
|
|
|
cable. |
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
r |
n |
ti n |
if the |
6 |
|
Tamper |
|
|
device is disassembled, a |
|||
|
|
|
tamper alarm will be |
|||||
|
|
|
|
|
||||
|
|
|
|
|
triggered. |
|
|
|
|
|
|
|
|
|
|
|
|
7 |
|
Network |
|
Connect to Ethernet. |
||||
|
Interface |
|
||||||
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|||
|
|
|
|
|
Connect to other external |
|||
8 |
|
Wiring Terminals |
devices, including RS-485 |
|||||
|
|
|
|
|
card reader, door lock, etc. |
|||
|
|
|
|
|
|
|||
9 |
|
Debugging Port |
The debug terminal is |
|||||
|
used for debugging only. |
|||||||
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
3 n n
3.1 n n Environment
• Avoid backlight, direct sunlight, and indirect sunlight.
• For b |
r r c |
n ti n there should be light source in or near |
the n |
ti |
n environment. |
2
Note
For details about n ti n environment, see Tips for
nn Environment.
3.2 Base M n n
Place the device on the desk or other |
by using the m ntin |
bracket. |
|
Steps
1.Route the cables through the cable hole of the bracket, and connect the terminals with external devices' cables.
2.Align the device two holes with the two buckles on the bracket.
3.Hang the device on the bracket and make sure the buckle in the middle of the bracket is inserted in the groove on the device back.
Figure 3-1 Base M n n
4. Place the assembled device and bracket on the desk or other
Steps
1. According to the datum line on the m ntin template, tic the m ntin template on the wall or other surface, 1.45 meters higher than the ground.
Figure 3-2 M n n Template
2. Drill holes on the wall or other surface according to the m ntin template and install the gang box.
3
Figure 3-3 Install Gang Box
3. Use two supplied screws (SC-KM4x25-SUS or KA4×22-SUS) to secure the m ntin plate on the gang box.
|
Figure 3-4 Install M |
n n Plate |
4. |
Route the cables through the cable hole of the m ntin plate, |
|
|
and connect the terminals with the external devices' cables. |
|
5. |
Align the device with the m ntin |
plate and hang the device |
|
on the m ntin plate. |
|
4
Figure 3-5 Install Device
6. Use one supplied screw to secure the device and the m ntin plate.
Figure 3-6 Secure Device
Note
•The n ti n height here is the recommended height. You can change it according to your actual needs.
• For easy n ti n drill holes on m ntin surface according to the supplied m ntin template.
•If the device should connect with peripherals, it supports wiring with the RS-485 card reader, the door lock, the exit b n the access controller, and the power supply.
5
Note
If the cable size is 18 AWG, you should use a 12 V power supply. And the distance between the power supply and the device should be no more than 80 m.
•If the device has no peripherals to be wired, it supports wiring with the power supply by using the supplied adaptor.
4.1 Terminal |
c |
n |
The terminals contains power input, RS-485, and door lock. The terminal's diagram is as follows:
|
|
Figure 4-1 Terminal Diagram |
|
|||
The cr |
ti n |
of the terminals are as follows: |
|
|||
|
|
Table 4-1 Terminal c |
n |
|
||
|
|
|
|
|
|
|
Group |
No. |
|
nc |
Color |
Name |
c |
|
n |
n |
||||
|
|
|
|
|
||
|
|
|
|
|
|
12 VDC |
Group |
A1 |
|
Power |
Red |
+12 V |
Power |
|
|
|
|
Supply |
||
A |
|
|
Input |
|
|
|
|
|
|
|
|
||
|
A2 |
|
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
|
B1 |
|
|
Yellow |
485+ |
RS-485 |
Group |
|
|
|
|
|
|
B2 |
|
RS-485 |
Blue |
485- |
Wiring |
|
B |
|
|
||||
|
|
|
|
|
|
|
|
B3 |
|
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
|
|
|
|
|
|
Lock |
|
C1 |
|
|
Orange |
NC |
Wiring |
|
|
|
|
|
|
(NC) |
|
|
|
|
|
|
|
|
C2 |
|
|
Green |
COM |
Comm |
|
|
|
on |
|||
Group |
|
|
Door |
|
|
|
|
|
|
|
|
||
|
|
|
|
Lock |
||
C |
C3 |
|
Lock |
Grey |
NO |
|
|
|
|
Wiring |
|||
|
|
|
|
|
|
(NO) |
|
|
|
|
|
|
|
|
|
|
|
|
SENSO |
Door |
|
C4 |
|
|
White |
Contac |
|
|
|
|
R |
|||
|
|
|
|
|
t |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6
Group |
No. |
nc |
Color |
Name |
c |
|
n |
n |
|||||
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
(Sensor |
|
|
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Exit |
|
|
C5 |
|
Purple |
BTN |
Door |
|
|
|
|
|
|
Wiring |
|
|
|
|
|
|
|
|
|
C6 |
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
|
|
C7 |
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
You can connect the terminal with peripherals.
