It is strictly prohibited to compile, duplicate or publish part or whole of this manual prior written
consent of NITGEN.
The specification of this product may be changed without prior notice to improve its functionality.
The logo of NITGEN&COMPANY is a registered trademark of NITGEN Co., Ltd.
Other names or trademarks are registered trademarks of their respective owners.
The NITGEN access control system of eNBioAccess-T1 is the optimized product by organically
combining the globally recognized core technologies of NITGEN, such as a fingerprint recognition
algorithm, optical sensors, embedded design technology, and software application technology.
This product is designed with maximum consideration for the efficiency of operation so that standalone terminals can be monitored and managed comprehensively and systematically from a remote
place via a network.
: When the input of fingerprint and card user is on standby
●
Lighting
: Light up for 1 second upon successful authentication.
Flickering
: Flicker at one second interval when FW is downloaded and when an
administrator application is entered.
●
Lights-out
: Normal status
Lighting
: Light up for one second when authentication fails.
Flickering
: Flicker for one second upon the warning status (forced opening, non-
connection of server, etc.).
Ppik
When fingerprint
or card is read
When the card is read,
When the FP is entered in the FP window
Ppibik
When failure
If authentication fails or the user's input is wrong,
If the control and setting of the terminal fail
Ppiriririk
When input
standby
When it is notified that the input of fingerprint and card user
is on standby
Ppiririk
When success
If authentication is successful,
If the terminal is successfully booted,
If the control and setting of the terminal and successfully
completed
1.3. LED signals displayed during operation
1.4. Buzzer guide announced during operation
1.5. How to register and enter correct fingerprint
Correct fingerprint input method
Enter your fingerprint as if you take a thumbprint by using your forefinger if possible.
The fingerprint cannot be correctly registered and entered only by your fingertips.
The center of the fingerprint should be touched with the fingerprint input section.
Enter the fingerprint of your forefinger if possible.
When using your forefinger, you can enter your fingerprint correctly and safely.
Make sure that the fingerprint is unclear or wounded.
Too dry, wet, blurry or wounded fingerprints are difficult to recognize. In this case, the
fingerprint of another finger should be registered.
Precautions subject to your fingerprint status
The availability of the fingerprint may vary subject to your fingerprint status.
This product consists of a fingerprint recognition system and cannot recognize the
damaged or unclear fingerprints. The fingerprint should be registered using the RF card.
If your hands are dry, you can blow your breath on the system to operate it more
smoothly.
For children, too small or unclear fingerprints may be difficult or impossible to use. They
need to register a new fingerprint every six months.
For seniors, the fingerprint with too many lines may not be registered.
It is recommended that you will register more than two fingerprints if possible.
In order to increase the fingerprint authentication rate, it is recommended to use six of
the ten fingers as illustrated below (both thumbs, forefingers, middle fingers).
- The use of the fingerprint recognition technology (Biometrics) can prevent forgetting your
password, losing your card or key, or avoid the risk of their theft. The use of personal
fingerprints enhances the security of authentication.
Waterproof and dustproof functions
- Acquired the IP65 level of waterproof and dustproof certification.
Various card options
- 125Kz-based EM and HID cards
Access control system using the local area network (LAN)
- The fingerprint reader communicates with the authentication server using a TCP/IP
protocol. Therefore, this terminal can be applied to the existing LAN and has easy
expandability. It ensures a fast speed by 10/100 Mbps Auto Detect and facilitates
management and monitoring via the network.
Mobile interlocking function
- By using Smartphone Bluetooth, the terminal can be set to Admin App (iAccess Plus).
If no administrator is registered,
you can access the terminal without
entering your ID and password on
the login window.
If any administrator has been
registered, you can access the
terminal using the proper
administrator authentication
scheme.
If your ID is entered, attempt 1:1
Authentication. If your ID is not
entered, attempt 1:N
Authentication. If you have
successfully logged in the terminal,
the screen goes to the User
Management screen.
3. Environment Setting
3.1. Checkpoints before environment setting
3.1.1. To run iAccess Plus (Mobile App)
Search “iAccess Plus” at the smartphone app store to install a mobile app.Press “iAccess Plus”
icon installed on your smartphone to run the program. The initial screen will appear. After 2-3
seconds, it will automatically go to the Intro menu.
3.1.2. To enter the administrator menu
Select View] button on the [Terminal List] screen, and the connection window will appear.
Enter your registration information on the Add User screen.
When the information is completely entered, select the [Save]
button in the top right of the screen.
Once the user information has been correctly entered, the
fingerprint is ready to be entered in either the terminal or the card.
If the set authentication scheme is completely registered, the screen
returns to the User Management screen.
To delete all users, press the [Delete All] button. To delete part of
users, select any delete target users, and press the [Delete] button.
(When the network mode is set, the [Delete All] button is
disabled.)
3.2. User Management
3.2.1. Add User
Select [Add] on the [User Management] screen, and the following screen will appear.
3.2.2. Delete
Select [Edit] on the [User Management] screen, and the following screen will appear.
When you select the [Save] button after modifying the items
except the ID, if there is any additional authentication means, the
terminal becomes the input standby status and carries out
additional registration.
When the change is completed, the screen returns to the User
Management screen.
3.3.3. Change
Click the user to change on the [User Management] screen, the screen will go to the [User
To change the terminal settings, press the [Edit] button on the top
right to switch to the edit mode.
When the terminal settings are finished, press the [Save] button to
save the changes and exit the setting.
