Page 2
BlackandWhite Screen Series Standalone Access Controller and Reader User Manual (Professional Version) Version: 1.0 Date: Nov. 2012 About This Manual This manual introduces the interface and menu operations of The BlackandWhite Screen Series Standalone Access Controller and Reader, bundled Access3.5 Security System are used together. For the product installation, see related installation guide.
1. Notice for Use 1. Notice for Use Thank you for using our BlackandWhite (B&W) Screen Series Standalone Access Controller and Reader Products. Please read this manual carefully before using this product for a comprehensive understanding so as to avoid causing unnecessary damages to the product. Protect the device from exposure to direct sunlight or strong beam as strong beam greatly affects the fingerprint collection and leads to fingerprint verification failure. ° Avoid using the product outdoors in summer. The working temperature of B&W screen series ranges from 0–40 C. ...
Page 6
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) Verification succeeds: The green LED is solid on for 3 seconds. J Note: If the LED display is inconsistent with the above conditions, please contact our technical personnel. 4. About This Manual Our products are subject to update from time to time, so our company will neither make a commitment to l guarantee the consistency between the actual products and this document, nor assume any responsibility for any dispute arising out of the discrepancy between the actual technical parameters and this manual. This document is subject to change without prior notice. The functions marked with ê in this manual are optional for some B&W screen series standalone access l controller and reader products. Please refer to the actual product for the specific function description. Picture descriptions in this manual may vary slightly from actual product. Please refer to the actual l ...
2. Basic Concepts 2. Basic Concepts This section introduces the definitions and descriptions of the following basic concepts: Ø User enrollment Ø User verification Ø User ID Ø Authority class Ø Appearance of device The most important two functions supported by user enrollment and verification. 2.1 User Enrollment A user can enroll up to 10 different fingerprints using one ID number to have multiple verification selections. Theoretically all the fingers of a user need to be enrolled so that the user can use any of the enrolled fingerprints for recognition even if he/she forgets which fingerprint has been enrolled. Generally it is recommended that a user shall enroll at least two fingerprints, for example, the index fingers of both hands, so that the user can still perform fingerprint matching even if one or more of his/her fingers get cut or damaged. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 2.5 Appearance of Device Front View: Screen Keys Status Lamp Fingerprint Sensor ID Card Swipe Area Side View: USB RESET Initial Interface: The first interface displayed on the screen upon equipment poweron is referred to as the “Initial Interface”, as shown in the following figure. Welcome 15:01 Time 120607 Thu Date 4 ...
3. Enrollment and Verification 3. Enrollment and Verification This chapter introduces how to enroll users on the B&W Screen Series Standalone Access Controller and Reader Products. Further, it describes how to verify the validity of enrolled fingerprints. This chapter includes the following parts: ² Enroll users ² Enroll backup fingerprints ² Prompts for successful enrollment ² Verify identity. ² Administrator enrollment ² Delete enrollment data J Note: To enroll a new user, you must have the authority of administrator. For details, see 2.4Authority Classes. 3.1 Enroll a User The B&W Screen Series Standalone Access Controller and Reader Products supports three enrollment modes: Fingerprint enrollment, Password enrollment and RFID enrollment. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) New Enroll 0000000010 Place Finger... ESC/Exit J Note: The last digit “0” in “ ” denotes the first fingerprint. “ ” the last digit “1” denotes the 0000000010 0000000011 second fingerprint, means backup fingerprint. The device displays 9digit numbers, and automatically adds 0 as prefix to the numbers less than 9 digits. For example, if you input "11", the device will display "000000011". 3) Place the same finger for three consecutive times on the fingerprint reader according to system prompts. If the enrollment succeeds, the following information is displayed: New Enroll 0000000010 ESC OK(Save) 4) Press OK to save the enrolled fingerprint. If the enrollment fails, the system will prompt you to reenter your user ID and restart the enrollment from Step 2. 3.1.2 Backup Enrollment If you press ESC on the [New Enroll] interface, you can cancel the new enrollment and display the [Backup Enroll] interface, press OK and then as shown in the following figure: New Enroll Continue? ESC OK Backup Enroll UserID 000000011 ESC OK Backup Enroll 0000000011 Place Finger... ESC/Exit The following steps of backup enrollment are the same with those of new enrollment. 6 ...
