Advertisement

Face ID 5/TD
Face ID 5 Series
w w w . f i n g e r t e c . c o m
w w w . f i n g e r t e c . c o m
User Guide
w w w . f i n g e r t e c . c o m
w w w . f i n g e r t e c . c o m
Face ID 5

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Face ID 5 Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for FingerTec Face ID 5 Series

  • Page 1 . f i n g e r t e c . c o m w w w . f i n g e r t e c . c o m Face ID 5/TD Face ID 5 Face ID 5 Series User Guide...
  • Page 2 Copyright Notice Disclaimer All rights reserved. No part of this book may No person should rely on the contents of this be reproduced or transmitted in any form publication without first obtaining advice or by any means, electronic or mechani- from a qualified professional person. The com- cal, including photocopying, recording, or pany expressly disclaims all and any liability by any information storage and retrieval and responsibility to any terminal or user of system, without written permission from this book, in respect of anything, and of the...
  • Page 3: Table Of Contents

    Contents Chapter 5 29-35 Chapter 1 5-6 SYSTEM GETTING STARTED Setup Date and Time Viewing the User Guide in the Internet Access Log Settings Terminal Included Accessories Attendance Record Storage Option Activating Terminal Fingerprint Options Registering Terminal Reset Options Fingerprint Image Face Parameters Chapter 2 7-9 Palm Parameters BASICS Reset Options Introduction to Terminal Terminal Overview Main Menu Chapter 6 36-40 Power On/Off Button PERSONALIZATION Battery User Interface Cleaning Terminal Voice Restarting and Resetting Terminal Bell Punch State Options Shortcut Key Mappings Chapter 3 10-18 USERS Introduction...
  • Page 4 Chapter 10 DIAGNOSTIC Autotest Chapter 11 SYSTEM INFO Device Capacity Device Info Firmware Info TROUBLESHOOTING 50-51 “Unable to Connect” Appears “Admin Affirm” Appears Difficult to Read Finger The LED is Blinking All The Time “Duplicate Finger” Appears RFID Card Doesn’t Respond No Sound...
  • Page 5: Getting Started

    Chapter 1 Getting Started Viewing the User Guide in the Internet The User Guide is available in the package when you purchased the terminal. The User Guide is also available online at http://www.fingertec.com and http://user.fingertec.com. Choose the language that you prefer for your User Guide. Terminal Included Accessories Do not abuse the fingerprint sensor by scratching the surface, contacting the sensor’s surface with heat, pressing hard during placement of fingerprint for verification. Clean the sensor occasionally with microfiber cloth to maintain the performance of the sensor. Screwdriver Connection Wires DC 12V Power Adapter A Packet of Bolts *RFID Cards (5 pieces) ITEM...
  • Page 6: Activating Terminal

    Activating Terminal Every FingerTec access control model comes bundled with a unique license key. To start using the terminal with Ingress, you must connect the terminal to Ingress and perform on- line activation. Ingress reads the serial number of your terminal and sends it for verification at the FingerTec server via Internet. In case you do not have an Internet connection, you would need to do offline activation. Please send the serial number and models of your terminals to your local resellers or support@fingertec.com to request for a product key and activation key. Registering Terminal Make sure that you register your terminal’s warranty with us at http://www.fingertec.com/ver2/english/e_warranty.htm. for a 36 month warranty protection.
  • Page 7: Basics

    Chapter 2 Basics Introduction to Terminal Introducing terminal, the latest biometrics product, face recognition technology prod- uct combined with fingerprint technology. Terminal can identify an identity in split sec- onds without any contact or hassle. Terminal only requires user to look at the machine to get verification. Terminal is loaded with powerful microprocessor that can process dual biometrics authentication methods for accurate personal identifications and for collection of precise data for time attendance and door access. In addition, the terminal accepts card verification as an added security measure. If you are looking for contactless, hassle free biometrics product, choose terminal. With one look you are good to go! Terminal Overview • Face ID 5/TD • Face ID 5 Thermal infrared temperature Flash...
  • Page 8: Main Menu

    Setup FingerTec terminal communication with computer through LAN, RS232 and RS485. Set security password of the device for a secure data transfer. System Configure the settings of the FingerTec terminals from general to display setting to fingerprint, and reset the terminal to default settings. Personalize Adjust the date/time, Voice, bell schedules settings of the terminal.
  • Page 9: Power On/Off Button

