DS-K1T671 Series Face c n n
Terminal
User Manual
UD15654B
Legal n m n
User Manual
©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
About this Manual
This Manual is subject to m tic and n rn ti n copyright r cti n Hangzhou Hikvision Digital Technology Co., Ltd.
("Hikvision") reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, rti y or wholly, by any means, without the prior wr n
permission of Hikvision.
Please use this user manual under the guidance of professionals.
Trademarks
|
|
|
and other Hikvision marks are the |
property of Hikvision and are registered trademarks or the |
|||
subject of |
c ti n |
for the same by Hikvision and/or its |
|
|
Other trademarks m nti n in this manual are the |
||
r |
rti |
of their r |
ctiv owners. No right of license is given |
to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Data |
c n |
During the use of device, personal data will be collected, stored and processed. To protect data, the development of Hikvision
i
devices incorporates privacy by design principles. For example,
for device with facial r c |
n ti n features, biometrics data is |
|
stored in your device with |
ncry |
ti n method; for n r r n |
device, only n r r n template will be saved, which is |
||
impossible to reconstruct a n |
r r n image. |
As data controller, you are advised to collect, store, process and
transfer data in accordance with the applicable data |
r |
cti n |
||
laws and r |
ti n including without |
m ti n c |
n |
ctin |
security controls to safeguard personal data, such as, |
|
|
||
m m ntin |
reasonable m n r tiv |
and physical security |
||
controls, conduct periodic reviews and assessments of the |
||||
ctiv n |
of your security controls. |
|
|
|
ii
Symbol C nv n |
|
n |
|
|
|
|
|
|||
The symbols that may be found in this document are |
n as |
|||||||||
follows. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Symbol |
|
c |
n |
|
|
|
|
|
|
|
|
|
|
|
|
||||||
Danger |
Indicates a hazardous |
ti |
n which, if not avoided, |
|||||||
will or could result in death or serious injury. |
||||||||||
|
|
|||||||||
|
|
|
|
|
|
|
||||
|
|
Indicates a |
nti |
y hazardous |
ti |
n which, if |
||||
C |
n |
not avoided, could result in equipment damage, data |
||||||||
loss, performance |
r |
ti |
n or unexpected |
|||||||
|
|
results. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
Note |
|
Provides |
|
ti n |
n |
rm ti |
n to emphasize or |
|||
|
supplement important points of the main text. |
|||||||||
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
iii
Regulatory n m |
n |
|
FCC n m |
n |
|
Please take |
nti n that changes or m c ti n not expressly |
approved by the party responsible for compliance could void the user’s authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable |
r |
cti |
n against harmful interference in a |
|
r |
nti |
n |
ti |
n This equipment generates, uses and can |
radiate radio frequency energy and, if not installed and used in
accordance with the n |
r cti n |
may cause harmful interference |
|
to radio c mm n c ti n |
However, there is no guarantee that |
||
interference will not occur in a |
rtic r n |
ti n If this |
equipment does cause harmful interference to radio or television r c ti n which can be determined by turning the equipment and on, the user is encouraged to try to correct the interference by one or more of the following measures:
—Reorient or relocate the receiving antenna. |
|
|
—Increase the |
r ti n between the equipment and receiver. |
|
—Connect the equipment into an outlet on a circuit |
r n |
|
from that to which the receiver is connected. |
|
—Consult the dealer or an experienced radio/TV technician for help
This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.
FCC n ti n |
|
This device complies with part 15 of the FCC Rules. |
r ti n is |
subject to the following two c n ti n |
|
1.This device may not cause harmful interference.
2.This device must accept any interference received, including
interference that may cause undesired |
r ti n |
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under
iv
the EMC r ctiv 2014/30/EU, RE r ctiv 2014/53/EU,the RoHS r ctiv 2011/65/EU
2012/19/EU (WEEE r ctiv ) Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at
designated c |
cti |
n points. For more |
|||
n rm ti |
n see: www.recyclethis.info |
||||
2006/66/EC (b |
ry r |
ctiv ) This product |
|||
contains a b |
ry that cannot be disposed of as |
||||
unsorted municipal waste in the European |
|||||
Union. See the product |
c m n |
ti n for |
|||
c c b |
ry n |
rm ti n The b |
ry is |
marked with this symbol, which may include
r n to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the
bry to your supplier or to a designated
c cti n point. For more n rm ti n see:www.recyclethis.info
v
Safety n c n
These n r cti n are intended to ensure that user can use the product correctly to avoid danger or property loss.