3. Enrollment and Verification J Note: It is recommended that a longterm user should enroll two fingerprints at least. Backup registration can choose fingerprint or password or card. 3.1.3 Enroll Password 1) Select Menu → User Manage → User Enrollment to display the [User Enrollment] interface. Select [Enroll Pwd] and press OK to display the [Enroll Pwd] interface. Enroll Pwd New Enroll? ESC OK 2) Press OK to confirm and proceed. New Enroll User ID: 000000006 ESC OK 3) Input a number (from 1–999999999) in the [User ID] field. Press OK to display the password input interface. New Enroll Input Pwd ***** ESC OK 4) Input your password in the [Input Pwd] field and press OK to proceed. New Enroll Input Pwd ***** Pwd Affirm ***** 5) Reenter your password in the [Pwd Affirm] field and press OK to confirm your entry and proceed. New Enroll 000000006P ESC OK(Save) Note: The last digit “P” in“000000006P” ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 3.1.4 Enroll ID Card 1) Select Menu → User Manage → User Enrollment to display the [User Enrollment] interface. Select [Reg RFID] and press OK to proceed. Reg RFID New Enroll? ESC OK 2) Press OK to confirm and proceed. New Enroll User ID: 000000010 ESC OK 3) Input a number (from 1–999999999) in the [User ID] field. Press OK to display the ID card enrollment interface. New Enroll Show the card UserID: 000000010 ESC OK 4) Swipe your card and the system reads your card number. New Enroll CARD: 16650449 User ID: 000000010 ESC OK 5) Press OK to confirm and proceed. New Enroll 000000010C ESC OK(Save) Note: The last digit “C” in“000000010C” denotes ID card. ...
3. Enrollment and Verification 3.2 Prompts for Successful Enrollment A registered fingerprint with high quality assures quick verification speed while the one with poor quality may easily lead to false rejection and slow verification. To enhance the quality of enrolled fingerprints, refer to Table 31 Table 31 Common Causes of Enrollment Failure or Poor Fingerprint Quality Finger is too dry or Rub your fingers against your palm because rubbing yields oil. dirty Moisturize your finger by breathing on it. Apply insufficient Apply pressure lightly and evenly during the capturing process. pressure Select fingers for Left and right index fingers or middle fingers are recommended. enrollment Select the fingers without wornout or damaged fingerprints. Users usually select their index fingers, but if their index fingers do not have high fingerprint quality, they can select their middle fingers or ring fingers. For users with small fingers, they can opt for their thumbs. To enroll spare fingerprints, users can select fingers not prone to wearout or damage, for example, the ring fingers. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 3.3 Verification Modes After enrollment, you can verify validity that registered fingerprints or ID card or password on the initial interface. 3.3.1 Fingerprint Verification 1:1 and 1: N matching modes for fingerprint identification. (1) 1:1 fingerprint matching In the 1:1 fingerprint matching mode, the device compares the current fingerprint collected through the fingerprint reader with that in relation to the user ID entered through keyboard. Operation steps: 1:1 FP Match PIN: 000000011 ESC OK Enter a user ID through keyboard on the initial interface. J Note: If the user have been registered password, press OK in the verification, it will automatically entr y the password verification interface. ...
3. Enrollment and Verification Operation steps: FP Verify Remove Finger Place your finger on the initial interface to display the following interface: Verify User ID: 000000001 Verified! If the verification succeeds, the system will generate a voice announcement “Thank you!” after the above interface is displayed about 0.5 seconds, and then the following interface will be displayed: If the verification fails, the system will generate a voice announcement “Please try again!” and display the following interface: ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 3.3.3 Verification Through Card Swiping« If you have your ID card number enrolled in the system, you can pass the verification by swiping your ID card at the swiping area in a proper way. 3.4 Administrator Enrollment The B&W Screen Series Standalone Access Controller and Reader Products provide administrator settings to prevent unauthorized users changing system data and ensure system security. The operations on administrator settings are as following: 1) The brand new device does not assign any administrator, so you can press Menu to access the system directly and the following interface is displayed. Menu ►User Manage Options PenDrive Mng 2) Press OK to display the [User Manage] interface. User Manage ►Enroll User Enroll Admin Delete 3) Select Enroll Admin through the ▲/▼ key. User Manage Enroll User ►Enroll Admin Delete 4) Press OK to display the [Enroll Admin] interface. Enroll Admin ►Enroll FP Enroll Pwd Reg RFID ...
3. Enrollment and Verification 3.5 Delete Enrollment Data To delete an enrolled user from the system, perform as follows: 1) Press Menu to access related menu item for verification, and the following interface is displayed: Menu ►User Manage Options PenDrive Mng 2) Press OK to display the [User Manage] interface. User Manage ►Enroll User Enroll Admin Delete 3) Select Delete through the ▲/▼ key. User Manage Enroll User Enroll Admin ►Delete 4) Press OK to display the [Delete] interface. Delete UserID: 000000008 ESC OK 5) Enter a number in the [User ID] field and press OK to confirm your entry. Then delete the user according to system prompt. J Note: About deleting the Administrator Privilege and Clear All Data, you can press “Menu” “Options” “Syms Opt” “Adv option” “Clr Admin’ Pri” or “Clear All Data”. For detail, please refer to“4.1.4Advanced Settings”. Besides, you can also through Access3.5 Security System to delete data.
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 4. Settings Press Menu on the initial interface. After verifying your administrative rights, the system displays the following interface. Menu User Manage ►Options PenDrive Mng Select Options and press OK to proceed. â Options ►System Opt Power Mng Comm Opt Access Options Auto Test The Options menu contains five submenus: System Opt, Power Mng, Comm Opt, Access Options and Auto Test. These submenus will be described in the following parts. 4.1 System Settings Select System Opt and the information displayed on the screen are shown in the following figure: â System Opt Date Time ► Language Fmt Adv Option 4.1.1 Time Settings Set the current date and time displayed on the device screen. Select Set Date Time and press OK to display the following interface. YYYYMMDD 24H 2012611 9:34:29 ESC OK To modify date and time, place the cursor to the desired field through the ▲/▼ key, input correct date and time, and press OK to save the changes. ...