Settings
Display Method
No Use
No external lock is used.
Normal open
When the power is applied, the lock is open.
Normal close
When the power is applied, the lock is closed.
3.3. Terminal Setting
3.3.1. Setting via “iAccess Plus”
Select [Setting] on the bottom right, and the following screen will appear.
Terminal Name
The name of the terminal will be displayed.
LFD Level
The fake fingerprint is likely to be recognized. Therefore, the higher level of security application may be
used. The higher security level may need the longer time to verify the fingerprints of some registered
users. The security level for the stage of 0-3 is supported.
Door Open Status 1
Set when connecting external contacts.
Door Open Interval
The unlock time can be set from 0.1 to 20 seconds.
Perform the Wiegand communication by a format of 26Bit
34Bit
Perform the Wiegand communication by a format of 34Bit
Card Format
The type of card to be used can be set.
Wiegand Output
This mode is available if the terminal is equipped with a separate controller operated by Wiegand input.
Device Mode
If reader mode is selected, wiegand output is Card Number when authentication is Success.
If access control is selected, wiegand output is User’s ID when authentication is Success.
Sitecode
Set the value of Sitecode to transfer upon Wiegand output.
If Wiegand output is 26bit, a value of 0 to 255 can be set. If Wiegand output is 34Bit, a value of
0 to 32767 can be set.
Ext 485
Can select external RS 485 device.
If is select CP040, CP040 process authentication and lock control, log data.
485 ID
Can assign ID of External RS 485 device to 0-7.
1:N Level
When 1:N authentication, set the verification level to 5-9.
1:1 Level
When 1:1 authentication, set the verification level to 1-9.
Max ID Length
This indicates the length of ID which can be entered to the maximum.
Network Mode
Set whether the terminal is used to either a stand-alone mode or a network mode.
Set Terminal ID and Terminal Network and then click the “Request Connect” button at the bottom,
and the terminal will appear as the unregistered status on the Access Manager Professional screen
and the settings will be finished.
※ For more details, please refer to the Access Manager Professional Manual.
Place your finger on the fingerprint sensor. Then, the fingerprint sensor will light on and receive
fingerprint input. Keep your finger on the fingerprint sensor until the light turns off completely.
4.1.2. Card Authentication
Place the card on the card sensor of the terminal.
4.1.3. Multi Authentication
For users who have to be authenticated by the combination authentication methods such as
“Card and Fingerprint”, if the first input authentication method is successful, the remaining
authentication method is performed.
5.1. When the fingerprint authentication time is too long or fails
When the terminal operates by the 1:N (Server) authentication in the network mode, if the
server is used for personal or business use, a server load may reduce the fingerprint
recognition rate and require the long fingerprint authentication time. It is recommended to
build a dedicated server.
Check that there are any scratches or foreign matters in your finger or FP sensor. If there are
foreign matters, wipe them with a dry cloth. If there is a large scratch, re-register another
fingerprint through the administrator.
If the fingerprint status is bad, lower the individual security level in the user information and
attempt 1:1 Authentication.
If the RF card registered by the user’s ID has been authenticated, when the fingerprint
authentication fails, whether the user exists or not is verified. Check that the user is a
registered user.
5.2. When the fingerprint is not entered well
Very dry or wet fingerprints may not be normally entered.
If the fingerprint is wet, wipe it with a dry towel. If the fingerprint is dry, blow your breath or
apply oil on your hands. Then, try to enter the fingerprint again.
5.3. When the RF card authentication fails
Check that the card possessed by users conforms to the card type set in the “RF Card Type” in the
“Option Setting” of the Access Manager program.
5.4. When the network is not connected
Check that the terminal is registered in the terminal management item in the information
management menu of Access Manager Professional.
If the terminal is not registered, check that it is set in the terminal search of Access Manager
Professional.
- Server IP of which Access Manager Professional is installed
- Check that the terminal ID is set up correctly.
- If DHCP is not used, check the relevant information.
5.5. When the authentication is successful but the door does not open
Check that the access is controlled by the time zone.
5.5. When the user is not registered
This product is set by default to operate as a network mode.
If the connection is abnormal in the network mode, the user cannot be registered.
Check the network connection status.
5.6. When the product is unstable or does not work
Select the terminal in the terminal management menu of Access Manager Professional, click
the right mouse button, and select the [terminal Restart] item. Then, the terminal will restart.
If the server management program is being used, try to run the server again.
If the terminal does not normally work after checking all of the above, please contact our
Note: This equipment has been tested and found to comply with the limits for CLASS B
digital
device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment This equipment generates, uses and can radiate radio frequency energy and, if
not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try correct the interference by one or more of the following measures:
1.1. Reorient or relocate the receiving antenna.
1.2. Increase the separation between the equipment and receiver.
1.3. Connect the equipment into an outlet on a circuit different from that to which receiver is
connected.
1.4. Consult the dealer or experienced radio/TV technician for help.
FCC Information
This device complies with part 15 of the FCC Rules. Operation is subject to the following
two conditions :
(1) This Device may not cause harmful interface, and
(2) This device must accept any interference received, including interference that
may cause undesired operation.
WARNING
Changes or modifications not expressly approved by the manufacturer could void the
user’s authority to operate the equipment.
“CAUTION : Exposure to Radio Frequency Radiation.
This equipment should be installed and operated with a minumum distance of 20 cm
between the radiator and your body.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.