Page 3
About This Manual This manual introduces the operation of user interfaces and menu functions of the facial Access Control terminal. The pictures in this manual may not be exactly consistent with those of your product; the actual product's display shall prevail. ...
Contents 1 Guidance Notes ................................1 1.1 Operating Environment of the Device ....................1 1.2 Method of Pressing Fingerprint ......................1 1.3 Cautions for Using Face Recognition Device ..................2 1.4 Verification Modes ............................3 1.4.1 1:N Fingerprint Verification ......................3 1.4.2 1:1 Fingerprint Verification ......................
Page 6
8.1 User Interface Settings ..........................29 8.2 Voice Settings ............................... 30 8.3 Bell Settings ..............................30 8.3.1 Adding a New Bell .......................... 30 8.3.2 Editing a Bell ............................. 31 8.3.3 Deleting a Bell ..........................31 9 Data Management ..............................32 9.1 Deleting Data ..............................
1 Guidance Notes 1.1 Operating Environment of the Device 1) Recommended Installation Position: √ Recommended installation position (as shown in the left figure): Install the device in an indoor position which is three meters far from the window and door, and two meters far from the lamp source, with illuminance of ambient light source being 0~800 LUX.
Slanted Too Low Please use the correct method of pressing fingerprint for registration and verification. Our company does not undertake the responsibility for the lowered verification performance caused by user’s improper operation. The rights to final interpretation and amendment are reserved.
2. Facial Expression and Stance NOTE: During enrollment and verification, keep the facial expression and stance natural. 3. Registration and Verification During registration, it is required to adjust your upper body to fit your eyes into the green frame on the screen.
Successfully verified Verification Fails 1.4.2 1:1 Fingerprint Verification Under this fingerprint verification method, a fingerprint collected by the sensor is verified with the fingerprint corresponding to the entered user ID. Please use this method when difficulty is encountered in 1:N fingerprint verification. Successfully verified Failed to verify Press...
Press the key icon to Successfully verified Failed to verify Press to enter user ID enter the password 1.4.4 1:N Face Verification Attendance In this method, the facial image captured by the camera is compared with all facial data in the device. Conduct comparison in the correct Successfully verified way on the main interface...
1.4.6 Card Verification NOTE: Card function is optional, only products with a built-in card module are equipped with card verification function. Please contact our technical support as required. 1. Swipe the card above the card reader (the card must be registered) 2.
1.5 Initial Interface Date and Time Network Connection Bell Tamper Alarm Auxillary Input Time Menu 1:1 Verification mode 1. Date and Time: The current date of the device is displayed. 2. Bell: An alarm is set for the device if this icon is displayed. 3.
2 Main Menu User Mgt.: To manage basic information of registered users, including user ID, user name, user role, fingerprint , face, badge (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), password, user photo and access control role. User Role: To set user roles for accessing into the menu and changing settings.
3 Date / Time Settings In the initial interface, press > System > Date Time to enter the date/time setting interface. It includes setting date, time, 24-hour clock / 12-hour clock, date format and daylight saving time. When resetting to factory settings, the date format can be restored (YYYY-MM-DD). ...
4 User Management 4.1 Adding a User Including adding super admin and normal user to user roles. > User Mgt. > New User to enter New User setting interface. Settings In the initial interface, press include inputting User ID, name, choosing User Role (Normal User / Super Admin), registering Fingerprint, face and badge number (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), setting Password, taking User Photo and setting access control role.
4.2 Setting Access Control User access control option is to set open door access aimed at everybody, including access group setting, using time period, duress fingerprint management. Access group: To allocate users to different access control groups for management. By default, new users belong to Group 1 and can be reallocate to other groups.
> User Mgt. > All Users to enter All Users interface. Input “User ID” in In the initial interface, press , the corresponding user will be shown. The above figure shows the search interfaces of an user with user ID “1”. 4.4 Editing a User and [Edit] to enter user editing interface.
4.5 Deleting a User After a user is chosen through 4.3 Searching User, press [M/OK] and Press [Delete] to enter user deleting interface. Or in the initial interface press > User Mgt. > All Users > Search a user > Delete to enter user deleting interface.
4.6 User Display Style > User Mgt. > Display Style to enter Display Style setting interface. In the initial interface, press Several Display Styles are shown as below: Single Line Style Multiple Line Mixed Line ProBio & ProFAC User Manual...
