Table of Contents

Advertisement

Quick Links

USER MANUAL
ProBio & ProFAC
Version: 1.2
Date: June, 2016
Contents
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Green Label ProBio and is the answer not in the manual?

Questions and answers

Summary of Contents for ZKTeco Green Label ProBio

  • Page 1 USER MANUAL ProBio & ProFAC Version: 1.2 Date: June, 2016 Contents...
  • Page 3 About This Manual  This manual introduces the operation of user interfaces and menu functions of the facial Access Control terminal.  The pictures in this manual may not be exactly consistent with those of your product; the actual product's display shall prevail. ...
  • Page 5: Table Of Contents

    Contents 1 Guidance Notes ................................1 1.1 Operating Environment of the Device ....................1  1.2 Method of Pressing Fingerprint ......................1 1.3 Cautions for Using Face Recognition Device ..................2 1.4 Verification Modes ............................3 1.4.1 1:N Fingerprint Verification ......................3 1.4.2 1:1 Fingerprint Verification ......................
  • Page 6 8.1 User Interface Settings ..........................29 8.2 Voice Settings ............................... 30 8.3 Bell Settings ..............................30 8.3.1 Adding a New Bell .......................... 30 8.3.2 Editing a Bell ............................. 31 8.3.3 Deleting a Bell ..........................31 9 Data Management ..............................32 9.1 Deleting Data ..............................
  • Page 7: Guidance Notes

    1 Guidance Notes 1.1 Operating Environment of the Device 1) Recommended Installation Position: √ Recommended installation position (as shown in the left figure): Install the device in an indoor position which is three meters far from the window and door, and two meters far from the lamp source, with illuminance of ambient light source being 0~800 LUX.
  • Page 8: Cautions For Using Face Recognition Device

    Slanted Too Low Please use the correct method of pressing fingerprint for registration and verification. Our company does not undertake the responsibility for the lowered verification performance caused by user’s improper operation. The rights to final interpretation and amendment are reserved.
  • Page 9: Verification Modes

    2. Facial Expression and Stance  NOTE: During enrollment and verification, keep the facial expression and stance natural. 3. Registration and Verification During registration, it is required to adjust your upper body to fit your eyes into the green frame on the screen.
  • Page 10: 1:1 Fingerprint Verification

    Successfully verified Verification Fails 1.4.2 1:1 Fingerprint Verification Under this fingerprint verification method, a fingerprint collected by the sensor is verified with the fingerprint corresponding to the entered user ID. Please use this method when difficulty is encountered in 1:N fingerprint verification. Successfully verified Failed to verify Press...
  • Page 11: 1:N Face Verification Attendance

    Press the key icon to Successfully verified Failed to verify Press to enter user ID enter the password 1.4.4 1:N Face Verification Attendance In this method, the facial image captured by the camera is compared with all facial data in the device. Conduct comparison in the correct Successfully verified way on the main interface...
  • Page 12: Card Verification

    1.4.6 Card Verification  NOTE: Card function is optional, only products with a built-in card module are equipped with card verification function. Please contact our technical support as required. 1. Swipe the card above the card reader (the card must be registered) 2.
  • Page 13: Initial Interface

    1.5 Initial Interface Date and Time Network Connection Bell Tamper Alarm Auxillary Input Time Menu 1:1 Verification mode 1. Date and Time: The current date of the device is displayed. 2. Bell: An alarm is set for the device if this icon is displayed. 3.
  • Page 14: Main Menu

    2 Main Menu User Mgt.: To manage basic information of registered users, including user ID, user name, user role,   fingerprint , face, badge (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), password, user photo and access control role. User Role: To set user roles for accessing into the menu and changing settings.
  • Page 15: Date / Time Settings

    3 Date / Time Settings In the initial interface, press > System > Date Time to enter the date/time setting interface. It includes setting date, time, 24-hour clock / 12-hour clock, date format and daylight saving time. When resetting to factory settings, the date format can be restored (YYYY-MM-DD). ...
  • Page 16: User Management