Figure 4-2 Device Wiring
Note
The power input should be 12 VDC, 1.5 A, 18 W.
Wire the device with power supply directly by using the supplied power cable if the device has no other peripherals to be wired.
The wiring diagram is shown below:
Figure 4-3 Wiring with Power Cable
5 |
c |
v |
n |
|
|
You should ctiv |
the device before the r login. |
|
r |
||
powering on the device, the system will switch to Device |
|
||||
ctiv |
ti |
n page. |
|
|
|
ctiv ti |
n via the device, SADP tool and the client |
w |
r are |
||
supported. |
|
|
|
The default values of the device are as follows:
7
•The default IP address: 192.0.0.64
•The default port No.: 8000
•The default user name: admin
5.1 |
c v |
via Device |
|
|
|
If the device is not ctiv |
you can ctiv |
the device |
r it is |
||
powered on. |
|
|
|
|
|
On the |
ctiv |
Device page, create a password and c n |
rm the |
||
password. Tap |
c v |
and the device will |
ctiv |
|
|
Figure 5-1 c v |
n Page |
|
|
|
|
|
C |
n |
|
|
The password strength of the device can be |
m tic y |
checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case |
r lower case |
||||||||
|
r numbers, and special characters) in order to increase the |
||||||||
security of your product. And we recommend you reset your |
|
||||||||
password regularly, especially in the high security system, |
|
||||||||
r |
n |
the password monthly or weekly can b |
r protect your |
||||||
product. |
|
|
|
|
|
|
|
|
|
Proper c |
n |
r ti |
n of all passwords and other security |
n |
|||||
is the responsibility of the installer and/or end-user. |
|
||||||||
• |
r |
ctiv ti n |
you should select an |
|
c ti |
n mode. For |
|||
|
details, see Set |
|
n Mode |
|
|
|
|
||
• |
r |
ctiv ti n |
if you need to add the device to the client |
|
|||||
|
w r |
or other tf |
rm you should edit the device IP |
|
|||||
|
address. For details, see |
mm n |
n |
n . |
|
5.2 c v |
via SADP |
|
|
||
SADP is a tool to detect, |
ctiv |
and modify the IP address of the |
|||
device over the LAN. |
|
|
|
||
Before You Start |
|
|
|
|
|
• Get the SADP |
w r |
from the supplied disk or the c |
|||
website |
|
www |
v |
n m n , and install the SADP |
|
|
|
|
|
|
|
according to the prompts.
•The device and the PC that runs the SADP tool should be within the same subnet.
The following steps show how to ctiv a device and modify its
IP address. For batch ctiv ti n and IP addresses m |
c ti n |
|
refer to User Manual of SADP for details. |
|
|
Steps |
|
|
1. Run the SADP |
w r and search the online devices. |
8
2.Find and select your device in online device list.
3.Input new password (admin password) and c n rm the password.