    Power On/Off Button Use the power on/off button to turn the terminal on or off. You can disable the button to avoid accidental shut off of the terminal. Battery Terminals operate using power supply from a standard power outlet. Inside the terminal, there is an RTC battery for the running of the clock. Charge the terminal for at least 3 hours straight before you start using it. When there is a serious delay in time or the clock keeps on restarting, the RTC needs to be replaced. Internal battery The internal battery is provided as a separate accessory and it can last up to 5 hours. Refer to the battery icon on the terminal LCD for the status of the remaining power. Charge when necessary. External power supply Mini UPS (uninterrupted power supply) 5V and mini UPS 12V provide mobile power supply to the terminals. Charge the mini UPS sufficiently for optimum performance. Refer to http://accessory.fingertec.com for more information about accessories. Cleaning Terminal Cleaning The Body Use a dry cloth to clean the terminal’s body. Do not use any liquids, household cleaners, aerosol spray, solvents, alcohol, ammonia and abrasive solutions to clean the body of the terminal because it could damage it. Cleaning the Fingerprint Prism Clean the fingerprint prism with a cellophane tape for (silicon coated prism). View the video on how to clean the fingerprint prism at this link http://www.fingertec.com/newsletter/enduser/cleanfinger.html. For the non-coated prism, please use microfiber cloth. Restarting and Resetting Terminal If a feature isn’t functioning as it should, try restarting or resetting the terminals Restarting the Terminal Push the On/Off button on the terminal to restart the terminal. If you can’t restart the terminal, or if the problem persists, you might want to reset.
  • Page 10: Users

    Chapter 3 Users Introduction FingerTec devices recognize users by face recognition, fingerprint, card access or a set of pin numbers. The Date, Time Data and User ID will be stored in its internal storage upon verification and will be used to generate reports in accordance with the user’s attend- ance. Privileges can be assigned accordingly based on individual permissions. Likewise, a Sys- tem Administrator can have his rights restricted or be given full control. Access controls such as the ability to modify settings within the menu will be barred when a System Ad- ministrator has been assigned to a device. The role of an administrator plays a crucial role in the vitality of the data in these devices. For example, Network Administrator(s) can be allowed to configure communication set- tings but not to enroll new users. Three levels of authority govern each device: • Super Administrator The top of the hierarchy, Super Administrators have, full access to all functions. • Administrator The rights of an Administrator are limited by the permissions granted by the Super Ad- ministrator. For example, a Network Administrator can be allowed to configure commu- nication settings but are not allowed to enroll users. • User Normal users have no access to any functions within the device. By default, every user enrolled is a normal user. Super Admin and Administrator roles are allocated from the list of normal users, either directly from the terminal or assigned via our software.
  • Page 11: Methods Of Enrollment

    Voice Message VOICE / MESSAGE WHAT DOES IT MEAN? Identity verification is successful, the terminal stores the transaction logs and “Verified” opens the door (if connected to door access) Identity verification is failed because the finger is not properly positioned, the “Try again please”...
  • Page 12 Prior to enrolling your fingerprint, please choose the fingers that will be used to enroll into the device. We recommend using both index fingers as opposed to your thumbs as their size may differ between individuals, which may not fit wholly on the scanner. Follow the steps below to enroll a fingerprint: S tep 1: Press Menu > User Mgt > New User S tep 2: User ID > Key in User ID This is the unique ID number that represents the user in the devices and software. Make sure you do not use duplicated ID. The maximum length is 9-digits S tep 3: Select Fingerprint > Press the corresponding number to select which finger(s) to enroll from the on screen image. S tep 4: Press OK to start enrolling the fingerprint > Place your finger on the scanner 3 times > Screen will display the quality of image captured > Press OK to save > Press ESC to return to the main page S tep 5: Press User Role > Select Role > Select Normal User > Press OK to save Select Super Admin or other defined role(s) you wish to assign to this user.
  • Page 13 S tep 3: Select Face > Follow the voice and interface prompts to move back and forth to place your eyes within the green box > Register Face success S tep 4: Press User Role > Select Role > Select Normal User > Press OK to save Cannot enroll duplicate face, otherwise device will show message ‘Duplicated Face’ Palm Enrollment Please place your palm parallel to the device with a distance of 30-50cm in the multi- mode collection area. Make sure to keep space between your fingers. 1:N Palm Verification mode: Compare the palm image collected by the palm collected with all the palm data in the device. The device will automatically distinguish between the palm and the face verification mod, and place the palm in the area that can be collected by the palm collected, and the device will automatically detect the palm verification mode. 1:1 Palm Verification mode: Click the (x) button on the main screen to enter 1:1 palm verification mode. Input the user ID and press [OK].
  • Page 14 Select Card > Wave card at the induction area > Screen displays the card ID > Press OK to save S tep 4: Press User Role > Select Role > Select Normal User > Press OK to save Select Super Admin or other defined role(s) you wish to assign to this user. Refer to page 15 for more details regarding User Role Password Enrollment Password verifications have a lessened security presence in Attendance Reporting and Access control systems. Despite this, passwords are generally the primary preference for enrollment. FingerTec devices can accept up to 8-digit passwords in numeric format. Follow the steps below to enroll password: S tep 1: Press Menu > User Mgt > New User S tep 2: User ID > Key in User ID This is the unique ID number that represent the user in the devices and software. Make sure you do not use an existing ID. The maximum length is 9 digits S tep 3: Select Password S tep 4: Insert password for the 1st time > Press OK > Re-enter the password to con-...
  • Page 15: Combined Verification