5 User Role Setting user rights for operating the menu (a maximum of 3 roles can be set). When user role is enabled, in [User Mgt.] > [New User] > [User Role], you can allocate suitable user role to each user. Role: Super user needs to allocate different rights to new users.
6 Comm. Settings 6.1 Ethernet Settings > Comm. > Ethernet to enter the Ethernet setting interface. In the initial interface, press The parameters provided below are the factory default values, please adjust them according to the actual network situation. IP Address: 192.168.1.201 Subnet Mask: 255.255.255.0 Gateway: 0.0.0.0 DNS: 0.0.0.0...
Select Serial Comm Select RS232/485 In the initial interface, press to enter main menu, and select Comm. Select RS485 Select RS485 as the function of “master unit” or choose to disable RS485 NOTES: When RS485 is used as the function of “master unit”, the device will act as “master unit”, and it can be connected to RS485 fingerprint reader.
In the initial interface, press > Comm. > PC Connection > Comm Key to enter the Comm Key setting interface. Comm Key: The default password is 0 (no password). Comm Key can be 1~6 digits and ranges between 0~999999. Device ID Settings ...
In the initial interface, press [M/OK] > Comm. > ADMS to enter the ADMS server setting interface. When the Webserver is connected successfully, the main interface will display the logo. Enable Domain Name: When this function is turned on, the domain name mode http://... will be used, such as http://www.XXX.com.
Page 26
Press [Wiegand Input] to enter Wiegand Input interface. Wiegand Format: User can choose among the following built-in Wiegand formats: Wiegand 26, Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and Wiegand 50. Pulse Width (us): The width of pulse sent by Wiegand card reader. The default value is 100 microseconds, which can be adjusted within the range of 20 to 100 microseconds.
to 18 bits, while the 36 bit is the even parity bit of the 19 to 35 bits. The 2 to 17 bits are the device code, the 18 to 33 bits are the card number, and the 34 to 35 bits are the manufacturer code.
Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and Wiegand 50. Multiple selections are available, but the actual Wiegand format will depend on the option in [Wiegand output bits]. For Example: If the 26-bit Wiegand26, 34-bit Wiegand34a, 36-bit Wiegand36, 37-bit Wiegand37a and 50-bit Wiegand50 are chosen in [Wiegand Format], but 36 bits is selected in [Wiegand output bits], then the actual Wiegand format for use will be 36-bit Wiegand36.
Page 29
> Comm. > Wiegand Setup > Card format detect automatically to In the initial interface, press enter the Card format detect automatically interface. Operating Procedure: After entering the [Card Format Detect Automatically] interface of an ID device, swipe the ID card above the card reader (on the local device or auxiliary card reader), the interface will show the automatically detected Wiegand formats and the analyzed card numbers.
7 System Settings 7.1 Access Logs Settings In the initial interface, press > System > Access Logs Setting to enter Access Logs Setting interface. Camera Mode: To set whether to take and save photos in verification; applicable to all users. The following 5 modes are included: 1.
range is 1-9 seconds. 7.2 Face Parameters > System > Face to enter the Face setting interface. In the initial interface, press 1:1 Match Threshold: Under 1:1 Verification Method, verification succeeds only when the similarity between the verifying face and the user’s registered face is greater than threshold value. 1:N Match Threshold: Under 1:N Verification Method, verification succeeds only when the similarity between the verifying face and all registered faces is greater than threshold value.
7.3 Fingerprint Parameters In the initial interface, press > System > Fingerprint to enter the Fingerprint setting interface. 1:1 Match Threshold: Under 1:1 Verification Method, verification succeeds only when the similarity between the verifying fingerprint and the user’s registered fingerprint is greater than threshold value. 1:N Match Threshold: Under 1:N Verification Method, verification succeeds only when the similarity between the verifying fingerprint and all registered fingerprints is greater than threshold value.
Page 33
> System > Reset > OK to finish the reset setting. In the initial interface, press Reset parameters include Access Control Options, Anti-passback Setup, communication setting (namely, the setting of Ethernet, Serial Comm., PC Connection and Wiegand Setup), Personalize (such as Voice Prompt, Keyboard Prompt, Volume and Idle Time To Sleep) etc.
remain unchanged after resetting to factory settings. 7.5 USB Upgrade Insert the U disk with upgrade file into the device’s USB port, and in the initial interface, press > System > USB Upgrade to complete firmware upgrade operation. If upgrade file is needed, please contact our technical support. Firmware upgrade is not recommended under normal circumstances.