C n
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a
minimum of 8 characters, including upper case |
r lower |
|
case |
r numbers, and special characters) in order to |
increase the security of your product. And we recommend you
|
reset your password regularly, especially in the high security |
|
|
|
system, r |
n the password monthly or weekly can b |
r |
|
protect your product. |
|
|
4. Click c v |
to start ctiv ti n |
|
Status of the device becomes c v |
r successful ctiv ti n |
5.Modify IP address of the device.
1)Select the device.
2)Change the device IP address to the same subnet as your computer by either modifying the IP address manually or checking Enable DHCP.
3) Input the admin password and click Modify to ctiv your IP address m c ti n
5.3 |
c |
v |
Device via Client |
ftw |
For some devices, you are required to create the password to |
||||
ctiv |
them before they can be added to the |
w r and work |
||
properly. |
|
|
|
|
Steps |
|
|
|
|
|
Note |
|
|
|
This |
ncti |
n should be supported by the device. |
1.Enter the Device Management page.
2.Click on the right of Device Management and select Device.
3.Click Online Device to show the online device area. The searched online devices are displayed in the list.
4.Check the device status (shown on Security Level column) and
select an n ctiv device.
5. |
Click c v |
to open the ctiv ti |
n dialog. |
6. |
Create a password in the password |
and c n rm the |
|
|
password. |
|
|
9
C |
n |
|
The password strength of the device can be |
m tic y |
checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case |
r |
|
lower case |
r numbers, and special characters) in order to |
increase the security of your product. And we recommend you
reset your password regularly, especially in the high security |
|
|
system, r |
n the password monthly or weekly can b |
r |
protect your product. |
|
|
Proper c n |
r ti n of all passwords and other security |
|
nis the responsibility of the installer and/or end-user.
7. Click OK to ctiv the device.
6 Basic |
n |
6.1 C n |
n Flow of Device |
Follow the |
w diagram below to c n r on the device. |
Figure 6-1 Flow Diagram of C |
n |
|
n on Device |
• For details about device ctiv ti n |
see |
v |
n. |
•For details about c n r ti n of login by administrator, see
Login by Administrator.
• For details about c n r n |
c ti n mode, see Set |
nMode.
•For details about adding administrator, see Add Administrator.
• |
For details about c mm |
n c ti n |
n see |
mm n |
n |
||
|
n . |
|
|
|
|
|
|
• |
For details about |
n |
terminal and reader's |
ntic ti |
n |
||
|
mode, see Set Access Control Parameters. |
|
|
||||
• |
For details about adding users manually, see Add Face Picture, |
||||||
|
Add Password, Add Card, and Set |
n |
n Mode. |
|
|||
• |
For details about m |
rtin |
persons in batch, see Import Data. |
||||
• |
For details about |
ntic |
ti n see |
n |
n |
n. |
10
6.2 Set |
c |
n Mode |
|
|
r |
ctiv tin the device, you should select an |
c ti n mode |
||
for b |
r device |
c |
ti n |
|
Steps
1.On the Welcome page, select Indoor or Others from the dropdown list.
Figure 6-2 Welcome Page
2. Tap OK to save.
|
Note |
|
|
|
|
|
• |
You can also change the |
n |
in System |
n . |
||
• |
If you install the device indoors near the window or the face |
|||||
|
r c n ti n |
ncti |
n is not working well, select Others. |
|||
• |
If you do not c n |
r the |
|
c ti n mode and tap Next, |
||
|
the system will select Indoor by default. |
|
||||
• |
If you ctiv |
the device via other tools remotely, the |
||||
|
system will select Indoor as the |
c ti n mode by default. |
Login the device backend to set the device basic parameters. You should enter the device ctiv ti n password for the r login. Or if you have add an administrator's face picture, you can login via the added face picture.
r you add the administrator for the device, only the administrator can login the device for device r ti n
Steps
1. Long tap on the n ti page for 3 s to enter the admin login page.
|
Figure 6-3 Admin Login |
2. |
ntic the administrator's face, n r r n or card to |
|
enter the home page. |
11
Figure 6-4 Home Page
|
|
Note |
|
|
|
|
The device will be locked for 30 minutes |
r 5 failed |
|||
|
n |
r r n |
or card |
m |
|
3. |
|
n |
Tap and you can enter the device ctiv ti n |
||
|
password for login. |
|
|
4.n Tap and you can exit the admin login page.