    4 User Management 4.1 Adding a User Including adding super admin and normal user to user roles. > User Mgt. > New User to enter New User setting interface. Settings In the initial interface, press include inputting User ID, name, choosing User Role (Normal User / Super Admin), registering Fingerprint, face and badge number (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), setting Password, taking User Photo and setting access control role.
  • Page 17: Setting Access Control

    4.2 Setting Access Control User access control option is to set open door access aimed at everybody, including access group setting, using time period, duress fingerprint management. Access group: To allocate users to different access control groups for management. By default, new users belong to Group 1 and can be reallocate to other groups.
  • Page 18: Editing A User

    > User Mgt. > All Users to enter All Users interface. Input “User ID” in In the initial interface, press , the corresponding user will be shown. The above figure shows the search interfaces of an user with user ID “1”. 4.4 Editing a User and [Edit] to enter user editing interface.
  • Page 19: Deleting A User

    4.5 Deleting a User After a user is chosen through 4.3 Searching User, press [M/OK] and Press [Delete] to enter user deleting interface. Or in the initial interface press > User Mgt. > All Users > Search a user > Delete to enter user deleting interface.
  • Page 20: User Display Style

    4.6 User Display Style > User Mgt. > Display Style to enter Display Style setting interface. In the initial interface, press Several Display Styles are shown as below: Single Line Style Multiple Line Mixed Line ProBio & ProFAC User Manual...
  • Page 21: User Role

    5 User Role Setting user rights for operating the menu (a maximum of 3 roles can be set). When user role is enabled, in [User Mgt.] > [New User] > [User Role], you can allocate suitable user role to each user. Role: Super user needs to allocate different rights to new users.
  • Page 22: Comm. Settings

    6 Comm. Settings 6.1 Ethernet Settings > Comm. > Ethernet to enter the Ethernet setting interface. In the initial interface, press The parameters provided below are the factory default values, please adjust them according to the actual network situation. IP Address: 192.168.1.201 Subnet Mask: 255.255.255.0 Gateway: 0.0.0.0 DNS: 0.0.0.0...
  • Page 23: Pc Connection

    Select Serial Comm Select RS232/485 In the initial interface, press to enter main menu, and select Comm. Select RS485 Select RS485 as the function of “master unit” or choose to disable RS485  NOTES: When RS485 is used as the function of “master unit”, the device will act as “master unit”, and it can be connected to RS485 fingerprint reader.
  • Page 24: Adms Settings

    In the initial interface, press > Comm. > PC Connection > Comm Key to enter the Comm Key setting interface. Comm Key: The default password is 0 (no password). Comm Key can be 1~6 digits and ranges between 0~999999. Device ID Settings ...
  • Page 25: Wiegand Setup

    In the initial interface, press [M/OK] > Comm. > ADMS to enter the ADMS server setting interface. When the Webserver is connected successfully, the main interface will display the logo. Enable Domain Name: When this function is turned on, the domain name mode http://... will be used, such as http://www.XXX.com.
  • Page 26 Press [Wiegand Input] to enter Wiegand Input interface. Wiegand Format: User can choose among the following built-in Wiegand formats: Wiegand 26, Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and Wiegand 50. Pulse Width (us): The width of pulse sent by Wiegand card reader. The default value is 100 microseconds, which can be adjusted within the range of 20 to 100 microseconds.
  • Page 27: Wiegand Output

    to 18 bits, while the 36 bit is the even parity bit of the 19 to 35 bits. The 2 to 17 bits are the device code, the 18 to 33 bits are the card number, and the 34 to 35 bits are the manufacturer code.
  • Page 28: Card Format Detect Automatically

    Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and Wiegand 50. Multiple selections are available, but the actual Wiegand format will depend on the option in [Wiegand output bits]. For Example: If the 26-bit Wiegand26, 34-bit Wiegand34a, 36-bit Wiegand36, 37-bit Wiegand37a and 50-bit Wiegand50 are chosen in [Wiegand Format], but 36 bits is selected in [Wiegand output bits], then the actual Wiegand format for use will be 36-bit Wiegand36.
  • Page 29 > Comm. > Wiegand Setup > Card format detect automatically to In the initial interface, press enter the Card format detect automatically interface. Operating Procedure: After entering the [Card Format Detect Automatically] interface of an ID device, swipe the ID card above the card reader (on the local device or auxiliary card reader), the interface will show the automatically detected Wiegand formats and the analyzed card numbers.
  • Page 30: System Settings