    Combined Verification Security can be enhanced with terminal which offers the option of using multiple forms of verification methods. Select one from the following fifteen verification combinations • Password/Fingerprint/Face/Palm • Face + Fingerprint • Fingerprint only • Face + Password • User ID only • Face + Fingerprint + Password • Password • Palm • User ID + Fingerprint • Palm + Face • Fingerprint + Password • Palm + Fingerprint • User ID +Fingerprint + Password • Palm + Face + Fingerprint • Face Only Verification may fail if the required verification information has not been registered be- fore opting the combination verification mode. Menu Options Expiration Options You can set the expiration options for each employee if required. Once the expiration period for the employee has been exceeded, access to the company will be restricted. To turn on the function: S tep 1: Press Menu > System > Attendance > Expiration Rule > Press OK to turn it ON S tep 2: Press Menu > User Mgt > New User > Expiration Rule > Press OK to Enter S tep 3: Select the Expiration Options as below. • You must set the employees’ employment starting and ending date. Expired Date: •...
  • Page 16 Add User During the initial registration, you can modify your ID - a user name may contain 17 characters and the user ID may contain 1-9 digits by default. Created IDs cannot be modified after registration. Duplicating ID is not allowed. To add user(s): 1: Press Menu > User Mg > New User Step 2: Key in User ID and name > Press OK Button Step Edit User Name Change, user role, deletion or re-enrollment of fingerprints, card and/or pass- words can be modified after the enrollment process. However the user ID is permanent and cannot be changed.
  • Page 17 SINGLE LINE MULTIPLE LINE MIXED LINE SINGLE LINE & SORT BY NAME MULTIPLE LINE & SORT BY NAME MIXED LINE & SORT BY NAME User Role Employees with Super Admin rights are granted limitless access to all settings and sys- tems within the terminal in addition to the ability to enroll new users. Super Admin can also perform system Reset. Employees with Normal User rights are only able to log in their attendance at a terminal. They are unable to access the menu to modify settings within the menu. In addition to the three defined roles, you are given the option to configure 3 different subsets. Refer to page 16 on details on how to configure the User Defined Role.
  • Page 18 Define Role You can define what the administrator is allowed to do at the device. You will be ad- vised to create a Super Administrator first after clicking the enable bar. A maximum of three different role sets can be configured. For example, you create a role called Net- work Admin, and limit his access to the Network option only. Therefore, he is unable to enroll new users or configure device settings. To set the define user role: S tep 1: Press Menu > User Role S tep 2: Select User Defined Role > Press OK > Press OK again to enable the selected Role S tep 3: Rename the Role > Define User Role > Save and Exit. Once these roles have been defined, they will appear in the Users tab where you can assign employees accordingly. Assign Role To define roles for new employees: S tep 1: Menu > User Mgt > New User > User Role S tep 2: Select the role to assign to the employee > Save and Exit. To define roles for existing employees: S tep 1: Menu > User Mgt > All Users > Press OK > Select the User ID > Press OK > Edit S tep 2: User Role > Select the role to assign to the employee > Save and Exit Search for Users Search bar is available on the user list to enable quick search by entering the retrieval keyword (The keyword may be an ID, surname or full name.). The system will detect the input keywords and retrieve users’ related information.
  • Page 19: Installations

    Chapter 4 Installations & Communication Installations FingerTec terminals offer several connections for power and communications. Installa- tions of FingerTec time attendance terminals are simple. Mount On Wall w w w . f i n g e r t e c . c o m w w w . f i n g e r t e c . c o m 5 feet / 1.5 meter...
  • Page 20: Communications

    Communications Connection points for power and communication are available on top of the terminals. Refer to the following diagrams for the terminals you require. +12V Power Port TOP TCP/IP Port Connect with CAT 5 cable for LAN connection, one end to this port and another end to the computer’s TCP/IP Port. FRONT TCP/IP for Single Connection – Linking the ter- minal to a single computer using TCP/IP re- JOINT 1 PIN JOINT 2 PIN quires Ethernet 10/100Base-T Crossover Cable. • • TX+ 3 RX+ The cable can be used to cascade hubs or to •...
  • Page 21 Power Supply Port Insert the Power Adapter point to this port for power. RS485 & Wiegand Connection Port RS485 Single Connection - Connection to a single computer using RS485 wire. Wiegand Output – Connecting with third party connector or terminal(s) Access Control Port Linking Face ID terminal to door lock system. External Alarm Port Connect to External Siren for Door security FingerTec devices offer several types of communication mediums for data transfer that allows you to share employee credentials across all devices within the network without re- enrolling users. Employee attendances are downloaded into our software for easy view- ing, analysis and reporting. We recommend that you delete the attendance records upon completion of the down- load process. The deletion process can be done manually at the device or commands via the software’s interface. This chapter will provide instructions to guide you in setting up the correct parameters to establish connection between your devices and the software. The available communica- tion methods are listed below: • TCP/IP...
  • Page 22: Configure Tcp/Ip Connection