The r c |
ti |
n measure is divided into Dangers and |
ti |
n |
|
|||||||||
Dangers: N |
ctin |
any of the warnings may cause serious injury |
||||||||||||
or death. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
C |
n |
N |
ctin |
any of the c |
|
ti |
n may cause injury or |
|
||||||
equipment damage. |
|
|
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dangers: Follow these safeguards |
C |
|
n |
Follow these |
r c |
ti |
n |
|||||||
to prevent |
nti injury or |
|
||||||||||||
to prevent serious injury or death. |
|
|||||||||||||
material damage. |
|
|
|
|||||||||||
|
|
|
|
|
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Danger: |
|
|
|
|
|
|
|
|
|
|
|
|
|
• |
All the electronic |
r |
ti |
n should be strictly compliance with |
||||||||||
|
the electrical safety r |
|
ti n |
|
r |
r |
v nti |
n r |
ti |
n |
and |
|||
|
other related r |
ti |
n |
in your local region. |
|
|
|
•Please use the power adapter, which is provided by normal company. This equipment is intended to be supplied from the Class 2 surge protected power source rated DC 12V, 3A.
•Do not connect several devices to one power adapter as
adapter overload may cause over-heat or r hazard.
•Please make sure that the power has been disconnected before you wire, install or dismantle the device.
•When the product is installed on wall or ceiling, the device
shall be rm y |
x |
|
|
|
|
|
|
|
• If smoke, odors or noise rise from the device, turn |
the |
|
||||||
power at once and unplug the power cable, and then please |
||||||||
contact the service center. |
|
|
|
|
|
|||
• Do not ingest b |
ry Chemical Burn Hazard. |
|
|
|
||||
This product contains a c |
|
n b |
n cell b |
ry If the c |
n |
|||
b |
n cell b |
ry is swallowed, it can cause severe internal |
||||||
burns in just 2 hours and can lead to death. |
|
|
|
|||||
Keep new and used b |
r |
away from children. If the b |
ry |
|||||
compartment does not close securely, stop using the product |
||||||||
and keep it away from children. If you think b |
r |
might |
||||||
have been swallowed or placed inside any part of the body, |
||||||||
seek immediate medical |
|
nti |
n |
|
|
|
• If the product does not work properly, please contact your dealer or the nearest service center. Never m to disassemble the device yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
C n
• Do not drop the device or subject it to physical shock, and do not expose it to high c r m n ti m r ti n Avoid the
vi
equipment n |
ti n on v br ti n |
surface or places subject |
||
to shock (ignorance can cause equipment damage). |
||||
• Do not place the device in extremely hot (refer to the |
||||
c c ti n of the device for the detailed |
r tin |
|||
temperature), cold, dusty or damp |
c ti |
n |
and do not |
|
expose it to high |
c r m n tic r |
ti |
n |
|
•The device cover for indoor use shall be kept from rain and moisture.
• Exposing the equipment to direct sun light, low v nti ti n or heat source such as heater or radiator is forbidden (ignorance can cause r danger).
• Do not aim the device at the sun or extra bright places. A blooming or smear may occur otherwise (which is not a
m ncti n however), and ctin the endurance of sensor at the same tim
•Please use the provided glove when open up the device cover, avoid direct contact with the device cover, because the acidic
sweat of the n r may erode the surface c tin of the device cover.
•Please use a ft and dry cloth when clean inside and outside surfaces of the device cover, do not use alkaline detergents.
• |
Please keep all wrappers ft r unpack them for future use. In |
||
|
case of any failure occurred, you need to return the device to |
||
|
the factory with the original wrapper. |
r n r ti n without |
|
|
the original wrapper may result in damage on the device and |
||
|
lead to |
ti n costs. |
|
• |
Improper use or replacement of the b |
ry may result in |
hazard of explosion. Replace with the same or equivalent type
only. Dispose of used b |
r |
according to the n r cti n |
|||
provided by the b |
ry manufacturer. |
||||
• Biometric r c |
n ti |
n products are not 100% applicable to |
|||
nti |
n |
environments. If you require a higher security |
|||
level, use m |
ti |
|
ntic ti |
n modes. |
•Working temperature: -30 °C to +60 °C
•Indoor and outdoor use. If installing the device indoors, the device should be at least 2 meters away from the light, and at least 3 meters away from the window or the door. If installing the device outdoors, you should apply Sililcone sealant among the cable wiring area to keep the raindrop from entering.