4. Settings 4.1.2 Languagesê You can set the language displayed on the device screen. Select Language and press OK to display the language editing interface. If you select English, the information on screen will be displayed in English. â System Opt Date Time ►Language English Fmt You can change the types of languages through the ▲/▼ key. Select a desired language and press OK. Then press ESC to exit the [System Opt] interface. When prompted to save your settings, press OK to save the settings. The system prompts you that your settings will take effective after the restart of your device. J ...
Page 20
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) Upd Firmware Buzzer Y Outdoor Y J Note: The menu options above contain some optional functions. If the actual product does not have one or several of the options above, then this product does not support the related function(s). Select a desired option through the ▲/▼ key, and perform settings as required. 1) Reset Opts This option is used to restore all the settings to factory defaults. 2) Del All Logs This option is used to delete all verification records in the chip. 3) Clear All Data This option is used to delete all the enrolled fingerprints and records. 4) Clr admin pri This option is used to set all the administrators to ordinary users. 5) Upd firmware You can select “Upd Firmware” to upgrade the firmware of device through the upgrade files in the USB pen drive. J Note: If you need firmware upgrade files, please contact our technical support engineers. Generally it is not recommended to upgrade the firmware. 6) Buzzer The device makes sound from the buzzer, selecting “Y” to open the buzzer so that buttons or menu function can make a sound while selecting “N” to close. 7) Outdoor Mode Choosing outdoor mode, please select “Y” and the screen will display black titles on white background after restart device, which is convenient for outdoor use. ...
4. Settings 4.2 Power Managementê Press Menu to select Options → Power Mng and the information displayed on the screen is shown in the following figure: Power Mng ▼ ►Idle Min 3 Idle& Idle min These two options are closely associated. When idle min is 0, the idle function is disabled. When Idle min is a nonzero number (unit: minute), for example, 1, the system will enter a specified state if there is no operation in 1 minute. 4.3 Communicationrelated Settings Press Menu to select Options → Comm. Opt and the information displayed on the screen is shown in the following figure: Comm Opt ▼ ►BaudRate 115200 Dev Num 1 Net Speed Auto IP Addr 192.168.1.201 NetMask 255.255.255.0 Gateway 0. 0. 0. 0 1. Baudrate ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 4.4 Access Optionsê The BlackandWhite Screen Series Standalone Access Controller and Reader Products, work with bundled Access3.5 Security System as standard configuration to achieve a series of functions including Access Timezones, Time Holidays, Linkage, Antipassback, FirstCard Normal, MultiCard Opening functions etc., But no Interlock function. In details operation, please refer to Access3.5 Software User Manual. Press Menu to select Options → Access Options and the information displayed on the screen is shown in the following figure: Access Options ▼ ►Lock 5 DSen. Delay 15 DSen. Mode None 485Reader Master Master State Out VerifyMD ...
4. Settings 4.4.4 485Readerê Press Menu to select Options → Access Options→ 485Reader, as shown below: Access Options ▼ Lock 5 DSen. Delay 15 DSen. Mode None ► 485Reader Master Master State Out VerifyMD FP/RF Equipment supports 485reader function, can be through the 485communication connect with FR1200 reader; Meanwhile, it can act as Masterslaver which Access Controller for master, FR1200 reader for slaver, to achieve 485 Antipassback functions. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 4.4.5 Master State ê Master State has two types: Out or In. Master Status set “Out” by default, and install at indoor; Slaver State set "In" and install at outside. Records of out and in are save in the master device. 4.4.6 Verify Mode The device supports various verification modes, including Fingerprint or ID Card(FP/RF), Fingerprint plus ID Card(FP&RF), Password plus ID Card(PW&RF), Fingerprint, Password(PW), Promixity Card(RF).The default verification mode is fingerprint or ID Card(FP/RF). If you need to choose a verification mode except the defaulted one, you can enter Menu to modify the verification mode first. The paths: MENU →Options → Access Options→ VerifyMD. 4.5 Automatic Test ...
5. USB Pen Drive Management ★ 5. USB Pen Drive Management ★ Select PenDrive Mng and the information displayed on the screen is shown in the following figure: â PenDrive Mng ►DwnLoad AttLog DwnLoad User UpLoad User You can download the attendance data, employee data and short messages and upload employee data and short messages with a USB pen drive. 5.1 Download Attendance Data 1. Insert a USB pen drive into the USB interface on the device. 2. Select PenDrive Mng and select the desired access control data to be downloaded through the “▲/▼” key. The interface displayed is shown as follows: PenDrive Mng ►DwnLoad AttLog DwnLoad User UpLoad User 3. Press OK to confirm your selection and start the download. The interface displayed upon successful download is shown as follows: Copy Data Suc! 4. Press ESC to return to the initial interface and then remove the USB pen drive. The files form is attlog.dat . J ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) The files user.dat (user information), userauth.dat (user privilege) and timezone.dat ( time period ) will be concurrently downloaded to the USB pen drive. Three files download at the same time. J Note: Has the fingerprint function device download fingerprint template name for "template.fp10". 5.3 Upload User Data Press ▲/▼ to select “UpLoad User” from the “PenDrive Mng” menu and then press OK. The files user.dat (user information), userauth.dat (user privilege) and timezone.dat (Timezone) stored in the USB pen drive will be concurrently uploaded to the device. PenDrive Mng DwnLoad AttLog DwnLoad User ►UpLoad User 22 ...
