Zhejiang Dahua Vision Technology Face Recognition Access Controller User Manual

Advertisement

Quick Links

Face Recognition Access Controller
User's Manual
V1.0.1

Advertisement

Table of Contents
loading

Summary of Contents for Zhejiang Dahua Vision Technology Face Recognition Access Controller

  • Page 1 Face Recognition Access Controller User's Manual V1.0.1...
  • Page 2: Foreword

    Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Access Controller"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual.
  • Page 3 ● All designs and software are subject to change without prior written notice. Product updates might result in some differences appearing between the actual product and the manual. Please contact customer service for the latest program and supplementary documentation. ● There might be errors in the print or deviations in the description of the functions, operations and technical data.
  • Page 4: Important Safeguards And Warnings

    Important Safeguards and Warnings This section introduces content covering the proper handling of the Access Controller, hazard prevention, and prevention of property damage. Read carefully before using the Access Controller, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Access Controller under allowed humidity and temperature conditions.
  • Page 5 ● Operate the Access Controller within the rated range of power input and output. ● Use the Access Controller under allowed humidity and temperature conditions. ● Do not drop or splash liquid onto the Access Controller, and make sure that there is no object filled with liquid on the Access Controller to prevent liquid from flowing into it.
  • Page 6: Table Of Contents

    Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 Structure ........................................1 2 Connection and Installation ................................2 2.1 Wiring ......................................2 2.2 Installation Requirements ..............................2 2.3 Installation Process ................................... 4 2.3.1 Wall mount ..................................4 2.3.2 86 Case Mount ..................................
  • Page 7: Structure

    1 Structure The front appearance might differ depending on different models of the Access Controller. Here we take the Wi-Fi model as an example. Figure 1-1 Structure (Unit: mm [inch] )
  • Page 8: Connection And Installation

    2 Connection and Installation 2.1 Wiring The access controller needs to be connected to devices like sirens, readers, and door contacts. Figure 2-1 Cable connections ● The back panel of the Access Controller has SIM card port, Internet port, audio extension port, SD card port and wiring harness.
  • Page 9 Installation Height Figure 2-2 Installation height requirement Ambient Illumination Requirements Figure 2-3 Ambient illumination requirements...
  • Page 10: Installation Process

    Recommended Installation Location Figure 2-4 Recommended installation location Installation Location Not Recommended Figure 2-5 Installation location not recommended 2.3 Installation Process The Access Controller has four installation methods: wall mount, floor bracket mount, turnstile mount and 86 case mount. This section only introduces wall mount and 86 case mount. For details of floor bracket mount and turnstile mount, please refer to user's manual of corresponding devices.
  • Page 11: Case Mount

    Figure 2-6 Wall mount 2.3.2 86 Case Mount Step 1 Put an 86 case in the wall at an appropriate height. Step 2 Fasten the bracket to the 86 case with two screws. Step 3 Wire the Access Controller. For details, see "2.1 Wiring" Step 4 Use two screws to fix the back cover to the Access Controller.
  • Page 12: Local Configurations

    3 Local Configurations Local operations might differ depending on different models of Access Controller. 3.1 Initialization For the first-time use or after restoring factory defaults, you need to set a password and email address for the admin account. You can use the admin account to log in to the main menu screen of the Access Controller and the web interface.
  • Page 13 then set user permissions. Step 1 On the Main Menu screen, select User, and then tap Step 2 Configure user parameters. Figure 3-2 New user Table 3-1 New user description Parameter Description Enter the user ID. The ID can be numbers, letters, and their User ID combinations, and the maximum length of the user ID is 32 characters.
  • Page 14 Parameter Description Each user can register up to 3 fingerprints. Follow the on-screen prompts to register fingerprints. You can set the registered fingerprint as the duress fingerprint, and an alarm will be triggered if the door is unlocked by the duress fingerprint. Fingerprint ●...
  • Page 15: Web Configurations

    4 Web Configurations On the web interface, you can also configure and update the Access Controller. Web configurations differ depending on models of the Access Controller. 4.1 Initialization Initialize the Access Controller when you log in to the web interface for the first time or after the Access Controller is restored to the factory defaults.
  • Page 16: Logging In

    improve security. ● If you want to reset the administrator password by scanning the QR code, you need the linked email address to receive the security code. 4.2 Logging In Step 1 Open a web browser, go to the IP address of the Access Controller. Figure 4-2 Login Step 2 Enter the user name and password.
  • Page 17: Appendix 1 Important Points Of Intercom Operation

    Appendix 1 Important Points of Intercom Operation The Access Controller can function as VTO to realize intercom function. Prerequisites The intercom function is configured on the Access Controller and VTO. Procedure Step 1 On the standby screen, tap Step 2 Enter the room No, and then tap...
  • Page 18: Appendix 2 Important Points Of Qr Code Scanning

    Appendix 2 Important Points of QR Code Scanning ● Access Controller (with QR code scanning module): Place the QR code on your phone at a distance of 5 cm - 20 cm away from the QR code scanning lens. It supports QR code that is 2 cm×2 cm - 5 cm×5 cm and less than 512 bytes in size.
  • Page 19: Appendix 3 Important Points Of Fingerprint Registration Instructions

    Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points: ● Make sure that your fingers and the scanner surface are clean and dry. ● Press your finger on the center of the fingerprint scanner. ●...
  • Page 20 Appendix Figure 3-3 Wrong placement...
  • Page 21: Appendix 4 Important Points Of Face Registration

    Appendix 4 Important Points of Face Registration Before Registration ● Glasses, hats, and beards might influence face recognition performance. ● Do not cover your eyebrows when wearing hats. ● Do not change your beard style greatly if you use the access controller; otherwise face recognition might fail.
  • Page 22 Requirements of Faces ● Make sure that the face is clean and forehead is not covered by hair. ● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image recording. ● With eyes open, without facial expressions, and make your face toward the center of camera. ●...
  • Page 23: Appendix 5 Cybersecurity Recommendations

    Appendix 5 Cybersecurity Recommendations Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols.
  • Page 24 reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.

Table of Contents