    7 System Settings 7.1 Access Logs Settings In the initial interface, press > System > Access Logs Setting to enter Access Logs Setting interface. Camera Mode: To set whether to take and save photos in verification; applicable to all users. The following 5 modes are included: 1.
  • Page 31: Face Parameters

    range is 1-9 seconds. 7.2 Face Parameters > System > Face to enter the Face setting interface. In the initial interface, press 1:1 Match Threshold: Under 1:1 Verification Method, verification succeeds only when the similarity between the verifying face and the user’s registered face is greater than threshold value. 1:N Match Threshold: Under 1:N Verification Method, verification succeeds only when the similarity between the verifying face and all registered faces is greater than threshold value.
  • Page 32: Fingerprint Parameters

    7.3 Fingerprint Parameters In the initial interface, press > System > Fingerprint to enter the Fingerprint setting interface. 1:1 Match Threshold: Under 1:1 Verification Method, verification succeeds only when the similarity between the verifying fingerprint and the user’s registered fingerprint is greater than threshold value. 1:N Match Threshold: Under 1:N Verification Method, verification succeeds only when the similarity between the verifying fingerprint and all registered fingerprints is greater than threshold value.
  • Page 33 > System > Reset > OK to finish the reset setting. In the initial interface, press Reset parameters include Access Control Options, Anti-passback Setup, communication setting (namely, the setting of Ethernet, Serial Comm., PC Connection and Wiegand Setup), Personalize (such as Voice Prompt, Keyboard Prompt, Volume and Idle Time To Sleep) etc.
  • Page 34: Usb Upgrade

    remain unchanged after resetting to factory settings. 7.5 USB Upgrade Insert the U disk with upgrade file into the device’s USB port, and in the initial interface, press > System > USB Upgrade to complete firmware upgrade operation. If upgrade file is needed, please contact our technical support. Firmware upgrade is not recommended under normal circumstances.
  • Page 35: Personalization Settings

    8 Personalization Settings 8.1 User Interface Settings In the initial interface, press > Personalize > User Interface to set User Interface. Wallpaper: Select the wallpaper of main screen as required, you can find wallpapers of various styles in the device. Language: Select the language of device as required.
  • Page 36: Voice Settings

    8.2 Voice Settings In the initial interface, press > Personalize > Voice to enter the Voice settings interface. Voice Prompt: Select whether to enable voice prompts during operation. The default value is [ON], indicating that voice prompt is enabled. And the icon [OFF] indicates that voice prompt is disabled. Touch Prompt: Select whether to enable voice while touching the screen.
  • Page 37: Editing A Bell

    Repeat: To set whether to repeat the bell from Monday to Sunday. Ring Tone: Ringtone played for bell. Interval bell delay (s): To set the ringing length. The value ranges from 1 to 999 seconds. 8.3.2 Editing a Bell In the initial interface, press >...
  • Page 38: Data Management

    9 Data Management 9.1 Deleting Data To manage data in the device, which includes delete access records, delete all data, delete admin role and delete screen savers etc. > Data Mgt. > Delete Data to enter the Delete Data settings interface. In the initial interface, press Delete access records: To delete all access records saved in the device or delete access records in specified time range.
  • Page 39: Data Backup

    Delete Access Control: To delete all access records. Delete User Photo: To delete all user photos in the device. For details of uploading user photo, please refer to 16.3 Image Uploading Rule. Delete Wallpaper: To delete selected or all wallpapers in the device. Operating Procedure: 1.
  • Page 40: Data Restoration

    Press [Backup Notes] Input backup notes Backup completely 9.3 Data Restoration To restore the data in the device or U disk to the device. > Data Mgt. > Restore Data > Restore from USB Disk to enter the In the initial interface, press Restore Data settings interface.
  • Page 41: Access Control