6. Systems Information 6. Systems Information Through the Sys Info menu, you can check all information of the device, including the enrolled fingerprint count, enrolled users, attendance records, administration records and equipment information. On the Menu interface, select Sys Info and press OK to display the interface as shown in the following figure: Sys Info â ►User Cnt 206 FP Cnt 173 Att Log 8046 Admin Cnt 0 Pwd User 1 S Logs 4096 Free Space Info Dev Info On the screen as shown in the figure above, you can check the User Cnt (Number of enrolled users), FP Cnt (Number of enrolled fingerprints), Att Log (Piece of attendance records), Admin Cnt (Number of enrolled administrators), ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 7. Turn Off Alarm ★ The option Turn Off Alarm is available only after the device generates an alarm and is used to clear an alarm. Path: On the Menu interface, select Turn Off Alarm. á Menu User Manage Options PenDrive Mng Sys Info ►Turn Off Alarm J Note: The option Turn Off Alarm is available only after an alarm signal is generated. 24 ...
8. Maintenance 8. Maintenance 1. Cleaning Sometimes the optical lens, keyboards and display screens need to be cleaned. Although the specific cleaning cycle is dependent upon the ambient environment where the device operates, the following maintenance guide might be of some help to you: Table 11 Maintenance Description Item Cleaning Keyboards and display Clean the keyboards or display screens when the surface of them is dirty or screens ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 9. FAQs 1. Question: How do I address the problem that some employees fail to pass the fingerprint verification more often than not? Answer: The following factors will make fingerprint verification hard or even impossible for some users: •. The fingerprints of some fingers wear out. ‚. The fingers have too many wrinkles which change frequently. ƒ The skin on the fingers peels off badly. For users whose fingerprints are beyond recognition, they can delete these fingerprints and enroll them again or enroll a fingerprint of another finger. It is recommended to select fingers with good fingerprint quality (few wrinkles, no peelingoff and distinct fingerprint) for fingerprint enrollment. Press the finger flatly on the fingerprint sensor and be sure that the pad ...
Page 31
9. FAQs Besides, Connect the device with a PC and establish communication between them. Select the device management tab, and click Delete Administrator to delete the device administrator. You can access the device menu after disconnecting the device with the PC. 5. Question: Why is there a beep sound during the communication between device and PC? Answer: • If the beep sound occurs in RS232 communication mode, the baud rate settings of the PC and device are inconsistent. ‚ If the beep sound occurs in RS485 communication mode, it is possible that the two communication cables of the converter are inversely connected or stuck together. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 10. Appendix The functions described in Appendix are all optional. If you need these functions, please consult our commercial representatives or presales technical support engineers. 10.1 USB USB Host The device is used as the USB Host to externally connect with a USB pen drive for data exchange. The conventional fingerprint readers transfer data only through the RS232, RS485 or Ethernet. Bulk data transfer may take a long time due to the restriction of physical conditions. The USB far outperforms any other previous transfer modes in terms of data transfer rate. Insert the USB pen drive to the USB slot on the device, download data to the USB pen drive, and then connect the USB pen drive to a computer to import the data to ...
10. Appendix 10.3 External Connection with the Fingerprint Reader This function is especially for devices configured with USB interfaces. Insert the fingerprint reader into the USB slot, select the fingerprint reader Menu → Options → Adv Option → Connect with FP Reader and set the option Connect with FP Reader to Y. After that, the externally connected fingerprint reader and the builtin fingerprint reader of the device can be used concurrently. When used for time & attendance management, the externally connected fingerprint reader can help siphon off some of the users at peak time; when used for access control, the externally connected fingerprint reader can be placed outside of the door and the host is placed inside, which not only implements the fingerprint access control both inside and outside of the door, but also ensures the host security. ...
Page 34
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 2) Select “Create a new connection” from Network Tasks. The New Connection Wizard will start. 3) Click the Next button to begin, as shown in the following figure: 4) Make sure the Connect to the network at my workplace option is selected and click the Next button, as shown in the following figure: 5) Select the Set up my connection manually option and click the Next button. 6) On the next screen you will be prompted to enter a name for the dialup connection. You can name this connection anything you wish (e.g. 1019). After you have entered your connection name click the Next button. 30 ...
