Hikvision DS-K1T605MF, DS-K1T605EF, DS-K1T605M, DS-K1T605E, DS-K1T605MF-B User Manual

Face Recognition Terminal
User Manual
Series
Models
Face Recognition Terminal
(Without Fingerprint Module)
DS-K1T605M
DS-K1T605E
Face Recognition Terminal
(With Battery)
DS-K1T605MF-B
Face Recognition Terminal (With Fingerprint Module)
DS-K1T605MF
DS-K1T605EF
User Manual
© 2018 Hangzhou Hikvision Digital Technology Co., Ltd. This manual is applied for face recognition terminal.
Note: In the model, F represents the product contains fingerprint module. M and E represents the
product supports swiping Mifare card and EM card respectively. B represents the product contains battery. It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision
Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other trademarks mentioned in this manual are the properties of their respective owners. No right of license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
i
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Support
Should you have any questions, please do not hesitate to contact your local dealer.
ii
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible
for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected. Consult the dealer or an experienced radio/TV technician for help.
This equipment should be installed and operated with a minimum distance 20cm between the
radiator and your body.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the RE Directive 2014/53/EU, the EMC Directive 2014/30/EU, the RoHS
Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed
of as unsorted municipal waste in the European Union. For proper recycling, return
this product to your local supplier upon the purchase of equivalent new equipment,
or dispose of it at designated collection points. For more information see:
www.recyclethis.info
iii
Model
Manufacturer
Standard
C2000IC12.0-24P-DE
MOSO Power Supply Technology Co., Ltd.
CEE
C2000IC12.0-24P-GB
MOSO Power Supply Technology Co., Ltd.
BS
Warnings Follow these safeguards to prevent serious injury or death.
Cautions Follow these precautions to prevent potential injury or material damage.
2006/66/EC (battery directive): This product contains a battery that cannot be
disposed of as unsorted municipal waste in the European Union. See the product
documentation for specific battery information. The battery is marked with this
symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or
mercury (Hg). For proper recycling, return the battery to your supplier or to a
designated collection point. For more information see: www.recyclethis.info
(1) 기기는 가정용으로 전자파적합등록을 기기로서 주거지역에서는 물론 모든 지역에서 사용할
수 있습니다
(2) 당해 무선설비는 전파혼신 가능성이 있으므로 인명안전과 관련된 서비스는 없음
Use only power supplies listed in the user instructions:
Safety Instruction
These instructions are intended to ensure that user can use the product correctly to avoid danger or property loss. The precaution measure is divided into Warnings and Cautions:
Warnings: Neglecting any of the warnings may cause serious injury or death. Cautions: Neglecting any of the cautions may cause injury or equipment damage.
Warnings
All the electronic operation should be strictly compliance with the electrical safety regulations,
fire prevention regulations and other related regulations in your local region.
Please use the power adapter, which is provided by normal company. The power consumption
cannot be less than the required value.
Do not connect several devices to one power adapter as adapter overload may cause over-heat
or fire hazard.
Please make sure that the power has been disconnected before you wire, install or dismantle
the device.
When the product is installed on wall or ceiling, the device shall be firmly fixed.
iv
If smoke, odors or noise rise from the device, turn off the power at once and unplug the power
cable, and then please contact the service center.
If the product does not work properly, please contact your dealer or the nearest service center.
Never attempt to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions
Do not drop the device or subject it to physical shock, and do not expose it to high
electromagnetism radiation. Avoid the equipment installation on vibrations surface or places subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specification of the device for the detailed
operating temperature), cold, dusty or damp locations, and do not expose it to high electromagnetic radiation.
The device cover for indoor use shall be kept from rain and moisture. Exposing the equipment to direct sun light, low ventilation or heat source such as heater or
radiator is forbidden (ignorance can cause fire danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur
otherwise (which is not a malfunction however), and affecting the endurance of sensor at the same time.
Please use the provided glove when open up the device cover, avoid direct contact with the
device cover, because the acidic sweat of the fingers may erode the surface coating of the device cover.
Please use a soft and dry cloth when clean inside and outside surfaces of the device cover, do
not use alkaline detergents.
Please keep all wrappers after unpack them for future use. In case of any failure occurred, you
need to return the device to the factory with the original wrapper. Transportation without the original wrapper may result in damage on the device and lead to additional costs.
Improper use or replacement of the battery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used batteries according to the instructions provided by the battery manufacturer.
v
Table of Contents
Chapter 1 Overview ................................................................................................................. 1
1.1 Introduction ......................................................................................................................... 1
1.2 Main Features ...................................................................................................................... 1
Chapter 2 Appearance ............................................................................................................. 3
Chapter 3 Installation .............................................................................................................. 5
3.1 Installing with Gang Box ....................................................................................................... 5
3.2 Installing without Gang Box ................................................................................................. 6
Chapter 4 Terminal Connection ................................................................................................ 8
Chapter 5 Basic Operation ..................................................................................................... 10
5.1 Activate Device ................................................................................................................... 10
5.1.1 Activating via Device ...................................................................................................... 10
5.1.2 Activating via SADP Software ......................................................................................... 11
5.1.3 Activating via Client Software ........................................................................................ 13
5.2 Login ................................................................................................................................... 15
5.3 General Parameters Settings .............................................................................................. 17
5.3.1 Communication Settings ................................................................................................ 17
5.3.2 System Settings .............................................................................................................. 21
5.3.3 Setting Time ................................................................................................................... 25
5.4 User Management .............................................................................................................. 26
5.4.1 Adding User .................................................................................................................... 26
5.4.2 Managing User ............................................................................................................... 30
5.5 Setting Access Control Parameters .................................................................................... 31
5.6 Other Managements .......................................................................................................... 33
5.6.1 Managing Data ............................................................................................................... 33