You should login the system before other device r ti n
Steps
1. Long tap on the n ti page for 3 s to enter password entering page.
2. Tap the Password |
and enter the device ctiv ti n |
password. |
|
3. Tap OK to enter the home page.
|
Note |
|
|
|
• |
The device will be locked for 30 minutes |
r 5 failed |
||
|
password |
m |
|
|
• |
For details about |
n the administrator |
ntic ti n |
|
|
mode, see Adding User. |
|
Figure 6-5 Home Page
6.4 C mm n c n n
You can set the network parameters, the Wi-Fi parameter, and the RS-485 parameters on the c mm n c ti n n page.
You can set the device network parameters, including the IP address, the subnet mask, and the gateway.
12
Steps |
|
|
|
|
1. Tap Comm. ( |
mm n c ti n |
n ) on the Home page to |
||
enter the |
mm n c ti |
n |
n page. |
|
2. On the |
mm |
n c ti n |
n |
page, tap Network to enter |
the Network tab.
Figure 6-6 Network |
n |
3.Tap IP Address, Subnet Mask, or Gateway and input the parameters.
4. Tap OK to save the |
n |
|
|
|
|
|
Note |
|
The device's IP address and the computer IP address should be in the same IP segment.
5. Tap to save the network parameters.
You can enable the Wi-Fi |
ncti |
n and set the Wi-Fi related |
||
parameters. |
|
|
|
|
Steps |
|
|
|
|
1. Tap Comm. ( |
mm n c ti n |
n ) on the Home page to |
||
enter the |
mm n c ti |
n |
n page. |
|
2. On the |
mm |
n c ti n |
n |
page, tap Wi-Fi to enter the |
Wi-Fi tab. |
|
|
|
|
|
|
|
|
Figure 6-7 Wi-Fi |
n |
|
3. |
Enable the Wi-Fi |
ncti n |
|
|
||
4. |
Select a Wi-Fi in the list to enter the Wi-Fi parameters |
n |
||||
|
page. |
|
|
|
|
|
5. |
Select an IP mode. |
|
|
|||
|
- |
If |
ctin DHCP, you should input the Wi-Fi password. |
|
||
|
- |
If |
ctin |
c, you should input the Wi-Fi password, IP |
||
|
|
address, subnet mask and gateway. |
|
|
13
|
Note |
|
|
|
Numbers, upper case |
r lower case |
r and special |
|
characters are allowed in the Wi-Fi password. |
||
6. Tap OK to save the |
n and go back to the Wi-Fi tab. |
7. Tap to save the network parameters.
The face r c n ti n terminal can connect external access controller, secure door control unit or card reader via the RS-485 terminal.
Steps |
|
|
|
|
1. Tap Comm. ( |
mm n c ti n |
n ) on the Home page to |
||
enter the |
mm n c ti |
n |
n page. |
|
2. On the |
mm |
n c ti n |
n |
page, tap RS-485 to enter the |
RS-485 tab.
Figure 6-8 Set RS-485 Parameters
3.Select an peripheral type according to your actual needs.
Note
•Controller represents the access controller, Unit represents the secure door control unit and Reader represents the card reader.
•If you select Controller: If connect the device to a terminal via the RS-485 interface, set the RS-485 address as 2. If you connect the device to a controller, set the RS-485 address according to the door No.
4.Tap to save the network parameters.