Page 35
10. Appendix 7) On the next screen you will be prompted for the phone number for the ISP. Enter the number of the telephone cable connected with Modem. When entering the local access number, pay attention to the following cases: i. Extensiontoextension dial up within a company: Enter the number of extension connected with Modem. "1019” in the figure above is an extension number. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 4. When Modem is used, the RS232 and RS485 functions of the device will be disabled; when the option Extern MODEM is set to N (that is, Modem is not used), the RS232 and RS485 functions are enabled. 5. The PPP Server is integrated into the device. Please adopt Windowsbased PPP client dialup program to connect A11. The default user name and password are both “ppp”. After the PPP connection is set up, the IP address of A11 is 192.168.1.100 and that of PC is 192.168.1.133 by default. 10.5 GPRS Functions The General Packet Radio Service (GPRS) is a new packet data bearer service developed based on the Global ...
10. Appendix 10.9 MP3 Function Description The MP3 function enables the play of hifi MP3 music by realtime decoding MP3 files with an MP3 player. The MP3capable devices have a builtin MP3 player to play MP3 voice files of MPEG1.0 Layer III format. Similar to the scheduled bell, the MP3 function allows users to set 8 time segments and automatically plays MP3 files at userspecified time segments. You can also set an MP3 file to signal the start of work and noon break, or place an announcement into an MP3 file for the device to play at the specified time, thus making your office more employeefriendly. The device can either play MP3 files through its own speakers or through an external sound box. there are 8 time segments available for you to select. You can set the time segment as required. The device automatically plays an MP3 file at the specified time segment. J Notes: All the 8 time segments adopt the 24hour time system. The time segment 1 relates to file 1.mp3, the time segment 2 relates to file 2.mp3 and so on and so forth. You cannot perform other operations while the device is playing an MP3 file. While the device is playing an MP3 file, you can press any menu key to stop the play. MP3 file access The device itself cannot store MP3 files, but it can access MP3 files in the following two ways: Access MP3 files through webserver. l Step 1: Select Menu → Options → Power Mng → WEB Server IP on the device and enter the IP address of the PC where the web server is installed. Step 2: Copy MP3 files to the web server. If you have already installed web server (IIS, or Apache) on the PC, you can create a folder with the name of “MP3” under the root directory of the virtual host of the web server. Then copy MP3 files to this folder. Type http://xxx.xxx.xxx.xxx/mp3/y.mp3 in the IE address bar to check whether you can access the MP3 file normally. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) Access MP3 file through a USB pen drive. l Copy MP3 files to a USB pen drive. The device automatically searches the set MP3 file in the USB pen drive to play at the userspecified time segment. J Note: The device searches and plays MP3 files in the following sequence: Search MP3 files on the Web server. Search MP3 files in the USB pen drive if no MP3 file is specified on the Web server or the Web server cannot be accessed. Play its own ringtone if the USB pen drive is not inserted or the specified MP3 file is not found in the USB pen drive. MP3 play modes The device can either play MP3 files through its own speakers or through an external sound box. Volume control l The device supports the volume control function. If the volume of the MP3 player is too high or low, you can adjust the volume by selecting Menu → Options → System Opt → Adv Option → Volume Control on the device. MP3 file format l The device supports MP3 files of MPEG1.0 Layer III format. (The MPEG1.0 Layer III format is the common format for MP3 files. If an MP3 file cannot be played by the device because it is compressed by a standard (e.g. MPEG I Layer 1 or Layer 2) that the device does not support, replace it with another MP3 file.) MP3 file detection l To check whether an MP3 can be played, select Menu → Options → Auto Test → MP3 Test on the device. 10.10 Short Message Some models of device support the transfer of public and private short messages at the specified time and for a specified individual. You can edit public or short messages through the background software and then upload ...
10. Appendix Direct import by connecting the software to the device. l Import from a USB pen drive. l Operation Description: 1. Edit a short message by selecting the External Program→ SMS Mng menu item of the attendance software, connect the attendance software and upload it to the device. 2. Edit a short message by selecting the External Program→ SMS Mng menu item of the attendance software. Select External Program→ PenDrive Mng→ Export → Export to PenDrive to export the edited ...
Page 40
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) Type Description Users can pass the verification as long as they type their ID numbers through keyboard regardless of their enrollment modes. Password verification only PW 1) PIN+“←”+PW 2) RF+PW RF Card verification only RF 1) RF Fingerprint or password verification 1) PIN+FP(1:1) FP/PW 2) FP(1:N) 3) PIN+“←”+PW 4) RF+PW Fingerprint or RF verification 1) PIN+FP(1:1) FP/RF 2) FP(1:N) 3) RF Password or RF verification PW/RF 1) RF 2) PIN+“←”+PW Fingerprint or password or RF verification ...