    COM KEY Create password for a specific terminal here. The security password known as COM Key is intended for extra security. To conect the terminal with the sofgtware, the COM Key inserted in the Software must be the same as the one inserted in the terminal or else the connection will not be established even though the activation key and product key are correctly inserted. To set the Comm. Key S tep 1: Menu > Comm. > PC Connection > Comm. Key S tep 2: Insert the password by pressing the keypad > OK to Save > ESC to Exit Conf igure TCP/IP connection Internet Protocol (IP) is a unique numeric designation of each device within a network. Without an assigned IP Address, it would make identifying a specific terminal difficult. The default IP address of each terminal is 192.168.1.201. Connect your terminal via a RJ45 (LAN cable) to connect to your local area network. To change the IP address: S tep 1: Menu > Comm. > Ethernet > IP Address > OK S tep 2: Insert the IP Address > Press Down arrow to go to the next column See below to understand every column.
  • Page 23: Configure Cloud Server Connection

    “http://…”, such as http://www.XYYZ.com. tion of domain name. Disable Domain Name > Server Address > IP address of the ADMS server. Disable Domain Name > Server Port > Port used by the ADMS server. Enable Proxy Server > Set the IP address and port number of the proxy server after enabling the proxy. Conf igure WiFi A wireless connection (WiFi) is an available hardware feature in some FingerTec devices. You can link up your devices with the software via a wireless connection. To configure the WiFi connection: S tep 1: Menu > Comm. > Wireless Network > enable WiFi connection > ESC to Save and Exit. S tep 2: Wait for the device to scan the SSID of your WiFi network. S tep 3: Select the SSID of the WiFi network > OK to confirm...
  • Page 24: Rs232/Rs485 Serial Configuration

    OK to turn on. S tep 2: Configure the settings in the page as explained below: • Baudrate: This is the communication speed for the serial connection. RS232 supports up to 115200 bps, while the RS485 supports up to 9600 bps to ensure no loss of data is incurred. Enabling Wiegand Wiegand is used as a bridge between FingerTec devices and 3rd party door Access Con- troller. Please disregard this section if you are not using a 3rd party door Access Control- ler. FingerTec devices supports 26-bits Wiegand data for input and output. Refer to the steps below to pair your FingerTec device with your door controller or reader. To configure the Wiegand input parameters: S tep 1: Menu > Comm. > Wiegand Setup > Select Wiegand In > OK. S tep 2: Configure the Wiegand data settings • Wiegand Format: 26-bits • Wiegand Bits: Specify the number of bits occupied by the Wiegand.
  • Page 25: Ingress Online Activation

    • ID Type: Identifies the content of the data output by Wiegand (User ID and badge number) Ingress Online Activation Ingress is a genuine software by FingerTec. Every FingerTec time attendance model comes bundled with a unique license key. To start using the terminal with Ingress, you must connect the terminal to Ingress and perform an online activation. Ingress reads the serial number of your terminal and sends it for verification at the FingerTec server via the Internet. In case you do not have an Internet connection, you need to do offline activation.
  • Page 26: Connecting The Terminals To Ingress

    Connecting The Terminals to Ingress Determining Terminal Number Identify the number of your terminals to differentiate them between one another. In- gress can connect up to 999 units of terminal. S tep 1: Press Menu > Options > Comm Opt S tep 2: PC Connection > Dev Num > Select the number Using TCP/IP IP address is important, as it is a unique address of the terminal in LAN. Without the IP address, locating the specific terminal is not possible. To input the IP address of the terminal: S tep 1: Press Menu > Comm. > OK to Enter S tep 2: Ethernet > IP Address > Key in IP Address Setting Up Netmask and Gateway Determining the Netmask, Gateway and NetSpeed: For TCP/IP connection, please con- figure the netmask, gateway and netspeed for the terminal.
  • Page 27 Using RS232 Connection For connection via RS232,baudrate is the determinant of communication speed be- tween the terminal and the software. The higher the baudrate, the faster the speed is. To turn on RS232 connection and set the baudrate: S tep 1: Press Menu > Comm. S tep 2: Serial Comm. > RS232 > Turn it On To change baudrate: S tep 1: Press Menu > Comm. S tep 2: Serial Comm. > Baud Rate > Select the baud rate. Using RS485 Connection For connection via RS485, baudrate is also the determinant of communication speed between the terminal and the software but the speed must be according to the speed of theconverter. Check your converter for the speed.
  • Page 28: Pc Connection Communication Key

    PC Connection Communication Key The Comm Key is used as a communication between the device and the PC to protect the security of data. If a Comm Key is set, the connection password must be entered before the device can be connected to the PC software. Set the COMM key to zero: S tep 1: Press Menu > Comm. S tep 2: PC Connection > Comm. Key > Set to 0. • Comm Key: Default Password: 0. The Comm Key may contain 1-6 digits. • Device ID: Select identity number of the device between 1 and 254. Input this device ID if the communication method is RS232/RS485 in the software communication inter- face.
  • Page 29: System