8 Personalization Settings 8.1 User Interface Settings In the initial interface, press > Personalize > User Interface to set User Interface. Wallpaper: Select the wallpaper of main screen as required, you can find wallpapers of various styles in the device. Language: Select the language of device as required.
8.2 Voice Settings In the initial interface, press > Personalize > Voice to enter the Voice settings interface. Voice Prompt: Select whether to enable voice prompts during operation. The default value is [ON], indicating that voice prompt is enabled. And the icon [OFF] indicates that voice prompt is disabled. Touch Prompt: Select whether to enable voice while touching the screen.
Repeat: To set whether to repeat the bell from Monday to Sunday. Ring Tone: Ringtone played for bell. Interval bell delay (s): To set the ringing length. The value ranges from 1 to 999 seconds. 8.3.2 Editing a Bell In the initial interface, press >...
9 Data Management 9.1 Deleting Data To manage data in the device, which includes delete access records, delete all data, delete admin role and delete screen savers etc. > Data Mgt. > Delete Data to enter the Delete Data settings interface. In the initial interface, press Delete access records: To delete all access records saved in the device or delete access records in specified time range.
Delete Access Control: To delete all access records. Delete User Photo: To delete all user photos in the device. For details of uploading user photo, please refer to 16.3 Image Uploading Rule. Delete Wallpaper: To delete selected or all wallpapers in the device. Operating Procedure: 1.
Press [Backup Notes] Input backup notes Backup completely 9.3 Data Restoration To restore the data in the device or U disk to the device. > Data Mgt. > Restore Data > Restore from USB Disk to enter the In the initial interface, press Restore Data settings interface.
10 Access Control Access Control option is used to set the Time Rule, Holidays, Combined Verification etc., the related parameters for the device to control the lock and other devices. To gain access, the registered user must meet the following conditions: 1.
Page 42
The time period is the Door Sensor Delay (value ranges from 1 to 255 seconds). Door Sensor Type: It includes None, Normal Open (NO) and Normal Close (NC). None means door sensor is not in use; Normal Open means the door is opened when power is ON; Normal Close means the door is closed when power is ON.
is being dismantled. Reset Access Setting: To reset parameters of door lock delay, door sensor delay, door sensor type, verification mode, door available time period, NO time period, auxiliary input configuration, speaker alarm, anti-passback direction,. However, the content of the Access Data deletion in [Data Mgt.] will not be affected.
Page 44
> Access Control > Time Rule Setting to enter the Time Rule Setting In the initial interface, press interface. The default Time Rule No. is 1 (whole-day valid), which can be edited. Editing a Time Rule A super administrator may edit time rules as needed. The detailed operation is as follows: Start Time End Time Input time rule number (such Select “Time Period 1/2/3”...
10.3 Holiday Settings Add access control holidays for the device and set time periods on holidays as needed. The device controls the access control on holidays according to the holiday settings. In the initial interface, press > Access Control > Holidays to enter Holidays setting interface. 10.3.1 Adding a Holiday Press [Add Holiday] Press [Date]...
Looping or not: The default value of Looping or not is [ON]. For fixed holidays every year, for example, the New Year's Day is January 1, Looping or not can be set to [ON] for them. For unfixed holidays every year, for example, the Mother's Day is the second Sunday of May, the specific dates are uncertain and Looping or not can be set to [OFF] for them.
Page 47
NOTE: Access groups are set when adding user (in the initial interface, press > User Mgt. > New User > Access Control Role > Access Group, to set the access group number to which the added user belongs ), the access group number ranges from 1 to 99. >...
Page 48
As the above figure, Combined Verification 3 is made up of five members, and all of them come from Access Group 9. As the above figure, Combined Verification 4 is made up of three members coming from three different groups -- Access Group 3, 5, 8 respectively. Deleting a Combined Verification To delete a Combined Verification, set all access group numbers to 0.
Anti-passback Settings 10.5 To avoid some persons following users to enter the door without verification, resulting in security problem, users can enable anti-passback function. The check-in record must match with check- out record so as to open the door. This function requires two devices to work together: one is installed inside the door (master device), the other one is installed outside the door (slave device).
11 USB Manager User data, user portrait, access records and other data can be exported to relevant software for processing through a USB disk, or import user data to the device by using a USB disk. NOTE: Before uploading/downloading data from/to the USB disk, insert the USB disk into the USB slot first.