Page 41
10. Appendix Type Description Fingerprint and ID number or fingerprint and RF verification 1) FP+ PIN FP & PIN /RF 2) FP +RF 3) PIN+FP(1:1) + PIN 4) PIN+FP(1:1) +RF Users enroll their fingerprints or passwords on the device. The verification modes are listed as follows: Description Type Enroll fingerprint Enroll password Fingerprint verification only 1) PIN+FP (1:1) FP 2) FP (1:N) Verification failure 3) RF+FP(1:1) ID number verification only PIN 1) PIN is entered through the 1) PIN is entered through the keyboard. keyboard. Password verification only PW 1) PIN+“←”+PW Password error 2) RF+PW RF Card verification only RF 1) RF 1) RF Fingerprint or password verification 1) PIN+FP(1:1) ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) J Notes: 1) 1:N also includes 1:H and 1:G. 2) It is recommended to enroll both fingerprints and passwords for the combined verification mode; otherwise, it may lead to verification failure. For example, user A only enrolls his/her fingerprint, but the verification mode is PW, so user A will fail the verification. 10.12 EM Readonly Card, HID Card, Mifare Card, iClass Card To accommodate the market demand for the currently popular RF cards, we have developed the device with builtin noncontact RF EM card reader module. By integrating the EM readonly card, this device can be conveniently consolidated into the existing telephone, canteen POS and access control system. This device ...
10. Appendix consolidated into the existing telephone, canteen POS and access control system. The device supports multiple verification modes including the fingerprint verification, password verification, card verification, card + fingerprint verification and card + password verification to meet the diversified customer needs. The device supports iClass read/write noncontact smart cards with working frequency of 13.56 MHz and card reading distance of 2m to 5m. For the operations of the iClass cards, see iClass Card User Guide. 10.13 Masterslave function ê Two devices, a master and a slave, both controlling the same lock, are connected by RS232/RS485/Wiegand. 1. The Applications of the Master and the Slave 1) Record storage: By default, the master status is exit and the slave status is entry. The records of entry and exit are both saved on the master. 2) AntiPassback function: Whether to perform the antipassback function is determined by the latest record of the user's entry and exit. With this function, the exit record must match the entry record. The function supports "Out", "In", "In & Out", "None and save " or "None" antipassback. By default, the identification status of the master is exit and that of the slave is entry, so if " out antipassback " has been set and when the last record of the user's entry is not "entry", the system will prompt antipassback refusal" and refuse to open the door if the user wants to exit. The logic is the same with "out antipassback" and “in & out antipassback". For example, now A wants to exit. ① If the last record for A is not entry, the device will prompt antipassback refusal and refuse to open the door. ② If the last record for A is entry, after the fingerprint identification is passed, the device will open the door. 3) Alarm function If the slave is equipped with alarm function (e.g. F10), when an alarm incident occurs, the slave will forward it for the master to process. There is no such function on device that is not equipped with alarm function.
Page 44
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 2. The Connection of the Master and the Slave Currently, three modes-RS232, Wiegand and RS485 are applicable for the connection of the master and the slave. Of the three, RS232 is less often used due to its deficiency that its connection distance is short. For example, it can be used when the master and the slave are just installed respectively inside and outside a door. Its connection principle is similar to that of RS485, which is omitted here. The Wiegand connection is widely used most of whose devices on the market are applicable to the master and the slave. RS485, whose transmission distance is great (however it is recommended that the distance should not be over 600 meters), applies to most occasions, but the slave must be equipped with the inBIO reader (which is used for collecting fingerprint or swiping card). If Wiegand connection is to be used, the connection and setting for antipassback are as follows: 1) Select model: Master machine: Machine with Wiegand in function, except for F10 Reader. Slave machine: Machine with Wiegand Out function. 2)Masterslave menu setting: This machine supports out, in, outin, No, No and saved antipass back (enter Menu > setting > system setting > advanced setting > antipassback). 3) Modify device’s Wiegand output format: If the two devices are communicating, only Wiegand signals without device ID can be received. Enter device Menu > Comm. Opt > Wiegand option or enter software: Basic setting > device management > Wiegand, to modify “defined format” as “wiegand26 without device ID”. 4) Enroll user: The user must be on master machine and slave machine at the same time, and user PIN must be the same. ...
10. Appendix and the slave is only used as a collector. Therefore, the software only needs to manage user information and record information on the master. 1) Choosing devices: The master: It must have the 485 communication function (upgrade firmware required). The slave: It must use the inBIO readers (reader only responsible for collecting fingerprint, such as F11 and SR200). 2) Setting the menu on the master: Setting the master: ①Access Menu>Settings>System Settings>Advanced Settings>Anti passback. The setting can be "Out", "In", "In Out", "None and save " or "None". ②Access Menu>Settings> Access Options>485 reader. If "Yes" is chosen, the master and slave function of 485 modes is started and at the same time the communication function with PC is forbidden. If "No" is chosen, the machine runs normally the communication function of PC. Setting the slave: Set the device number, identical to the master. 3) Connecting the master and the slave The master and the slave are for RS485 communication, whose connection is shown as in the figure: Master Slave 485+ ...
Page 46
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) fingerprint images to the background for verification, stores verification results in background database and displays them on the LCD screen of the device. The RIS solution is especially suited to large database match of factories with a headcount of 1000 to 3000 employees, making time & attendance tracking highly efficient. Furthermore, to address the issue of crossfactory staff mobility, we also propose the zone and quasiDNS solutions. By logically dividing server locations and dynamically identifying staff mobility, the device realizes free staff mobility and dispenses with manual configurations. The quasiDNS solution developed based on the DNS ensures stable system running and even and efficient resource allocations even in the case of traffic burst. RIS Architecture The basic mode of the RIS is client/server (c/s) mode, as shown in the following figure. The device only serves as the fingerprint reader and sends fingerprints to the RIS. The RIS verifies the fingerprint templates ...