    Chapter 5 System FingerTec devices can be personalised according to preference. These settings include date/time, storage of in-out records and biometric verification rules. You can find the Reset option which allows you to program your devices to default factory settings, un- der this chapter. Setup Date and Time The Date & Time is a very crucial aspect for accurate logging of attendance and the record of door activity in each company. The date and time of the terminal will be dis- played at the home screen. You can choose the date and time format based on your preference.
  • Page 30 To use Daylight Savings Time (DLST) Daylight saving time (DLST) is the practice of temporarily advancing clocks so that the daylight in the afternoon will be longer whereas morning will be shorter. Please disre- gard this if DLST does not apply to your country. To set the DLST settings: S tep 1: > Date & Time > Daylight Saving Time > Press Menu > System Press OK to enable S tep 2: Select Daylight Saving Mode > Select either By date/time or By week/day > Configure details in Daylight Saving Setup By Date/Time: This option is recommended if you know the exact date the DLST begins. For example, if company A wants to set the DLST to begin from May 3rd 22:15 hour and ends on July 10th 11:15 hour, this setting should be chosen. S tep 1: Set the month and date for the DLST to begin S tep 2: Set the time (in HH.MM format) on when the DLST will begin. S tep 3: Set the month and date for the DLST will end. S tep 4: Set the end time of the DLST period.
  • Page 31: Access Log Settings

    Access Log Settings Press Menu > System > Access Logs Setting • Camera Mode: 5 modes to capture and save snapshot images during verification: No Photo: No photo will be taken during user verification. Take photo, no save: Photo will be taken but will not be saved during verification. Take photo and save: Photo will be taken and saved during verification. Save on successful verification: Photo will be taken and saved for each successful veri- fication. Save on failed verification: Photo will be taken and saved during each failed verification. • Display User Photo: Options to display the user photo whenever a user passes verifica- tion. • Access Logs Warning: Display automatic remaining record memory warning when the record space reaches a set value. Select to disable or set a valid value between 1 and 9999. • Circulation Delete Access Records: Set to automatically delete a set value of old access records once the access records have reached its full capacity. Select to disable or set a valid value between 1 and 999. • Cyclic Delete ATT Photo: Set to automatically delete a set value of old attendance pho- tos once the attendance photos have reached its full capacity. Select to disable or set a valid value between 1 and 99. • Cyclic Delete Blacklist Photo: Set to automatically delete a set value of blacklisted pho- tos once the blacklisted photos have reached its full capacity. Select to disable or set a valid value between 1 and 99. • Confirm Screen Delay(s): Set a valid value between 1-9s for the length of time to display the message of successful verification. • Face Comparison Interval(s): Set the facial template matching time interval as per re- quired. Valid value ranges between 0-9s. Attendance Record Storage Option Each time a verification is performed on the device, a transaction log will be stored inside the terminal. These logs need to be managed to maintain the effectiveness of the devices. However, you can only setup rules to control attendance capturing and storage. Press Menu > System > Attendance > Select type of rules to configure...
  • Page 32 Display User photo You can set the device to display a photo of the employee after a successful verification. A success verified indicator will appear on the screen after his/her ID and name has been verified. You can transfer photos from the software to the device. This should be enabled if you would like the device to display the employees’ photo on screen. Alphanumeric User ID You can set employee IDs with alphanumeric entry for example, ENG1003 represents staff ID 1003 from the Engineering Department. This alphanumeric ID recommended for large organizations with multiple departments.The person in charge will know which department the employees belong to by referring to their ID. Only enable this if your company intends to separate employees from different departments. Attendance Log Alert You can set the device to prompt an alert message on screen every time it verifies an employee when its storage is approaching the limit. The value ranges from 1 to 99 (transaction counts). The device will always delete earlier records to free up space to save the latest record (FIFO, first in first out), if storage is full. By default, the value is 99.
  • Page 33: Fingerprint Options

    Fingerprint Options Threshold is the level of security during a fingerprint verification process. Threshold de- termines how many percent of minutiae points on a fingerprint template will be read by the system. The higher the threshold level means the device will require additional minutiae points to verify an employee. Thus increasing its security. There are 2 sets of Threshold settings for different verification process: • 1:1 Matching Threshold Value: 1:1 match is where one verification method is matched to only one template. Employee presses keypad to insert his/her ID followed by OK button and fingerprint verification • 1:N Matching Threshold Value: 1:N (many) match is where the verification is compared against N templates. Employee presses finger on the scanner to verify. • High Security: If high security is intended, the threshold value must be set to high. Do take note that if the threshold value is set to high, users may be inconvenienced due to the requirement may need multiple verifications of the fingerprint. For example: If security level is set to high, the chances of identifying the wrong person will be very low. However, you need to verify for a few times before your credentials are verified. • Normal: This is the default setting where both the security and convenience level are in balance. • Low Security: If high convenience is intended, the threshold value must be set to low. Do take note that if convenience level is high, the security level will be low, thus the chances of inaccurate identification will be high. Below is the table for ease of setting. Types High Security Normal Low Security • FP Sensor Sensitivity: You can set the sensitivity of the fingerprint prism to respond to the employee when he/she places finger on it. The default value is set at Medium. However, when the environment is dry, it is recommended to set the sensitivity to high and set to low if the environment is humid.
  • Page 34: Fingerprint Image