    10 Access Control Access Control option is used to set the Time Rule, Holidays, Combined Verification etc., the related parameters for the device to control the lock and other devices. To gain access, the registered user must meet the following conditions: 1.
  • Page 42 The time period is the Door Sensor Delay (value ranges from 1 to 255 seconds). Door Sensor Type: It includes None, Normal Open (NO) and Normal Close (NC). None means door sensor is not in use; Normal Open means the door is opened when power is ON; Normal Close means the door is closed when power is ON.
  • Page 43: Time Rule Settings

    is being dismantled. Reset Access Setting: To reset parameters of door lock delay, door sensor delay, door sensor type, verification mode, door available time period, NO time period, auxiliary input configuration, speaker alarm, anti-passback direction,. However, the content of the Access Data deletion in [Data Mgt.] will not be affected.
  • Page 44 > Access Control > Time Rule Setting to enter the Time Rule Setting In the initial interface, press interface. The default Time Rule No. is 1 (whole-day valid), which can be edited. Editing a Time Rule  A super administrator may edit time rules as needed. The detailed operation is as follows: Start Time End Time Input time rule number (such Select “Time Period 1/2/3”...
  • Page 45: Holiday Settings

    10.3 Holiday Settings Add access control holidays for the device and set time periods on holidays as needed. The device controls the access control on holidays according to the holiday settings. In the initial interface, press > Access Control > Holidays to enter Holidays setting interface. 10.3.1 Adding a Holiday Press [Add Holiday] Press [Date]...
  • Page 46: All Holidays

    Looping or not: The default value of Looping or not is [ON]. For fixed holidays every year, for example, the New Year's Day is January 1, Looping or not can be set to [ON] for them. For unfixed holidays every year, for example, the Mother's Day is the second Sunday of May, the specific dates are uncertain and Looping or not can be set to [OFF] for them.
  • Page 47  NOTE: Access groups are set when adding user (in the initial interface, press > User Mgt. > New User > Access Control Role > Access Group, to set the access group number to which the added user belongs ), the access group number ranges from 1 to 99. >...
  • Page 48 As the above figure, Combined Verification 3 is made up of five members, and all of them come from Access Group 9. As the above figure, Combined Verification 4 is made up of three members coming from three different groups -- Access Group 3, 5, 8 respectively. Deleting a Combined Verification To delete a Combined Verification, set all access group numbers to 0.
  • Page 49: Anti-Passback Settings

    Anti-passback Settings 10.5 To avoid some persons following users to enter the door without verification, resulting in security problem, users can enable anti-passback function. The check-in record must match with check- out record so as to open the door. This function requires two devices to work together: one is installed inside the door (master device), the other one is installed outside the door (slave device).
  • Page 50: Usb Manager

    11 USB Manager User data, user portrait, access records and other data can be exported to relevant software for processing through a USB disk, or import user data to the device by using a USB disk.  NOTE: Before uploading/downloading data from/to the USB disk, insert the USB disk into the USB slot first.
  • Page 51 In the initial interface, press > USB Manager > Upload to enter the USB Upload interface. User Data: To upload all the user information and fingerprints from USB disk into the device. User Portrait: To upload user photos from USB disk into the device. Select [Upload Selected Picture] or [Upload All Pictures] when uploading user portraits, for details of uploading user portraits, please refer to 16.3 Image Uploading...
  • Page 52: Records Search

    12 Records Search When users verify successfully, records are saved in the device. This function enables users to check access records, attendance photo and blacklisted photo. 12.1 Searching Access Records Press [Access Records] Input user ID (query all data Press and select [Attendance Search] without input)
  • Page 53: Searching Attendance Photo

    12.2 Searching Attendance Photo Press [Attendance photo] Input user ID (query all data Select time range to be searched without input) The corresponding attendance photos will then be shown 12.3 Searching Blacklist ATT Photo Press [Blacklist ATT photo] Select time range The corresponding blacklist ATT photos will be shown ProBio &...
  • Page 54: Autotest