•r cti n level: IP65
•Input voltage should meet both the SELV (Safety Extra Low Voltage) and the Limited Power Source with 100~240 VAC or 12 VDC according to the IEC60950-1 standard. Please refer to
technical |
c c ti n for detailed n rm ti n |
vii
Product Name |
|
Model |
|
|
|
|
|
|
|
DS-K1T671M |
|
|
|
|
|
|
|
DS-K1T671MF |
|
|
|
|
|
Face c n ti |
n Terminal |
DS-K1T671TM |
|
|
|||
DS-K1T671TMW |
|||
|
|
||
|
|
|
|
|
|
DS-K1T671TMF |
|
|
|
|
|
|
|
DS-K1T671TMFW |
|
|
|
|
Use only power supplies listed in the user n |
r cti n |
||
|
|
|
|
Model |
Manufacturer |
Standard |
|
|
|
|
|
C2000IC12.0-24P-DE |
MOSO Power Supply |
CEE |
|
Technology Co., Ltd. |
|||
|
|
||
|
|
|
|
C2000IC12.0-24P-GB |
MOSO Power Supply |
BS |
|
Technology Co., Ltd. |
|||
|
|
||
|
|
|
|
KPL-040F-VI |
Channel Well |
CEE |
|
Technology Co Ltd. |
|||
|
|
||
|
|
|
viii
|
|
|
Contents |
|
|
1 Overview .................................................................. |
|
|
1 |
||
1.1 Overview ............................................................... |
|
1 |
|||
1.2 |
Features |
................................................................ |
|
1 |
|
2 Appearance .............................................................. |
|
|
2 |
||
3 n |
|
n ............................................................... |
|
|
4 |
3.1 |
n |
ti |
n Environment ....................................... |
4 |
|
3.2 |
Install with Gang Box ............................................ |
4 |
|||
3.3 |
Install without Gang Box ....................................... |
8 |
|||
4 Wiring |
..................................................................... |
|
|
12 |
|
4.1 |
Terminal |
cr ti |
n ........................................... |
13 |
|
4.2 Wire Device ......................................................... |
|
15 |
|||
4.3 Wire Secure Door Control Unit ........................... |
15 |
||||
5 c v |
n ............................................................... |
|
|
16 |
|
5.1 |
ctiv |
via Device .............................................. |
|
16 |
|
5.2 |
ctiv |
via SADP ................................................ |
|
17 |
|
5.3 |
ctiv |
Device via Client ftw r .................... |
18 |
||
6 Basic |
|
n ...................................................... |
|
18 |
|
6.1 Set |
c ti n Mode ......................................... |
18 |
|||
6.2 |
Login ................................................................... |
|
|
19 |
|
|
6.2.1 Login .......................................................... |
|
19 |
||
|
6.2.2 Login by Administrator .............................. |
19 |
|||
6.3 |
|
mm n c ti n |
n ..................................... |
20 |
|
|
6.3.1 Set Network Parameters ............................ |
20 |
|||
|
6.3.2 Set Wi-Fi Parameters ................................. |
21 |
|||
|
6.3.3 Set RS-485 Parameters .............................. |
22 |
|||
|
6.3.4 Set Wiegand Parameters ........................... |
22 |
|||
6.4 User Management .............................................. |
|
23 |
|||
|
6.4.1 Add Administrator ..................................... |
23 |
ix
6.4.2 Add Face Picture ........................................ |
|
|
24 |
|
6.4.3 Add Fingerprint |
.......................................... |
|
|
25 |
6.4.4 Add Card .................................................... |
|
|
|
26 |
6.4.5 Add Password ............................................ |
|
|
|
27 |
6.4.6 Set |
ntic ti n Mode .......................... |
28 |
||
6.4.7 Search and Edit User .................................. |
|
28 |
||
6.5 Import and Export Data ...................................... |
|
|
29 |
|
6.5.1 Export Data |
|
|
|
29 |
6.5.2 Import Data |
|
|
|
29 |
6.6 nti y |
n ....................................... |
|
|
30 |
6.6.1 |
via 1:1 Matching .................. |
30 |
||
6.6.2 |
via 1:N Matching .................. |
31 |
||
6.6.3 |
via 1:1 Matching and 1:N |
|
||
Matching |
|
|
|
31 |
6.7 System ................................................... |
|
|
|
31 |
6.7.1 Set Basic .................................Parameters |
|
31 |
||
6.7.2 Set Face ......................Picture Parameters |
32 |
|||
6.7.3 Set Fingerprint ........................Parameters |
34 |
|||
6.7.4 Set Time ..................................................... |
|
|
|
35 |
6.8 Time and ................. |
Status |
n |
35 |
|
6.8.1 Disable ........ |
nc |
Mode via Device |
35 |
|
6.8.2 Set Manual ............ |
n |
nc |
via Device |
35 |
6.8.3 Set Auto ................ |