    • 1:1 Retry Times: You can set the maximum number of attempts for 1:1 fingerprint verification or password verification. The device will trigger an alarm system when the limit has been reached. Note: Both algorithms are not compatible with each other. Fingerprint Image Select to display the fingerprint image on the screen. Four choices are available: • Show for enroll: Display the fingerprint image on the screen only during enrollment • Show for match: Display the fingerprint image on the screen only during verification. • Always show: To display the fingerprint image on screen during enrollment and veri- fication. •...
  • Page 35 • Image Quality Image quality for facial registration and comparison. The higher the value, the clearer the image requires. • Minimum Face Size The required size for facial registration and comparison. The object will not be filtered or recognized if the size of an object is smaller than this set value. This value can be understood as the face comparison distance. Stand and adjust a moderate distance to ensure the device captures the right face for comparison and algorithm processes. If the value is 0, the face comparison distance is not limited. • LED Light Triggered Threshold Change to control the on and off of the LED light. The greater the value, the more fre- quently the LED light will be turned on. • Motion Detection The measurement of the potential motion detection that wakes the terminal from stat- ic motion to the comparison interface. The greater the value, the higher sensitivity level the system would be. A larger value set can trigger the interface much easier and more frequently. • Live Detection Determine if the source of a biometric sample. Prevent a spoof attempt using visible light images. • Live Detection Threshold Set value to judge the visible image comes from an alive body. The greater the value, the better the visible light anti-spoofing performance. • Anti-counterfeiting with NIR Identify and prevent fake photos and videos attack using near-infrared spectra imag- ing. • Wide Dynamic Range (WDR) Balance light and extend image visibility under high contrast lighting scenes; Improve object detection under bright and dark environments. • Anti-flicker Mode Can be used when WDR is turned off. Reduce flicker when the device screen is flashing at the same frequency as the light.
  • Page 36: Palm Parameters

    Palm Parameters Press Menu > System > Palm • Palm 1:1 Matching Threshold Only if the similarity between the verifying palm and the user’s registered palm is greater than this value to attain successful verification. • Palm 1:N Matching Threshold Only if the similarity between the verifying palm and the user’s registered palm greater than this value to attain successful verification. Reset Options In an event you want to restore the terminal back to the factory settings. To reset options setting: Menu > System > Reset > Press OK. A confirmation window will prompt you before the terminal is reset. Ensure that you are certain of performing the task before proceeding to avoid irreversible data loss.
  • Page 37: Personalization

    Chapter 6 Personalization You can manage the display style of your FingerTec device according to your prefer- ence. These include the user interface, voice, bell schedules, punch state options, and shortcut key mapping. User Interface The user interface is designed as such so that users can interact with the device. These include the appearance of the device, response time, and the content that is presented to the user. To setup the display of the User Interface: Go to Menu > Personalize > User Interface > Press OK to Enter > Press arrow and OK but- ton to enable or disable the options: • Wallpaper: You can choose which wallpaper to be displayed on the screen • Language: There are 8 languages preloaded into your device. Select the language that fits your environment •...
  • Page 38: Voice

    Voice You can choose to enable or disable the voice prompts, keyboard sound or adjust the volume of the device. To enable or disable the options: Go to Menu > Personalize > Voice > Press OK to Enter > Press arrow and OK button • Voice Prompt: You can choose to disable or enable the voice greetings or feedback during the operations. • Keyboard Prompt: You can choose to enable or disable the beeping sounds when pressing on the keys • Volume: You can adjust the volume of the voice greetings/feedback and keyboard beeps Bell You can schedule the device to ring automatically during specific times. This is a re- minder to alert the employees to start/end work, start/end of break time etc.
  • Page 39: Punch State Options

    Punch State Options In the event you want your employees to press a button to confirm his/her attendance status (for example Check-In, Break starts etc) you will need to set the punch state from your keyboard’s F1 to F8 buttons. Punch State Mode Set the display of the status keys: Go to Menu > Personalize > Punch State Options > Press OK > Punch State Mode > Select one from below: • Off: To disable the punch state key function. Employees are not required to press any buttons to report their attendance. The screen will not display any Status key. Short- cut Key Mappings menu will also become invalid • Manual Mode: Switch the punch state key manually, and the punch state key will dis- appear after Punch State Timeout. • Auto Mode: Once this mode has been chosen, set the punch state key’s switching time in Shortcut Key Mapping. The set punch state key will be switched automatically when the switching time is reached.
  • Page 40: Shortcut Key Mappings