5.6.2 Managing Log Query ...................................................................................................... 34
5.6.3 Importing/Exporting Data .............................................................................................. 35
5.6.4 Testing ............................................................................................................................ 36
5.6.5 Viewing System Information .......................................................................................... 37
5.7 Authenticating Identity ...................................................................................................... 38
5.7.1 Authenticating via 1:1 Matching .................................................................................... 38
5.7.2 Authenticating via Other Types ...................................................................................... 39
Chapter 6 Client Operation .................................................................................................... 40
6.1 User Registration and Login ............................................................................................... 40
6.2 System Configuration ......................................................................................................... 41
vi
6.3 Access Control Management ............................................................................................. 41
6.3.1 Adding Access Control Device ........................................................................................ 42
6.3.2 Viewing Device Status .................................................................................................... 57
6.3.3 Editing Basic Information ............................................................................................... 58
6.3.4 Network Settings ............................................................................................................ 59
6.3.5 Capture Settings ............................................................................................................. 61
6.3.6 RS-485 Settings ............................................................................................................... 62
6.3.7 Wiegand Settings ........................................................................................................... 63
6.3.8 Remote Configuration .................................................................................................... 64
6.4 Organization Management ................................................................................................ 74
6.4.1 Adding Organization ....................................................................................................... 74
6.4.2 Modifying and Deleting Organization ............................................................................ 74
6.5 Person Management .......................................................................................................... 75
6.5.1 Adding Person ................................................................................................................ 75
6.5.2 Managing Person............................................................................................................ 85
6.5.3 Issuing Card in Batch ...................................................................................................... 85
6.6 Schedule and Template ...................................................................................................... 87
6.6.1 Week Schedule ............................................................................................................... 88
6.6.2 Holiday Group ................................................................................................................ 89
6.6.3 Template ......................................................................................................................... 90
6.7 Permission Configuration ................................................................................................... 92
6.7.1 Adding Permission .......................................................................................................... 93
6.7.2 Applying Permission ....................................................................................................... 94
6.8 Advanced Functions ........................................................................................................... 95
6.8.1 Access Control Parameters ............................................................................................. 95
6.8.2 Card Reader Authentication ........................................................................................... 98
6.8.3 Multiple Authentication ................................................................................................. 99
6.8.4 Open Door with First Card ........................................................................................... 102
6.8.5 Anti-Passing Back ......................................................................................................... 104
6.9 Searching Access Control Event ....................................................................................... 105
6.9.1 Searching Local Access Control Event .......................................................................... 106
6.9.2 Searching Remote Access Control Event ...................................................................... 106
6.10 Access Control Event Configuration ................................................................................. 106
6.10.1 Access Control Event Linkage ................................................................................... 107
6.10.2 Event Card Linkage ................................................................................................... 108
6.10.3 Cross-Device Linkage ................................................................................................ 110
vii
6.11 Door Status Management ................................................................................................ 111
6.11.1 Access Control Group Management ........................................................................ 111
6.11.2 Anti-control the Access Control Point (Door) ........................................................... 113
6.11.3 Status Duration Configuration ................................................................................. 114
6.11.4 Real-time Card Swiping Record ................................................................................ 116
6.11.5 Real-time Access Control Alarm ............................................................................... 116
6.12 Arming Control ................................................................................................................. 118
6.13 Time and Attendance ....................................................................................................... 118
6.13.1 Shift Schedule Management .................................................................................... 119
6.13.2 Attendance Handling ................................................................................................ 125
6.13.3 Advanced Settings .................................................................................................... 129
6.13.4 Attendance Statistics ................................................................................................ 133
Appendix A Tips for Scanning Fingerprint ............................................................................... 138
Appendix B Tips When Collecting/Comparing Face Picture ..................................................... 139
B.1 Positions (Recommended Distance:0.5m) ......................................................................... 139
B.2 Expression ........................................................................................................................ 139
B.3 Posture............................................................................................................................. 140
B.4 Size .................................................................................................................................. 140
Appendix C Relationship between Device Height, Person Height, and Standing Distance ......... 141
Appendix D Tips for Installation Environment ......................................................................... 142
Appendix E Dimension ........................................................................................................... 143
viii