nc |
via Device |
36 |
|
6.8.4 Set Manual and Auto |
n nc via Device |
|||
............................................................................. |
|
|
|
37 |
6.9 Set Access ...........................Control Parameters |
38 |
|||
6.10 Maintenance ..................................................... |
|
|
|
39 |
6.10.1 Upgrade ...................................Firmware |
|
|
39 |
|
6.10.2 Data ...................................Management |
|
|
39 |
|
6.10.3 Log ................................................Query |
|
|
|
40 |
x
6.11 View System n |
rm ti |
n .................................. |
|
|
|
41 |
||||
6.12 Two-Way Audio ................................................. |
|
|
|
|
|
42 |
||||
6.12.1 Call Client |
ftw r from Device ............. |
42 |
||||||||
6.12.2 Call Master |
ti |
n from Device .............. |
42 |
|||||||
6.12.3 Call Device from Client |
ftw r ............. |
43 |
||||||||
6.12.4 Call Indoor |
ti |
n from Device ............... |
43 |
|||||||
7 Client |
ftw |
C n |
|
n ................................. |
|
|
|
44 |
||
7.1 |
n |
r ti |
n Flow of Client |
|
ftw |
r ................ |
44 |
|||
7.2 Device Management ........................................... |
|
|
|
|
44 |
|||||
7.2.1 Add Device ................................................. |
|
|
|
|
|
44 |
||||
7.2.2 Reset Device Password |
.............................. |
|
|
51 |
||||||
7.3 Group Management ........................................... |
|
|
|
|
52 |
|||||
7.3.1 Add Group ................................................. |
|
|
|
|
|
52 |
||||
7.3.2 Import Resources to Group ....................... |
|
52 |
||||||||
7.3.3 Edit Resource Parameters .......................... |
|
53 |
||||||||
7.3.4 Remove Resources from Group ................. |
54 |
|||||||||
7.4 Person Management ........................................... |
|
|
|
|
54 |
|||||
7.4.1 Add |
r |
n |
ti n ....................................... |
|
|
|
|
54 |
||
7.4.2 |
n |
r |
Basic n |
rm ti n ...................... |
|
55 |
||||
7.4.3 Issue a Card to One Person ........................ |
|
55 |
||||||||
7.4.4 Upload a Face Photo from Local PC ........... |
56 |
|||||||||
7.4.5 Take a Photo via Client |
............................... |
|
|
57 |
||||||
7.4.6 Collect Face via Access Control Device ...... |
58 |
|||||||||
7.4.7 Collect Fingerprint via Client ..................... |
|
58 |
||||||||
7.4.8 Collect Fingerprint via Access Control Device |
||||||||||
............................................................................. |
|
|
|
|
|
|
|
|
|
59 |
7.4.9 |
n |
r |
Access Control n |
rm ti n ....... |
59 |
|||||
7.4.10 Customize Person n |
rm ti |
n ................ |
61 |
|||||||
7.4.11 |
n |
|
r Resident n |
|
rm ti n .............. |
61 |
||||
7.4.12 |
n |
|
r |
ti |
n |
n |
rm |
ti n ............ |
62 |
xi
7.4.13 Import and Export Person |
nti y |
|
|
|||||||||
n |
rm ti |
n ......................................................... |
|
|
|
|
|
|
|
|
62 |
|
7.4.14 Import Person n |
rm ti |
n ...................... |
|
|
62 |
|||||||
7.4.15 Import Person Pictures ............................ |
|
|
|
63 |
||||||||
7.4.16 Export Person n |
rm ti |
n ...................... |
|
|
63 |
|||||||
7.4.17 Export Person Pictures ............................. |
|
|
|
64 |
||||||||
7.4.18 Get Person n |
rm ti n from Access Control |
|||||||||||
Device |
................................................................. |
|
|
|
|
|
|
|
|
|
64 |
|
7.4.19 Move Persons to Another |
r n |
ti n |
65 |
|||||||||
............................................................................. |
|
|
|
|
|
|
|
|
|
|
|
|
7.4.20 ...............Issue Cards to Persons in Batch |
|
65 |
||||||||||
7.4.21 ......................................Report Card Loss |
|
|
|
|
|
65 |
||||||
7.4.22 ....................Set Card Issuing Parameters |
|
|
66 |
|||||||||
7.5 |
n ...................... |
r |
Schedule and Template |
|
|
67 |
||||||
7.5.1 Add ...............................................Holiday |
|
|
|
|
|
|
|
67 |
||||
7.5.2 Add .............................................Template |
|
|
|
|
|
|
|
68 |
||||
7.6 Set Access Group to Assign Access |
r |
ti |
n to |
|||||||||
Persons ..................................................................... |
|
|
|
|
|
|
|
|
|
|
69 |
|
7.7 |
n ........................... |
r |
Advanced |
ncti |
n |
|
|
|
70 |
|||
7.7.1 .................... |
n |
r |
Device Parameters |
|
|
70 |
||||||
7.7.2 ........... |
n |
r |