    13 Autotest To automatically test whether all modules in the device function properly, which include the LCD, voice, fingerprint sensor, camera and RTC (Real-Time Clock). In the initial interface, press > Autotest to enter the Autotest interface. Test All: To test LCD, voice, fingerprint sensor, camera and RTC. During the test. Test LCD: To test the display effect of LCD screen by displaying full color, pure white, and pure black to check whether the screen displays colors properly.
  • Page 55: System Information

    14 System Information Check data capacity, device and firmware information. > System Info to enter the System Info interface. In the initial interface, press Device Capacity Device Info Firmware Info Device Capacity: To display the number of registered users, administrators, passwords, fingerprints, face, badges, records, attendance photos, blacklist photos and user photos.
  • Page 56: Troubleshooting

    15 Troubleshooting  Fingerprint sensor is not able to read and verify the fingerprint effectively. Check whether the finger is wet, or the fingerprint sensor is wet or dusty.  Clean the finger and the fingerprint sensor and try again. ...
  • Page 57: Appendices

    16 Appendices 16.1 Photo ID Function When the Photo ID function is enabled, and the user passes verification, not only the information of user ID and name will be displayed, but also the photo registered by the user or saved in the USB disk will be shown.
  • Page 58: Wiegand 26 Introduction

    Subcommittee affiliated to the Security Industry Association (SIA). It is a protocol used for contactless IC card reader port and output. The protocol defines the port between the card reader and controller which are widely used in access control, security and other related industries. This has standardized the work of card reader designers and controller manufacturers.
  • Page 59: Wiegand 34 Introduction

    Field Description The even parity check bit is determined by bits 2-13. If there is an even Even parity check number of 1's, the even parity check bit is 0. If there is an odd number of 1's, the even parity check bit is 1. User ID/Card User ID/Card number (card code, 0-16777215) and bit 2 indicates the most...
  • Page 60 33 34 Even parity parity User ID/Card number check bit check bit The following table describes the fields. Field Description The even parity check bit is determined by bits 2-17. If there is an Even parity check bit even number of 1's, the even parity check bit is 0. If there is an odd number of 1's, the even parity check bit is 1.
  • Page 61: Image Uploading Rule

    Image Uploading Rule 16.3 1. User photo: It is required to create a file named as “photo” under the USB disk file, and put user photos into the file. The capacity is 3000 images, with each of them not exceeding 15k. The image name is x.jpg (x is the actual user ID, max.
  • Page 62: Anti-Passback Settings

    16.4 Anti-passback Settings To avoid some persons following users to enter the door without verification, resulting in security problem, users can enable anti-passback function. The check-in record must match with check-out record so as to open the door. This function requires two devices to work together: one is installed inside the door (master device) and the other one is installed outside the door (slave device).
  • Page 63 When Out Anti-passback is set for a user on the master device, the last record of the user must be a check-in record if the user needs to check in/out freely. Otherwise, the user cannot check out and the check-out request of the user is rejected because of anti-passback. For example, if the recent first record of a user is a check-in record, the second record of the user can be either a check-in or check-out record but the third record must be based on the second record, ensuring that the check-in record matches the check-out record.
  • Page 64 Master device Slave device IWD0 <-----> IWD1 <-----> <-----> ProBio & ProFAC User Manual...
  • Page 65: Statement On Human Rights And Privacy

    16.5 Statement on Human Rights and Privacy Dear Customers: Thank you for choosing the hybrid biometric products designed and manufactured by us. As a world-renowned provider of biometric technologies and services, we pay much attention to the compliance with the laws related to human rights and privacy in every country while constantly performing research and development.
  • Page 66: Environment-Friendly Use Description

    16.6 Environment-Friendly Use Description The Environment Friendly Use Period (EFUP) marked on this product refers to the  safety period of time in which the product is used under the conditions specified in the product instructions without leakage of noxious and harmful substances. ...
  • Page 67 ZK Building, Wuhe Road, Gangtou, Bantian, Buji Town, Longgang District, Shenzhen China 518129 Tel: +86 755-89602345 Fax: +86 755-89602394 www.zkteco.com © Copyright 2014. ZKTeco Inc. ZKTeco Logo is a registered trademark of ZKTeco or a related company. All other product and company names mentioned are used for.

This manual is also suitable for:

Green label profacProbio

Table of Contents