Chapter 1 Overview

1.1 Introduction

DS-K1T605 series face recognition terminal is a kind of access control device for face recognition, which is mainly applied in security access control systems, such as logistic centers, airports, university campuses, alarm centrals, dwellings and so on.
The face recognition terminal supports 1:1 or 1:N matching mode. It also supports authenticating via Mifare cards, EM cards, etc. according to different models. Communications of TCP/IP, Wi-Fi, 3G/4G/GPRS (optional), RS-485 of Wiegand are also supported. You can also import or export the data by using the USB disk.

1.2 Main Features

High performance processor with deep learning algorithm Authenticates by swiping Mifare card or EM card according to different models Live face detection: Only live face can be detected and authenticated Max. 2000 face pictures and Max. 5000 fingerprints storage (Only models with F or FR support
fingerprint function)
Multiple authentication modes: face picture or fingerprint or card or password, fingerprint and
password, fingerprint and card, face picture and fingerprint, etc.
Note: Devices with models of DS-K1T605M/E and DS-K1T605M-B do support authenticating by
fingerprint.
1:1 and 1:N matching by comparing face pictures and fingerprints
Note: Devices with models of DS-K1T605M/E and DS-K1T605M-B do support authenticating by
fingerprint.
5-inch LCD touch screen to display operation interface, advertisements, etc. Voice prompt and prompt sound output Bi-spectrum cameras: one camera for receiving visible light and the other one for receiving
infrared light
Standard definition Face picture recognition and face picture capture function Saves captured pictures to the memory card with up to 32G storage Supports TCP/IP, Wi-Fi , 3G/4G network (optional) communication, RS-485 communication and
Wiegand communication
Switches between input and output when communicating by Wiegand protocol; Supports
output card No. via Wiegand communication
Connects one external card reader via RS-485 communication
1
Connects external access controller or Wiegand card reader via Wiegand communication Connects secure door control unit to avoid the door opening when the terminal is destroyed Supports import and export data via USB disk Stand-alone operation Supports anti-passback, multiple authentication, and open door with first card Remotely controls via the iVMS-4200 client software Power supply by lithium battery
Note: Only devices with models of DS-K1T605M-B support the function.
Hardware initialization
2
No.
Name
Description
1
Indicator
Solid Red: Standby.
Flashing Red: Authentication failed.
Solid Green: Authentication completed.
Flashing Green: Authenticating (combined)...
2
Fingerprint Module +
Card Swiping Area
Scan fingerprint or swipe card.
Note: Only the device with the fingerprint module contains
this part.
Card Swiping Area
Swipe card within this area.
Note: Only the device without the fingerprint module

Chapter 2 Appearance

Refer to the following contents for detailed information of the face recognition terminal:
Table 1-1 Description of Face Recognition Terminal
3
contains this part.
3
Sensor
Detect the illumination intensity. When the environment is
too dark, the device will enable the supplement light
automatically.
4
Display Screen
5-inch LCD touch screen with the resolution of 800*480.
5
Supplement Light
Support visible light and IR light. Maximum distance for
supplement light: 1m.
6
Camera
Support bi-spectrum.
7
Loudspeaker
The part that the sound comes from.
8
Doorbell Button
Hold the button for 3s to power on and the device indicator
will light up.
After setting the power button function, hold the doorbell
button for 3s to power off.
Note: For details about setting the power button function, see
5.3.2 System Settings.
9
USB Interface
Plug in the USB disk and you can import or export the data.
10
Wiring Terminals
Connect to other external devices.
11
Memory Card Slot
Insert the memory card for saving the captured pictured.
12
Reset
While the device is powering on, hold the reset button and
the device will restore to the factory settings.
13
Tamper
When the tamper button is pressed down and the
tamper-proof function is enabled. If the device is pulled down,
the alarm will be triggered.
You should input the device activation password to dismiss
the alarm.
14
Network Interface
Connect to Ethernet.
15
Power Interface
Connect to power supply.
16
Micro SIM Card Slot
(Optional)
Insert SIM card.
17
Battery Connecter
Connect to battery.
4

Chapter 3 Installation

Installation Environment:
Install the device indoors, at least 2 meters away from the light, and at least 3 meters away
from the window or the door.
Avoid backlight, direct and indirect sunlight. Make sure the environment illumination is more than 100Lux.
Note: For details about installation environment, see Appendix D Tips for Installation Environment.
Installation Types: Wall mounting and base mounting.