Remaining Open/Closed |
|
75 |
|||||||
7.7.3 ...... |
n |
r |
M |
ti |
|
c |
r |
|
ntic ti |
n |
77 |
|
7.7.4 ............... |
n |
r |
Custom Wiegand Rule |
|
79 |
|||||||
7.7.5 |
n |
r |
Card Reader |
|
ntic ti |
n Mode |
||||||
and Schedule ...................................................... |
|
|
|
|
|
|
|
|
80 |
|||
7.7.6 ............................ |
n |
r |
First Person In |
|
|
|
81 |
|||||
7.7.7 ............................ |
n |
r |
nti |
|
b |
c |
|
|
|
82 |
||
7.7.8 .................... |
n |
r |
Device Parameters |
|
|
83 |
||||||
7.8 |
n ..... |
r |
Linkage |
cti |
n for Access Control |
88 |
||||||
7.8.1 |
n |
r |
Client |
|
cti |
n for Access Event |
88 |
|||||
............................................................................. |
|
|
|
|
|
|
|
|
|
|
|
|
7.8.2 |
n |
r |
Device |
cti |
n |
for Access Event |
||||||
............................................................................. |
|
|
|
|
|
|
|
|
|
|
|
89 |
xii
7.8.3 |
n |
r |
Device |
cti |
n |
for Card Swiping |
|||
............................................................................. |
|
|
|
|
|
|
|
|
90 |
7.8.4 |
n |
r |
Device |
cti |
n |
for Person ID |
..... 91 |
||
7.9 Door Control ....................................................... |
|
|
|
|
|
|
92 |
||
7.9.1 Control Door Status ................................... |
|
|
93 |
||||||
7.9.2 Check Real-Time Access Records ............... |
93 |
||||||||
7.10 Event Center |
..................................................... |
|
|
|
|
|
94 |
||
7.10.1 Enable Receiving Event N ti c ti n from |
|||||||||
Devices |
............................................................... |
|
|
|
|
|
|
|
94 |
7.10.2 View Real-Time Events ............................. |
|
94 |
|||||||
7.10.3 Search Historical Events |
........................... |
96 |
|||||||
7.11 Time and |
|
n |
nc ........................................ |
|
|
|
98 |
||
7.11.1 |
n |
|
r |
|
n |
nc |
Parameters ........... |
99 |
|
7.11.2 Add Timetable ....................................... |
|
|
|
103 |
|||||
7.11.3 Add |
|
ft ................................................ |
|
|
|
|
|
105 |
|
7.11.4 Manage |
ft Schedule .......................... |
|
106 |
||||||
7.11.5 Manually Correct Check-in/out Record . 109 |
|||||||||
7.11.6 Add Leave and Business Trip .................. |
110 |
||||||||
7.11.7 Calculate |
|
n |
nc |
Data .................... |
111 |
||||
7.11.8 |
|
n |
nc |
ti tic |
............................. |
|
112 |
||
7.12 Remote |
n |
|
r ti |
n (Web) .......................... |
|
114 |
|||
7.12.1 Check Device n |
rm ti |
n ...................... |
114 |
||||||
7.12.2 Edit Device Name |
.................................. |
|
|
114 |
|||||
7.12.3 Edit Time ................................................ |
|
|
|
|
|
115 |
|||
7.12.4 Set System Maintenance ....................... |
115 |
||||||||
7.12.5 |
n |
|
r |
RS-485 Parameters ................ |
116 |
||||
7.12.6 Manage User |
......................................... |
|
|
|
116 |
||||
7.12.7 Set Security ............................................ |
|
|
|
|
116 |
||||
7.12.8 |
n |
|
r |
Network .............Parameters |
117 |
||||
7.12.9 |
n |
|
r |
Advanced ................Network |
117 |
xiii
7.12.10 |
n |
r |
Wi-Fi .................................... |
117 |
7.12.11 |
n |
r |
SIP Parameters .................... |
118 |
7.12.12 |
n |
r |
Face Picture Parameters ...... |
118 |
7.12.13n r Supplement Light Parameters
........................................................................... |
|
|
|
119 |
7.12.14 Set Room No. ....................................... |
|
120 |
||
7.12.15 |
n |
r Video and Audio Parameters |
|
|
........................................................................... |
|
|
|
120 |
7.12.16 |
n |
r Volume Input or Output ...... |
120 |
|
7.12.17 View Relay Status ................................. |
|
120 |
||
A. Tips for Scanning Fingerprint ............................... |
|
121 |
||
B. Tips When C |
|
c n C m |
n Face Picture ..... |
122 |
C. Tips for n |
|
n Environment ......................... |
123 |
D.n between Wake-up Distance and
Environment ............................................................ |
124 |
E. Dimension ........................................................... |
125 |
xiv
Face r c n ti n terminal is a kind of access control device for face r c n ti n which is mainly applied in security access control systems, such as tic centers, airports, university campuses, alarm centrals, dwellings, etc.
