(05836) (Munjeong-dong, Daemyung VALEON) 12th Floor, 127, Beobwon-ro,
Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
It is strictly prohibited to compile, duplicate or publish part or whole of this manual prior written
consent of NITGEN.
The specification of this product may be changed without prior notice to improve its functionality.
The logo of NITGEN&COMPANY is a registered trademark of NITGEN Co., Ltd.
Other names or trademarks are registered trademarks of their respective owners.
eNBioAccess-T1 User Guide
Version Eng-1.6
© Copyright 2013, NITGEN Co., Ltd.
All rights reserved
eNBioAccess-T1 User Guide
(05836) (Munjeong-dong, Daemyung VALEON) 12th Floor, 127, Beobwon-ro,
Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
Change Wordings and Add Notes
Change Door Open interval
Change Door Open interval
<Revison History>
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
High-tech Biometric
Technology
<Product Descriptions>
The NITGEN access control system of eNBioAccess-T1 is the optimized product by organically
combining the globally recognized core technologies of NITGEN, such as a fingerprint recognition
algorithm, optical sensors, embedded design technology, and software application technology.
This product is designed with maximum consideration for the efficiency of operation so that standalone terminals can be monitored and managed comprehensively and systematically from a remote
place via a network.
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
<Glossaries>
Administrator (Admin)
- The administrator can access to the terminal menu mode. He/she has the authority to
add/modify/delete terminal users and to change the operating environment by changing
settings.
- If there is no registered administrator in the terminal, anybody can access to the terminal menu
and change settings. It is recommended that more than one administrator will be
necessarily registered in the terminal.
- The administrator has the authority to change critical environmental settings of the fingerprint
reader. So, special attention is required to its registration and operation.
1:1 Authentication
- The user fingerprint is verified after entering User ID or Card.
- Only User ID or the user fingerprint registered to the card is compared. This is called One-to-
One Authentication.
1:N Identification
- The user is searched only by the fingerprint.
- The same fingerprint as the input fingerprint is identified among the registered fingerprints
without User ID or Card entered. This is called One-to-N Identification.
Authentication Level
- As a level used for fingerprint authentication, it is displayed in Step 1 to 9. Authentication
cannot be allowed before the degree of match between two fingerprints is higher than the set
authorization level.
- The higher authentication level may ensure the higher security. But it requires the relatively
high concordance rate. When authenticating User ID, it high likely to deny authentication.
- 1:1 Level: Authentication level applied when 1:1 authentication
- 1:N Level: Authentication level applied when 1:n authentication
LFD (Live Finger Detection): Fake fingerprint prevention function
- The LFD allows only actual fingerprints to be entered, except for any fake fingerprints made
of rubber, paper, film, and silicon and the like.
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
Table of Contents
<Revison History> ............................................................................................................... 2
<Product Descriptions> ....................................................................................................... 3
<Glossaries> ......................................................................................................................... 4
Table of Contents ................................................................................................................. 5
1. Before Getting Started ..................................................................................................... 7
1.1. Safety Notes ..................................................................................................................................... 7
1.2. Product Details ................................................................................................................................ 8
1.3. LED signals displayed during operation ......................................................................................... 9
1.4. Buzzer guide announced during operation ..................................................................................... 9
1.5. How to register and enter correct fingerprint ................................................................................. 9
2. Product Descriptions ..................................................................................................... 11
2.1. Product Features .............................................................................................................................11
2.2. Configuration Diagram ................................................................................................................. 12
2.2.1. Standalone Use (Access) ....................................................................................................... 12
2.2.2. Connecting to the PC server (Access, T&A) .......................................................................... 12
2.3. Product Specification ................................................................ ..................................................... 13
3. Environment Setting ...................................................................................................... 14
3.1. Checkpoints before environment setting ....................................................................................... 14
3.1.1. To run iAccess Plus (Mobile App) ......................................................................................... 14
3.1.2. To enter the administrator menu ............................................................................................. 14
3.2. User Management .......................................................................................................................... 15
3.2.1. Add User ............................................................................................................................... 15
3.2.2. Delete ................................................................................................................................... 15
3.3.3. Change.................................................................................................................................. 16
3.3. Terminal Setting............................................................................................................................. 17
3.3.1. Setting via “iAccess Plus” ..................................................................................................... 17
3.3.2. To set the terminal IP via Access Manager ............................................................................. 20
4. How to Use Terminal ..................................................................................................... 23
4.1. Authentication................................................................................................................................ 23
4.1.1. Fingerprint Authentication ..................................................................................................... 23
4.1.2. Card Authentication .............................................................................................................. 23
4.1.3. Multi Authentication ............................................................................................................. 23
5. Troubleshooting ............................................................................................................. 24
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
5.1. When the fingerprint authentication time is too long or fails ....................................................... 24
5.2. When the fingerprint is not entered well ....................................................................................... 24
5.3. When the RF card authentication fails ................................ .......................................................... 24
5.4. When the network is not connected ............................................................................................... 24
5.5. When the authentication is successful but the door does not open ............................................... 25
5.5. When the user is not registered ..................................................................................................... 25
5.6. When the product is unstable or does not work ............................................................................ 25
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
Do not operate the terminal
with wet hands, and pay
attention not to let any liquid
such as water enter inside the
terminal.
→ Otherwise, malfunction
or electric shock may be
caused.
Keep the terminal away
from inflammables.
→ Otherwise, it may cause
a fire.
Do not disassemble, repair or
remodel the terminal at your
disposal.
→
Otherwise, it may cause
malfunction, electric shock, or
a fire.
Do not allow children to
touch the terminal
carelessly. → Otherwise, it
may cause safety accidents
of children or malfunction.
Do not install the terminal in a
place exposed to direct
sunlight.
→ Otherwise, it may cause
malfunction, deformation and
discoloration.
Do not install the terminal
in humid or dusty places.
→ Otherwise, it may cause
malfunction.
Do not clean this terminal by
sprinkling water, nor wipe it
with benzene, thinner, and
alcohol.
→ Otherwise, it may cause
electric shock or a fire.
Keep the terminal away
from magnets.
→ Otherwise, it may cause
failure and malfunction.
Keep the fingerprint input
section clean.
→ Otherwise, the fingerprint
cannot be recognized
correctly.
Do not spray insecticides or
inflammables on the
terminal.
→ Otherwise, it may cause
deformation and
discoloration.
Keep the terminal away from
shock or sharp objects.
→ Otherwise, it may damage
the terminal and result in
malfunction.
Do not install the terminal
in a place where there is a
severe change in
temperature.
→ Otherwise, it may cause
malfunction.
1. Before Getting Started
1.1. Safety Notes
Warning
- Non-compliance of safety notes may cause death or serious injury for users.
Cautions
- Non-compliance of safety notes may cause personal injury or property damage for users.
※ We are not responsible for any accidents and damage that may arise from non-compliance of the
information in this manual.
eNBioAccess-T1 User Guide
(138-827) (Bangi-dong, Hyundai Topics Building) 4th Floor, Wiryeoseongdaero, Songpa-gu, Seoul, Korea
Tel : 82-2-6488-3232 , Fax : 82-2-6488-3099,
E-Mail: customer@nitgen.com; http://www.nitgen.com
1.2. Product Details