    Shortcut Key Mappings You can assign six shortcuts as attendance or functional keys. On the main interface, when the shortcut keys are pressed, the corresponding attendance status or function interface will display. To shortcut key mappings setting: Go to Menu > Personalize > Shortcut Key Mappings > Press OK to Enter > Select the appropriate key by pressing the down arrow > Press OK to choose the corresponding action Note: When the Attendance Status shortcut key is selected, you can also set the ‘Auto Switch’ parameter (refer to page 37 regarding Auto Mode).
  • Page 41: Data Manager

    Chapter 7 Data Manager Data stored in the terminal can be utilized to establish management rights or have spe- cific logs removed. To manage your data: Go to Menu > Data Management > Press OK to Enter Delete Data Data stored in the terminal can be deleted within your Data Management function. Be- low is a list of available options in your terminal: • Delete Attendance Data: Delete all attendance records. • Delete Attendance Photo: Delete all employees’ attendance images. • Delete Blacklist Photo: Delete photos of employees’ captured during a failed verifica- tion attempt. • Delete All Data: Delete data related to face & fingerprints templates, IDs, passwords, card ID and attendance records. • Delete Access Control: Delete access control records. • Delete Admin Role: Removes administrator privileges in your terminal. All employees who had the privilege will identify as a normal user. • Delete User Photo: Delete all photos. • Delete Wallpaper: Delete all saved wallpapers. • Delete Screen Savers: Delete screensavers. Select Delete All or Delete by Time Range when deleting access records, attendance photos or blacklisted photos. Please ensure to set a specific time range to delete all data with the period if you select Delete by Time Range.
  • Page 42 To setup the Access Control: Press Menu icon > Access Control > Access Control Options • Gate Control Mode Select to turn on the gate control mode. If ON is selected, the interface will remove the Door lock relay, Door sensor relay and Door sensor type function. • Door Lock Delay(s) This value is the time period for the door to lock again after it unlocks on successful verification. Valid value: 1-10s; 0s represents function disabled. • Door Sensor Delay(s) This function only works if the door sensor is available. When a door is not closing for a specified time, the sensor will trigger the alarm system. Specify the time of the delay. The valid value of Door Sensor Delay ranges from 1 to 255 secs. Choose your preference. • Door Sensor Type There are three types of door sensor available for door access which are None, Nor- mal Open (NO), and Normal Closed (NC). Once a door sensor is available, you have to choose the door sensor type. Dault is None. • Verification Mode The supported verification mode includes password/face, User ID only, password, face only, and face + password. • NC Time Period To set the time period for Normal Closed mode, so that no one can gain access dur- ing this period. • NO Time Period To set the time period for Normally Open, so that the door is always unlocked during this period.
  • Page 43: Time Zone

    Time Zone Time Zone is the minimum time period of access control settings, there are 50 Time Zone can be set for the system. Each Time Zone consistof 7 time period section(a week), and each time period section is the valid time for access within 24 hours To setup the Time Zone Press Menu icon > Access Control > Time Zone Step 1: Tap the input box of Search Rime Zone. Step 2: Enter the number of the time zone (50 in total) to be searched. Step 3: Tap the date on which time zone setting is required. Step 4: Press Up and Down to se the start and end time, then press Confirem (OK) Note: 1. Valid Time Zone: 00:00 ~ 23:59 (Whole day valid) or when the end time is greater than the start time 2. Invalid Time Zone: When the end time is smaller than the start time 3. The default time zone 1 indicates that Device’s Door is open all day long...
  • Page 44 Combined Verification Settings Strengthen the security by arranging the access groups into different door-unlocking combinations. This can be achieved via multiple verifications. Door-unlocking combination: Range of the combined number N is: 0 ≤ N ≤5, and the N amount of members may belong to one or more than one different access groups. Go to Menu > Access Control > Combined Verification Examples, If the door unlocking combination 1 is (01 03 05 06 08), this combination has a total of 5 users. These users are 5 individuals from 5 different access control groups (AC group 1, group 3, group 5, group 6 and group 8, respectively). If the door unlocking combination 2 is (03 05 08 00 00), this combination has a total of 3 users. Users are from AC group 3, AC group 5, and AC group 8. To delete a door-unlocking combination Set all group numbers to 0 in order to delete the door-unlocking combinations. Anti-passback Setup This function is optional and can be activated to resolve existing security problems. Often, users may be followed by some outsiders while entering the door and these out- siders are without verification. This setup can make sure the all check-in record matches the check-out record with traceable door access activities. To enable this function, two devices must work together: A master device and a slave device must be installed at the inside and the outside of the door. Two devices com- municate via the Wiegand signal. The Wiegand format and Output type (User ID/Badge Number) adopted by the master device and slave device must be consistent. To enable the Anti-passback Setup: Press Menu icon > Access Control > Anti-passback Setup • No Anti-passback: By disabling this function, all successful verification via master or slave device can unlock the door. The attendance state is not saved. •...
  • Page 45: Duress Options Settings