Features of Normal Series
•7-inch LCD touch screen
•2 MP wide-angle dual-lens
•Adjusts supplement light brightness manually
•Face r c n ti n distance: 0.3 m to 3 m
• |
Suggested height for face r c |
n ti n between 1.4 m and 1.9 |
||||
|
m |
|
|
|
|
|
• |
Deep learning algorithm |
|
|
|
||
• |
5,000 face capacity, 5,000 n |
r r n capacity, and 50,000 |
||||
|
event capacity |
|
|
|
|
|
|
|
|
|
|
|
|
|
Note |
|
|
|
|
|
|
Parts of the models support n |
r r n module, refer to the |
||||
|
actual products. |
|
|
|
|
|
• |
M ti |
ntic ti |
n modes |
|
|
|
• |
Face r c n ti |
n r |
ti n 0.2 s/User; face r c |
n ti |
n |
|
|
accuracy rate ≥ 99% |
|
|
|
|
|
• |
Transmits card and user data from or to the client |
ftw r via |
||||
|
TCP/IP protocol and saves the data on the client |
ftw r |
||||
• |
Imports pictures from the USB |
drive to the device or |
||||
|
export pictures, events, from the device to the USB |
drive |
||||
• |
Device management, log search, and parameter |
n |
via |
|||
|
the device |
|
|
|
|
|
• |
Stand-alone |
r ti |
n |
|
|
|
•Capture linkage and captured pictures saving
•Connects to one external card reader or access controller via RS-485 protocol
•Connects to external access controller or Wiegand card reader via Wiegand protocol
•Connects to secure door control unit via RS-485 protocol to avoid the door opening when the terminal is destroyed
•Remote live view via RTSP protocol; encoding mode: H.264
• |
NTP, manually tim ync r n |
ti n and auto ync r n ti n |
• |
Voice prompt |
|
• |
Watchdog design and tamper |
ncti n |
Features of Advanced Series
1
•7-inch LCD touch screen
•2 MP wide-angle dual-lens
•Adjusts supplement light brightness manually
•Face r c n ti n distance: 0.3 m to 3 m
• |
Suggested height for face r c |
n ti |
n between 1.4 m and 1.9 |
||||||
|
m |
|
|
|
|
|
|
|
|
• |
Deep learning algorithm |
|
|
|
|
|
|
||
• |
20,000 face capacity, 5,000 |
n |
r |
r n |
capacity, and 100,000 |
||||
|
event capacity |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note |
|
|
|
|
|
|
|
|
|
Parts of the models support |
n |
r |
r n |
module, refer to the |
||||
|
actual products. |
|
|
|
|
|
|
|
|
• |
M ti |
ntic ti |
n modes |
|
|
|
|
|
|
• |
Face r c n ti |
n r |
ti n 0.2 s/User; face r c |
n ti |
n |
||||
|
accuracy rate ≥ 99% |
|
|
|
|
|
|
|
|
• |
Transmits card and user data from or to the client |
ftw r via |
|||||||
|
TCP/IP protocol and saves the data on the client |
ftw r |
|||||||
• |
Imports pictures from the USB |
|
drive to the device or |
||||||
|
export pictures, events, from the device to the USB |
drive |
|||||||
• |
Device management, log search, and parameter |
n |
via |
||||||
|
the device |
|
|
|
|
|
|
|
|
• |
Stand-alone |
r ti |
n |
|
|
|
|
|
|
•Capture linkage and captured pictures saving
•Connects to one external card reader or access controller via RS-485 protocol
•Connects to secure door control unit via RS-485 protocol to avoid the door opening when the terminal is destroyed
•Connects to external access controller or Wiegand card reader via Wiegand protocol
•Remote live view via RTSP protocol; encoding mode: H.264
• |
NTP, manually tim ync r n |
ti n and auto ync r n ti n |
• |
Voice prompt |
|
• |
Watchdog design and tamper |
ncti n |
Refer to the following contents for detailed n rm ti n of the face r c n ti n terminal:
2
|
Figure 2-1 Face |
c n |
n Terminal Diagram |
||||||
|
Table 2-1 |
c |
n of Face |
c |
n |
|
n Terminal |
||
|
|
|
|
|
|
|
|
|
|
No. |
|
Name |
|
|
|
c |
|
n |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For |
n |
r |
r n |
|
|
|
|
|
|
r c |
n ti |
n |
|
|
1 |
|
Fingerprint |
|
|
Note |
|
|||
|
Module |
|
Only parts of models |
||||||
|
|
|
|||||||
|
|
|
|
|
|||||
|
|
|
|
|
support |
|
n |
r r n |
|
|
|
|
|
|
r c |
n ti |
n |
ncti n |
|
|
|
|
|
|
|||||
2 |
|
Card Swiping |
|
Swipe card within this |
|||||
|
Area |
|
|
area. |
|
|
|
||
|
|
|
|
|
|
|
|||
|
|
|
|
||||||
3 |
|
Display Screen |
7-inch LCD touch screen. |
||||||
|
|
|
|
|
|
||||
|
|
|
|
|
IR light camera for |
||||
4 |
|
Camera (IR Light) |
recording or capturing |
||||||
|
|
|
|
|
videos or pictures in IR |
||||
|
|
|
|
|
light. |
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
White light camera for |
||||
5 |
|
Camera (White |
recording or capturing |
||||||
|
Light) |
|
|
white light videos or |
|||||
|
|
|
|
||||||
|
|
|
|
|
pictures. |
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
Supplement |
|
Supplement light for white |
|||||
6 |
|
Light (White |
|
||||||
|
|
light camera. |
|||||||
|
|
Light) |
|
|
|||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||||
7 |
|
Supplement |
|
Supplement light for IR |
|||||
|
Light (IR Light) |
camera. |
|
|
|||||
|
|
|
|
||||||
|
|
|
|
|
|||||
8 |
|
Supplement |
|
Supplement light for IR |
|||||
|
Light (IR Light) |
camera. |
|
|
|||||
|
|
|
|
||||||
|
|
|
|
|
|
||||
9 |
|
USB Interface |
Connect to USB |
||||||
|
drive. |
|
|
|
|||||
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
10 |
|
Network |
|
Connect to Ethernet. |
|||||
|
Interface |
|
|||||||
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|||
11 |
|
SIM Card Slot |
|
Reserved |
|
|
|||
|
|
|
|
|
|
|
|
|
|
3
No. |
Name |
c |
n |
|
|
|
|
||
12 |
Debugging Port |
The debug terminal is |
||
used for debugging only. |
||||
|
|
|||
|
|
|
||
13 |
Power Interface |
Connect to power supply. |
||
|
|
|
||
|
|
Connect to other external |
||
|
|
devices, including RS-485 |
||
14 |
Wiring Terminals |
card reader, Wiegand card |
||
|
|
reader, door lock, alarm |
||
|
|
input, alarm output, etc. |
||
|
|
|
|
|
15 |
PSAM Card Slot |
Reserved |
|
|
|
|
|
|
3 n |
n |
3.1 n |
n Environment |
•Install the device at least 2 meters away from the light, and at least 3 meters away from the window or the door.