Page 51
In the initial interface, press > USB Manager > Upload to enter the USB Upload interface. User Data: To upload all the user information and fingerprints from USB disk into the device. User Portrait: To upload user photos from USB disk into the device. Select [Upload Selected Picture] or [Upload All Pictures] when uploading user portraits, for details of uploading user portraits, please refer to 16.3 Image Uploading...
12 Records Search When users verify successfully, records are saved in the device. This function enables users to check access records, attendance photo and blacklisted photo. 12.1 Searching Access Records Press [Access Records] Input user ID (query all data Press and select [Attendance Search] without input)
12.2 Searching Attendance Photo Press [Attendance photo] Input user ID (query all data Select time range to be searched without input) The corresponding attendance photos will then be shown 12.3 Searching Blacklist ATT Photo Press [Blacklist ATT photo] Select time range The corresponding blacklist ATT photos will be shown ProBio &...
13 Autotest To automatically test whether all modules in the device function properly, which include the LCD, voice, fingerprint sensor, camera and RTC (Real-Time Clock). In the initial interface, press > Autotest to enter the Autotest interface. Test All: To test LCD, voice, fingerprint sensor, camera and RTC. During the test. Test LCD: To test the display effect of LCD screen by displaying full color, pure white, and pure black to check whether the screen displays colors properly.
14 System Information Check data capacity, device and firmware information. > System Info to enter the System Info interface. In the initial interface, press Device Capacity Device Info Firmware Info Device Capacity: To display the number of registered users, administrators, passwords, fingerprints, face, badges, records, attendance photos, blacklist photos and user photos.
15 Troubleshooting Fingerprint sensor is not able to read and verify the fingerprint effectively. Check whether the finger is wet, or the fingerprint sensor is wet or dusty. Clean the finger and the fingerprint sensor and try again. ...
16 Appendices 16.1 Photo ID Function When the Photo ID function is enabled, and the user passes verification, not only the information of user ID and name will be displayed, but also the photo registered by the user or saved in the USB disk will be shown.
Subcommittee affiliated to the Security Industry Association (SIA). It is a protocol used for contactless IC card reader port and output. The protocol defines the port between the card reader and controller which are widely used in access control, security and other related industries. This has standardized the work of card reader designers and controller manufacturers.
Field Description The even parity check bit is determined by bits 2-13. If there is an even Even parity check number of 1's, the even parity check bit is 0. If there is an odd number of 1's, the even parity check bit is 1. User ID/Card User ID/Card number (card code, 0-16777215) and bit 2 indicates the most...
Page 60
33 34 Even parity parity User ID/Card number check bit check bit The following table describes the fields. Field Description The even parity check bit is determined by bits 2-17. If there is an Even parity check bit even number of 1's, the even parity check bit is 0. If there is an odd number of 1's, the even parity check bit is 1.
Image Uploading Rule 16.3 1. User photo: It is required to create a file named as “photo” under the USB disk file, and put user photos into the file. The capacity is 3000 images, with each of them not exceeding 15k. The image name is x.jpg (x is the actual user ID, max.
16.4 Anti-passback Settings To avoid some persons following users to enter the door without verification, resulting in security problem, users can enable anti-passback function. The check-in record must match with check-out record so as to open the door. This function requires two devices to work together: one is installed inside the door (master device) and the other one is installed outside the door (slave device).
Page 63
When Out Anti-passback is set for a user on the master device, the last record of the user must be a check-in record if the user needs to check in/out freely. Otherwise, the user cannot check out and the check-out request of the user is rejected because of anti-passback. For example, if the recent first record of a user is a check-in record, the second record of the user can be either a check-in or check-out record but the third record must be based on the second record, ensuring that the check-in record matches the check-out record.
16.5 Statement on Human Rights and Privacy Dear Customers: Thank you for choosing the hybrid biometric products designed and manufactured by us. As a world-renowned provider of biometric technologies and services, we pay much attention to the compliance with the laws related to human rights and privacy in every country while constantly performing research and development.
16.6 Environment-Friendly Use Description The Environment Friendly Use Period (EFUP) marked on this product refers to the safety period of time in which the product is used under the conditions specified in the product instructions without leakage of noxious and harmful substances. ...
Need help?
Do you have a question about the Green Label ProBio and is the answer not in the manual?
Questions and answers