    • In/Out Anti-passback: The user can check-in if only the last status in record is a check- out; the user can check-out if only the last status in record is a check-in; otherwise, the alarm will be triggered. Duress Options Settings By activating the duress verification function with specific authentication method(s), the device will still unlock the door, however, a signal will be sent to trigger the alarm if a user is performing authentication under coercion. To enable the Duress Options Settings: Press Menu icon > Access Control > Duress Options • Alarm on Password: An alarm signal will be generated whenever a user uses the pass- word verification method. • Alarm Delay(s): Alarm signal will not be transmitted until the alarm delay time is elapsed. Valid value ranges from 1 to 999s. • Duress Password: Key in 6-digit duress password. This duress password will send out an alarm signal whenever a user enters it. Access Group Setting To define group and time period for registered users: Step 1: Menu > Access Control Role > Access Group Step 2: Menu > Access Control Role > Time Period User access control allocates the group and the time period that a user belongs to.
  • Page 46: Attendance Search

    Chapter 8 Attendance Search The device stores attendance records, which can be processed by our software to pro- duce payroll calculations and other reports. This search function is an easy to use mod- ule that allows you to check and browse records at your convenience at any time. You can choose to display photos together with attendance records. To use this browser: Go to Menu > Attendance Search > Press OK > Insert the user ID to search (leave blank if you want to see all employees) > Press OK > Select the time range from the list or enter specific date and time at the User Defined > Press OK to see all records...
  • Page 47: Work Code

    Chapter 9 Work Code A majority of FingerTec Terminals is incorporated with a feature which allow users to select a reason for re-entry during verification by selecting a work code (for example, work code 13 – Onsite at Customers). Adding a Work Code By default, our terminals does not contain any workcodes. To add a workcode: Go to Menu > Work Code > New Work Code > Key in the workcode • ID: The work code ID supports 1 digit to 8 digits in length. • Name: Short description of the work code. All Work Codes All work codes can be viewed, deleted or edited (with the exemption of modifying the ID number) in the All work codes tab. The process of editing a work code is similar to adding a work code as explained in 10.1. To view all work codes: Go to Menu > Work Code > All Workcodes > Select the Workcode > Press OK to Select either to Edit or Delete the selected Work Code. Work Code Options The option to use work codes must be enabled before it can be utilized. To turn on Work Code: Go to Menu > Work Code > Work Code Options > Work Code Required > Press OK to turn it ON Note: If you wish to bar employees from entering new workcodes during verifi- cation, you must enable the function “Work Code must be defined”. The termi- nal will reject work codes it cannot match to in its current list.
  • Page 48 Chapter 10 Diagnostic The Diagnostics page allows you to analyze the condition of your terminal(s) by utiliz- ing a series of tests. Only administrators are authorized to perform these tests. To view the status of your terminal, you can select Go to Menu > Autotest: Autotest To automatically test whether all modules in the device function properly, which in- clude the LCD, audio, camera and real-time clock (RTC). All Test Autotest whether the LCD, audio, camera and ETC are normal. Test LCD Autotest the display effect of the LCD screen by displaying full-colour, pure white, and pure black. Test Voice Autotest the voice quality of the audio files and if they are of completed versions. Test Fingerprint Sensor Examine the clarity of the acquired fingerprint image by pressing a finger on the scan- ner. The fingerprint image will display on the screen. Camera Testing Examine the proper camera functions by checking the clarity of the taken pictures. Test Clock RTC Test the RTC. To examine if the clock works normally and accurately with a stopwatch.
  • Page 49 Chapter 11 System Info This option allows you to check your terminals storage, firmware, algorithm etc. To access your system information: Go to Menu > System Info Device Capacity The number of enrolled users, administrator, passwords, total fingerprint and attend- ance records will be displayed. Device Info The Device name, serial number, MAC address, Fingerprint Algorithm, Platform Informa- tion, MCU version, Manufacture and Manufactured Date and Time will be shown in this section. Firmware Info The Firmware version, Bio Service, Push Service, Standalone Service and Dev Service is available from this tab.
  • Page 50 You are not the administrator of this terminal. Only an authorized administra- tor of the system is allowed to access the Menu. Any attempt of normal user to access the Menu will prompt “Admin Affirm” message on the screen. In case the administrator or he/she has resigned from the company, kindly contact your FingerTec authorized reseller to access the terminal. Difficult to Read Finger Five things could be the cause of this: Enrolment is not properly done Enrolment is the most important process to ensure that the terminal captures the best quality of your fingerprints. Refer to chapter 3 for how to do a good...
  • Page 51 “Duplicate Finger” Appears FingerTec terminals are intelligent. It will not accept the same fingerprint twice into its system. If you have registered a finger into the terminal, the system would prompt “duplicate finger” when you try to enroll that finger for another time. Choose a different finger to proceed. RFID Card Doesn’t Respond Two possibilities for this problem Have you registered the card to the terminal? The card must be registered to the terminal before it can read the information in the card. Refer to chapter 3 User for card enrolment.
  • Page 52 w w w . t i m e t e c c l o u d . c o m © 2020 Timetec Computing Sdn Bhd. All rights reserved • 072020...

Table of Contents

Save PDF