• Make sure the environment m n ti n is more than 100 Lux.
Note
For details about n ti n environment, see Tips for
nn Environment.
Steps
1. According to the datum line on the m ntin template, tic the m ntin template on the wall or other surface, 1.4 meters higher than the ground.
4
5
Figure 3-1 M n n Template
2. Drill holes on the wall or other surface according to the m ntin template and install the gang box.
3.Use two supplied screws (4_KA4 × 22-SUS) to secure the m ntin plate on the gang box.
4. Use another four supplied screws to secure the m ntin plate on the wall.
Figure 3-2 Install M n n Plate
5.Remove the two screws on the rear panel and remove the sheet to display the wiring terminals.
6. Route the cable through the cable hole of the m ntin plate, and connect to corresponding external devices' cables.
7.Install the sheet back to the device with the two screws.
8.Apply Silicone sealant among the cable wiring area to keep the raindrop from entering.
Figure 3-3 Apply Silicone Sealant
9. |
n Insert the n r r n module to the holes at the |
bm of the main part.
6
7
Figure 3-4 Insert Fingerprint Module
10. Align the device with the m ntin plate and hang the device on the m ntin plate.
Figure 3-5 Install Device
11. Use two supplied screws (SC-M4 × 12TP10-SUS) to secure the device and the m ntin plate.
Figure 3-6 Secure Device
Note
•The n ti n height here is the recommended height. You can change it according to your actual needs.
• For easy n ti n drill holes on m ntin surface according to the supplied m ntin template.
Steps
1. According to the datum line on the m ntin template, tic the m ntin template on the wall or other surface, 1.4 meters higher than the ground.
8
9
Figure 3-7 M n n Template
2. Drill 6 holes on the wall or other surface according to Hole 1 and Hole 2 in the m ntin template.
3. Insert the screw sockets of the setscrews in the drilled holes.
Figure 3-8 Insert Screw Socket
4. Align the 6 holes to the m ntin plate with the drilled holes.
Figure 3-9 Install M n n Plate
5.Remove the two screws on the rear panel and remove the sheet to display the wiring terminals.
6. Route the cable through the cable hole of the m ntin plate, and connect to corresponding external devices' cables.
7.Install the sheet back to the device with the two screws.
8.Apply Silicone sealant among the cable wiring area to keep the raindrop from entering.
Figure 3-10 Apply Silicone Sealant |
|
9. Insert the n r r n module to the holes at the b |
m of the |
main part. |
|
10
11
Figure 3-11 Install Fingerprint Module
10. Align the device with the m ntin plate and hang the device on the m ntin plate.
Figure 3-12 Install Device
11. Use two supplied screws (SC-M4 × 12TP10-SUS) to secure the device and the m ntin plate.
Figure 3-13 Secure Device
Note
•The n ti n height here is the recommended height. You can change it according to your actual needs.
• For easy n ti n drill holes on m ntin surface according to the supplied m ntin template.
You can connect the RS-485 terminal with the RS-485 card reader, connect the NC and COM terminal with the door lock, connect the SENSOR terminal with the door contact, the BTN/GND terminal with the exit b n connect the alarm output and input terminal with the alarm output/input devices, and connect the Wiegand terminal with the Wiegand card reader or the access controller.
If connect the WIEGAND terminal with the access controller, the face r c n ti n terminal can transmit the ntic ti n
12
n rm ti n to the access controller and the access controller can judge whether to open the door or not.
Note
•If cable size is 18 AWG, you should use a 12 V power supply. And the distance between the power supply and the device should be no more than 20 m.
•If the cable size is 15 AWG, you should use a 12 V power supply. And the distance between the power supply and the device should be no more than 30 m.
•If the cable size is 12 AWG, you should use a 12 V power supply. And the distance between the power supply and the device should be no more than 40 m.
4.1 Terminal |
c |
n |
The terminals contains power input, alarm input, alarm output, RS-485, Wiegand output, and door lock.