3.1 Installing with Gang Box

Before you start:
According to the datum on the mounting template, stick the mounting template on the wall or other surface, 1.1 meters higher than the ground.
Steps:
1. Drill holes on the wall or other surface according to the mounting template and install the gang
box (80mm×80mm).
2. Use two supplied screws to secure the mounting plate on the gang box.
3. Remove the two screws at the bottom of the device.
4. Align the terminal with the mounting plate and buckle them together.
5. Use a hex wrench to fasten the two screws at the bottom.
Notes:
The installation height here is the recommended height. You can change it according to your
actual needs.
You can also install the device on the wall or otoher places without the gang box. For details,
see 3.2 Installing without Gang Box.
5
For easy installation, drill holes on mounting surface according to the supplied mounting
template.

3.2 Installing without Gang Box

Before you start:
According to the basline on the mounting template, stick the mounting template on the wall or other surface, 1.1 meters higher than the ground.
Steps:
1. Drill holes on the wall or other surface according to the mounting template.
2. Insert the screw sockets of the setscrews in the drilled holes.
6
3. Align the two holes to the mounting plate with the drilled holes.
4. Fix and fasten the screws in the sockets on the wall or other surface.
5. Remove the two screws at the bottom of the device.
6. Align the terminal with the mounting plate and buckle them together.
7. Use a hex wrench to fasten the two screws at the bottom.
7

Chapter 4 Terminal Connection

You can connect the RS-485 terminal with the RS-485 card reader, connect the DOOR terminal with the door lock, connect the SEN/BUT/GND terminal with the exit button, connect the ALARM OUT/ALRM IN terminal with the alarm output/input devices, and connect the WIEGAND terminal with the Wiegand card reader or the access controller. You can also connect the DS_IN can with the power supply.
If connect the WIEGAND terminal with the access controller, the face recognition terminal can transmit the authentication information to the access controller and the access controller can judge whether to open the door or not.
The wiring diagram is as follows:
You can also connect the terminal with the seucure door control unit. The wiring diagram is as follows:
8
9

Chapter 5 Basic Operation

The suggested working flow is as follows:

5.1 Activate Device

Purpose:
You are required to activate the terminal first before using it. Activation via device, activation via SADP, and activation via client software are supported. The default values of the control terminal are as follows.
The default IP address: 192.0.0.64. The default port No.: 8000. The default user name: admin.

5.1.1 Activating via Device

If the device is not activated, you can activate the device after it is powering on.
10
Steps:
1. Tap the Password field and create a password.
2. Tap the Confirm field and input the password again.
3. Tap Activate and the device will be activated.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.

5.1.2 Activating via SADP Software

Purpose:
SADP software is used for detecting the online device, activating the device, and resetting the password.
Get the SADP software from the supplied disk or the official website, and install the SADP according to the prompts. Follow the steps to activate the device.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
11
3. Create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4. Click Activate to activate the device.
5. Check the activated device. You can change the device IP address to the same network
segment with your computer by either editing the IP address manually or checking the Enable DHCP checkbox.
12
6. Input the password and click Modify to save the IP address.

5.1.3 Activating via Client Software

Purpose:
The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software
according to the prompts. Follow the steps to activate the control panel.
Steps:
1. Run the client software and the control panel of the software pops up, as shown in the figure
below.
13
2. Click Device Management to enter the Device Management interface.
3. Check the device status from the device list, and select an inactive device.
4. Check the device status from the device list, and select an inactive device.
5. Click Activate to pop up the Activation interface.
6. In the pop-up window, create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
14
7. Click OK button to start activation.
8. Click the Modify Netinfor button to pop up the Network Parameter Modification interface.
9. Change the device IP address to the same network segment as your computer by modifying
the IP address manually.
10. Input the password and click OK to save the settings.
After activation, you will enter the initial page:

5.2 Login

Option 1
If it is the first time to login, follow the steps below to login.
Steps:
1. Tap the settings icon at the lower right corner of the initial page to enter the Input Password
page.
15
2. Tap the Password field and input the device activation password.
3. Tap OK to enter the initial page.
Option 2
If you have set the administrator on the User Management page, follow the steps below to login.
Steps:
1. Tap the settings icon at the lower right corner of the initial page to enter the Login page.
2. Select the login type.
3. Authenticate permissions to enter the home page.
Tap one of the four authentication modes on the upper side of the page and authenticate permissions.
16
Or tap Login via Activation Password and input the device activation password to enter the home page.
The home page is shown as below:
Notes:
The device will be locked for 30 minutes after 5 failed password attempts. The supported authentication modes are as follows:
Face picture or fingerprint, or card or password, fingerprint and password, fingerprint and card, face picture and password, face picture and card, card and password, fingerprint, face picture, employee ID and password, card, fingerprint or card, fingerprint or password, card or password, employee ID and fingerprint, fingerprint and card and password, employee ID and fingerprint and password, face picture and fingerprint and card, face picture and password and fingerprint, employee ID and face picture.
The device with the model of DS-K1T605E/M/S or DS-K1T605M-B does not support the
fingerprint authentication mode.
For details about setting the administrator authentication mode, see 5.4.1 Adding User.

5.3 General Parameters Settings

5.3.1 Communication Settings

Purpose:
You can set the network parameters, the Wi-Fi parameter, the RS-485 parameters, and the Wiegand parameters on the communication settings page.
Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page.
17
Setting Network Parameters
Purpose:
You can set the device network parameters, including the IP address, the subnet mask, and the gateway.
Steps:
1. On the Communication Settings page, tap Network to enter the Network tab.
2. Tap IP Address, Subnet Mask, or Gateway and input the parameters.
3. Tap OK to save the settings.
Note: The device’s IP address and the computer IP address should be in the same LAN.
4. Tap to save the network parameters and go back to the Home page.
Setting Wi-Fi Parameters
Purpose:
18
You can enable the Wi-Fi function and set the Wi-Fi related parameters.
Steps:
1. On the Communication Settings page, tap Wi-Fi to enter the Wi-Fi tab.
2. Tap to enable the Wi-Fi function.
The icon will turns to and all searched Wi-Fi will be listed in the Wi-Fi list.
3. Select a Wi-Fi in the list to enter the Wi-Fi parameters settings page.
4. Select an IP mode.
If selecting Statistic, you should input the Wi-Fi password, IP address, subnet mask and gateway.
If selecting Dynamic, you should input the Wi-Fi password.
Note: Numbers, upper case letters, lower case letters, and special characters are allowed in the
Wi-Fi password.
5. Tap OK to save the settings and go back to the Wi-Fi tab.
6. Tap to save the Wi-Fi parameters and go back to the Home page.
19
Setting RS-485 Parameters
Purpose:
The face recognition terminal can connect external secure door control unit or card reader via the RS-485 terminal.
Steps:
1. On the Communication Settings page, tap RS-485 to enter the RS-485 tab.
2. Select an external device according to your actual needs.
Note: Unit represents the secure door control unit and Reader represents the card reader.
3. Tap Baud Rate to enter the Baud Rate page.
4. Select a baud rate for connecting external device via RS-485 protocol.
5. Tap to save the selected baud rate and go back to the RS-485 tab.
6. Tap to save the RS-485 parameters and go back to the Home page.
Note: If you change the external device, and after you save the device parameters, the device
will reboot automatically.
Setting Wiegand Parameters
Purpose:
You can set the Wiegand transmission direction and the Wiegand mode.
Steps:
1. On the Communication Settings page, tap Wiegand to enter the Wiegand tab.
20
2. Select the transmission direction and its mode.
Transmission Direction:
Output: A face recognition terminal can connect an external access controller. And the two
devices will transmit the card No. via Wiegand 26 or Wiegand 34 mode.
Input: A face recognition terminal can connect a Wiegand card reader. And there is no need
to set the Wiegand mode.
Mode:
You can select either Wiegand 26 or Wiegand 34. By default, the system selects Wiegand 34.
3. Tap to save the Wiegand parameters and go back to the Home page.
Note: If you change the Wiegand mode and save the parameters, the device will reboot
automatically.

5.3.2 System Settings

Purpose:
On the System Settings page, you can set the system basic parameters, set the face picture parameters, and upgrade the firmware.
On the Home page, tap System (System Settings) to enter the System Settings page.
Setting Basic Parameters
Purpose:
You can set the device ID, time format, keyboard sound, voice prompt, voice volume, application mode, power button, auto enable supplement light, brightness, and Threshold for Auto Enabling Supplement Light.
21
Loading...
+ 123 hidden pages