Note |
|
If you change the external device, and |
r you save the |
device parameters, the device will reboot |
m tic y |
You can set the access control parameters, including terminal ntic ti n mode, reader ntic ti n mode, door contact,
and door locked tim
On the Home page, tap ACS (Access Control |
n ) to enter the |
||
Access Control |
n page. Edit the access control parameters |
||
on this page and tap to save the |
n |
|
14
Figure 6-9 Access Control Parameters |
|
|||||||
The available parameters |
cr |
ti n |
are as follows: |
|
||||
Table 6-1 Access Control Parameters |
c |
n |
||||||
|
|
|
|
|
|
|
|
|
Parameter |
|
c |
|
n |
|
|
|
|
|
|
|
|
|
|
|||
|
|
Select the face r |
c |
n ti n |
|
|||
|
|
terminal's |
ntic |
ti n mode. You |
||||
|
|
can also customize the |
|
|||||
|
|
|
ntic ti |
n mode. |
|
|||
|
|
|
Note |
|
|
|
|
|
|
|
• Only the device with the |
|
|||||
|
|
n |
r |
r n |
module supports the |
|||
|
|
n |
r |
r n |
related |
ncti |
n |
|
Terminal Auth. |
• Biometric r |
c |
n ti n products |
|||||
Mode (Terminal |
are not 100% applicable to nti |
|||||||
ntic ti |
n |
|
|
n environments. If you |
||||
Mode) |
|
require a higher security level, |
||||||
|
|
use m |
ti |
|
|
ntic ti |
n |
|
|
|
modes. |
|
|
|
|
||
|
|
• If you adopt m |
ti |
|
|
|||
|
|
|
ntic ti n modes, you |
|||||
|
|
should |
ntic |
other |
||||
|
|
methods before |
ntic tin |
|||||
|
|
face. |
|
|
|
|
|
|
|
|
• By default, the device use Face |
||||||
|
|
to |
|
ntic |
|
|
|
|
|
|
|
|
|||||
Reader Auth. |
|
Select the card reader's |
|
|||||
|
|
ntic ti |
n mode. |
|
||||
Mode (Card |
|
|
|
|||||
|
|
|
|
|
|
|
|
|
Reader |
|
|
Note |
|
|
|
|
|
ntic ti |
n |
By default, the device use Face to |
||||||
Mode) |
|
|||||||
|
|
ntic |
|
|
|
|
||
|
|
|
|
|
|
|
||
|
|
|
||||||
Door Contact |
|
You can select "Open (Remain |
||||||
|
Open)" or "Close (Remian Closed)" |
|||||||
|
|
|||||||
|
|
|
|
|
|
|
|
|
15
Parameter |
|
c |
n |
|
|
|
|
||||
|
according to your actual needs. By |
||||
|
default, it is Close (Remian Closed). |
||||
|
|
|
|||
|
Set the door unlocking |
r ti n If |
|||
Door Locked |
the door is not opened for the set |
||||
tim |
|
the door will be locked. |
|||
Time |
|
||||
Available door locked tim |
range: 1 |
||||
|
|||||
|
to 255s. |
|
|||
|
|
|
|
|
On the user management interface, you can add, edit, delete and search the user.
The administrator can login the device backend and c n r the device parameters.
Steps
1. Long tap on the n ti page and log in the backend.
2.Tap User → + to enter the Add User page.
3.Edit the employee ID.
Note
• The employee ID should be less than 32 characters. And it can be a c mb n ti n of lower r upper r and numbers.
• The employee ID should not be duplicated.
4. Tap the Name |
and input the user name on the |
|||
|
keyboard. |
|
|
|
|
|
|
|
|
|
Note |
|
|
|
|
• Numbers, upper case |
r lower case |
r and special |
|
|
characters are allowed in the user name. |
|
• Up to 32 characters are allowed in the user name.
5. |
|
n Add a face picture, |
n |
r |
r n |
cards, or password |
|
for the administrator. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note |
|
|
|
|
|
• |
For details about adding a face picture, see Add Face |
||||
|
|
Picture. |
|
|
|
|
|
• |
|
|
|
|
|
|
Note |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For details about adding a |
n |
r |
r n |
see . |
•For details about adding a card, see Add Card.
•For details about adding a password, see Add Password.
6. |
n Set the administrator's |
ntic ti n type. |
16