The terminal's diagram is as follows:
|
|
Figure 4-1 Terminal Diagram |
|
|||
The cr |
ti n |
of the terminals are as follows: |
|
|||
|
|
Table 4-1 Terminal c |
n |
|
||
|
|
|
|
|
|
|
Group |
No. |
|
nc |
Color |
Name |
c |
|
n |
n |
||||
|
|
|
|
|
||
|
|
|
|
|
|
12 VDC |
Group |
A1 |
|
Power |
Red |
+12 V |
Power |
|
|
|
|
Supply |
||
A |
|
|
Input |
|
|
|
|
|
|
|
|
||
|
A2 |
|
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
Group |
B1 |
|
Alarm |
Yellow/ |
IN1 |
Alarm |
B |
|
|
Input |
Blue |
|
Input 1 |
13
Group |
No. |
nc |
Color |
Name |
c |
|
n |
n |
|||||
|
|
|
|
|||
|
|
|
|
|
|
|
|
B2 |
|
Yellow/ |
GND |
Ground |
|
|
|
|
Black |
|
|
|
|
B3 |
|
Yellow/ |
IN2 |
Alarm |
|
|
|
|
Orange |
|
Input 2 |
|
|
B4 |
|
Yellow/ |
NC |
|
|
|
|
|
Purple |
|
|
|
|
|
|
|
|
Alarm |
|
|
B5 |
Alarm |
Yellow/ |
COM |
||
|
Output |
|||||
|
|
Output |
Brown |
|
Wiring |
|
|
B6 |
|
Yellow/ |
NO |
|
|
|
|
|
Red |
|
|
|
|
C1 |
|
Yellow |
485+ |
RS-485 |
|
|
|
|
|
|
||
|
|
|
|
|
Wiring |
|
|
C2 |
RS-485 |
Blue |
485- |
||
|
|
|||||
|
|
|
|
|
|
|
|
C3 |
|
Black |
GND |
Ground |
|
|
|
|
|
|
|
|
|
|
|
|
|
Wiegan |
|
|
C4 |
|
Green |
W0 |
d |
|
|
|
Wiring |
||||
|
|
|
|
|
||
|
|
|
|
|
0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Wiegan |
|
|
C5 |
|
White |
W1 |
d |
|
|
|
Wiring |
||||
|
|
|
|
|
||
|
|
|
|
|
1 |
|
|
|
|
|
|
|
|
Group |
|
|
|
|
Wiegan |
|
|
|
|
WG_ |
d |
||
C |
C6 |
|
Brown |
|||
|
OK |
Authent |
||||
|
|
Wiegan |
|
|||
|
|
|
|
icated |
||
|
|
d |
|
|
|
|
|
|
|
|
Wiegan |
||
|
|
|
|
|
||
|
|
|
|
WG_ |
d |
|
|
C7 |
|
Orange |
Authent |
||
|
|
ERR |
||||
|
|
|
|
|
ication |
|
|
|
|
|
|
Failed |
|
|
|
|
|
|
|
|
|
C8 |
|
Purple |
BUZZE |
Buzzer |
|
|
|
R |
Wiring |
|||
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
|
Tamper |
|
|
C9 |
|
Gray |
TAMPE |
ing |
|
|
|
R |
Alarm |
|||
|
|
|
|
|||
|
|
|
|
|
Wiring |
|
|
|
|
|
|
|
|
Group |
|
Door |
White/ |
|
Lock |
|
D1 |
NC |
Wiring |
||||
D |
Lock |
Purple |
||||
|
|
(NC) |
||||
|
|
|
|
|
||
|
|
|
|
|
|
14
Group |
No. |
|
nc |
Color |
Name |
c |
n |
|
n |
||||
|
|
|
|
|
||
|
|
|
|
|
|
|
|
D2 |
|
|
White/ |
COM |
Comm |
|
|
|
Yellow |
on |
||
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
White/ |
|
Lock |
|
D3 |
|
|
NO |
Wiring |
|
|
|
|
Red |
|||
|
|
|
|
|
(NO) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Yellow/ |
SENSO |
Door |
|
D4 |
|
|
Contac |
||
|
|
|
Green |
R |
||
|
|
|
|
t |
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Yellow/ |
|
Exit |
|
D5 |
|
|
BTN |
Door |
|
|
|
|
|
Gray |
|
Wiring |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
You can connect the terminal with peripherals.
The wiring diagram without secure door control unit is as follows.
Figure 4-2 Device Wiring
|
Note |
|
|
|
|
|
• |
You should set the face r c |
n ti |
n terminal's Wiegand |
|||
|
r cti n to "Input" to connect to a Wiegand card reader. If |
|||||
|
connects to an access controller, you should set the Wiegand |
|||||
|
r cti n to "Output" to transmit |
|
ntic |
ti n n |
rm ti n to |
|
|
the access controller. |
|
|
|
|
|
• |
For details about Wiegand |
r cti |
n |
n |
see |
n |
|
Wiegand Parameters in mm n |
|
n |
n . |
|
•The suggested external power supply for door lock is 12 V, 1 A. The suggested external power supply for the Wiegand card reader is 12 V, 1A.
•The suggested power cable's diameter: 22 AWG. The suggested other cable's diameter: 26 AWG.
Warning
The face r c n ti n terminal shall adapt an external listed Class 2 power supply with surge protected ncti n
You can connect the terminal with the secure door control unit. The wiring diagram is as follows.
15