10. Appendix 10.15 Web Server Access Control Overview of Web Server Access Control Software The Web server access control system is remote data collection/access control system based on the Web Server technology and underpinned by the standard TCP/IP network structure. It adopts the common Web page requests to handle and manage data. It is free from geographical restrictions and does not require the installation of other software. You can download the employee data stored in the remote fingerprint terminal through various types of browsers such as IE and Netscape, and prepare statistical reports for enterprise management and decisionmaking. With the Web Server access control software, customers can really have ...
Page 48
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) prepares to send a data stream. The asynchronous lowlevel pulse (smaller than Vol) generated by the card reader is sent to the access control panel (The sawtooth wave as shown in Figure 1) through Data1 or Data0. Data1 and Data0 pulses will neither overlap nor be generated synchronously. Table 1 lists the maximum and minimum pulse widths (a consecutive pulse) and pulse jump time (time between pulses) allowed by the F series fingerprint access control terminal. Table 1 Pulse Time Symbol Definition Typical Value of Reader Tpw Pulse Width 100 µs Tpi Pulse Interval 1 ms Figure 1 Sequence Diagram Wiegand Format The Wiegand format adopted by the device is the universal access control protocol. 26Bit Wiegand Format The composition of the open de facto 26 Bit Weigand industry standard contains 8 bits for the facility code and 16 bits for the ID number field. Mathematically, these 8 facility codes allows for a total of just 256 (0 to 255) facility codes, while the 16 ID number bits allow for a total of only 65,536 (0 to 65,536) individual ID's within each facility code. 26Bit Wiegand format is of 26 bits in length, including 2 bits for parity bits. ...
Page 49
10. Appendix Pyramid Wiegand format Several alternatives exist for customers who require more codes. The first is to switch to Keri’s standard 39 bit Pyramid format. This 39 bit Wiegand format contains 17 bits for the facility code field and 20 bits for the ID number field. Mathematically these 17 facility code bits allow for a total of 131,072 (0 to 131,071) facility codes, while the 20 ID number bits allow for a total of 1,048,576 (0 to 1,048,575) individual ID’s within each facility code. Since there are so many facility codes in the Pyramid format, a new facility code may be selected for each project. Additionally the large number of ID’s per facility code makes the Pyramid format ideal for very large projects. For added security, Keri Systems tracks credential coding to ensure that no duplication occurs. Table 3 provides a summary of the Pyramid Wiegand format. Table 3 Pyramid Wiegand Format Bit Number Meaning Bit 1 Even parity over bits 2 to 9 Bits 2 to 18 Facility code (0 to 131,071); Bit 2 is MSB Bits 19 to 38 ID Number (0 to 1,048,575); Bit 19 is MSB Bit 39 Odd parity over bits 20 to 38 Custom Wiegand Formats The second alternative is to create a custom Wiegand format. Typically, up to 64 bits are available for creating a custom Wiegand format. With certain limitations, formats with greater than 64 bits may be created. If a customer currently has a custom Wiegand format from Wiegand or from other proximity manufacturers, Keri ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 10.18 Soap Interface Definition of SOAP SOAP is a lightweight protocol for exchange of information in a decentralized, distributed environment. SOAP defines a type of scalable message handling framework by using the XML technology and provides a structure for exchange of information through multiple underlying protocols. The framework has been designed to be independent of any particular programming model and other implementation specific semantics. ...
10. Appendix ContentType: text/xml ‘The SOAP resolution format must be specified to be XML. ContentLength: nnnnn ‘The XML size of the SOAP request must be specified. SOAPAction:”uri:someuri” ‘Extended HTTP. It means the URI behind the action domain of the SOAP can be null. For example, the acceptable formats include: SOAPAction: SOAPAction:”” SOAPAction:”uri:someuri” The URI can be any valid domain name. The server returns the following after responding to the SOAP request: HTTP/1.0 200 OK ‘200 means success Server: WEBSERVER ContentType: text/xml Returned XMLSOAP data J Note: For further development and technical plans, please contact our technical personnel. 10.19 POE Function 1. Overview Power over Ethernet (POE) is a technology that enables DC power along with data to be provided to the Ethernetbased ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 5 Power 6 RX 7 GND 8 GND 3. Advantages Costeffective A POE system only needs to support one cable. In many cases, the POE system needs to be installed in the places where AC power is hard to deploy. The POE system enables an increasing number of devices over Ethernet to dispense with local power and thus greatly reduces deployment costs and simplifies device management. Easytoinstall and easytomanage The POE can coexist with the legacy devices and Ethernet cables on network. Safe The PSE only supplies power to the devices that need power supply. The Ethernet cable has a voltage only when the PSE connects with the PD, which eliminates the creep age risk. Ease of management of network devices When a remote device connects with a network, the POE can implement remote control, reallocation or reset of this remote device. 10.20 Backup Battery (MiniUPS) A prerequisite for device’s proper work is the normal power supply in any cases. Apart from power adaptors, we also provide 5V and 12V MiniUPSs which can reduce the impact of power failure as a result of power supply problems on the device operation to the greatest extent. ...
10. Appendix Charge time: ≥5.0 H Discharge time: 3.0±0.5 H Indicator: The red indicator is on during charge. The green indicator is on when the battery is saturated. 3. Connection mode Tip: Please first connect the MiniUPS to the FRP and then charge the MiniUPS. 4. Storage During long term storage (over 3 months), keep batteries with 50% of rated capacity (perform charging once every 3 months) and put them in a cool and dry place with an ambient temperature from 10°C–30°C, far away from erosive substances, fire and heating sources. 5. Precautions for use of batteries Failure to read the following precautions carefully may lead to battery leakage, overheat, sparking, explosion or rupture. Do not connect anode and cathode of the battery directly. l Do not use batteries in places with ambient temperature over 45°C. l Do not expose batteries to water or get wet. l Do not use or store batteries near heating sources (for example, fire or heater). l Use the original factory charger. l ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 10.22 Automatic Time Calibration Considering the huge workload for onebyone time calibration of multiple devices in a network, you can specify a device or PC in this network as a time server, and set the Automatic Time Calibration option of the tobecalibrated devices to the IP address of the specified time server. Then other devices will automatically connect with this server for time calibration. You only need to ensure that all the devices can access the time server. For example, several devices in a network support the automatic time calibration function. Set device A to the th time server. The display time of device A is 11:00 on October 28 2006, and its IP address is assumed “192.168.1.100”. You need to set the time of devices in the quantity of M in this network to be synchronous ...
10. Appendix The value scope of week (WS): 1 – 6. 1 means the first week, 2 the second week and so on and so forth. The value scope of day (WK): 0 – 6. 0 means Sunday, 1 means Monday and so on and so forth. st Let’s take 4:00 September 1 2008 (that is, Saturday of the first week in September 2008) as an example to illustrate these two modes: MMDD 24H MMWSWK 24H 9–1 04:00 916 04:00 WK (0:Sun 6:Sat) ESC OK ESC OK Mode 1 Mode 2 J Note: 1. If the month set in the DLST start time is later than that set in the DLST end time, the DLST will span two years, for example, the DLST starts at 201291 4: 00 and ends at 201341 4:00. 2. If you select Mode 2 and set the DLST to start on Sunday of the sixth week and current year is 2012, then the system will start the DLST at the specified time point on the last Sunday of current month in 2013 once finding out that there are only 5 weeks in current month. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) TZ Voice 001 07:00–09:00 002 10:00–12:00 003 00:00–00:00 004 00:00–00:00 005 00:00–00:00 006 00:00–00:00 007 00:00–00:00 008 00:00–00:00 After completing the settings, press OK. These settings will take effect after the device restart. 10.25 Work Code [Function Description] The concept of work code is introduced to facilitate the software to handle the verification records according to different cases. For example, we define “1” for eating, “2” for seeing a doctor and “3” for smoking, and input corresponding value when performing a specific action. In this way, the software can easily differentiate among events 1, 2 and 3. ...
10. Appendix If you select “None”, this function is not enabled. And you will not be prompted to enter the work code by the system in response to any of your operations. J Notes: 1. The existing attendance software can save the field to the database when downloading the attendance records, but it cannot handle the work code. 2. The existing offline communication development kit supports the work code for users to handle the work code in the second development. Users can perform classified handling of the records based on the different work codes so as to collect statistics of different events and verification modes. 10.26 DHCP The Dynamic Host Configuration Protocol (DHCP) provides a framework for allocating dynamic IP addresses to hosts on a TCP/IP network. DHCP consists of two components: server and client. The DHCP server performs ...
Page 58
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) If “Allow Group” is set to Y, the following dialog box will be displayed during the enrollment of a new user. The new user needs to first set the group that he/she belongs to and then enroll the system. New Enrol Input Group ID 1 ESC OK J Note: Current group number is a default value. If you want to change this group number, you only need to input a new number. “Match by Group” mode When “Allow Group” is set to Y, the system adopts the “match by group” mode for verification. Therefore, users are divided into different groups and they need to first input the number of the group that they belong to and then place their fingers on the device for verification. For details, see 3.4.1 Fingerprint Verification. J Note: The users in “Default Group” can directly place their fingers on the device for fingerprint match without inputting their group numbers. The system deems current group as “Default Group” by default. Group attributes Select ...
10. Appendix 10.28 T9 Input Method Every of the number keys 2–9 is distributed with 3 or 4 English letters, for example, key 1 has three letters A, B, and C. You only need to type the key for the desired letter once, all the corresponding uppercase and lowercase letters come up. You can press ▲/▼ to choose the desired letter. The user can type his/her name, department name, and work shift by T9 input method. The keyboard layout of T9 input method is as follows: For example: To input a user name “Robert”, proceed as follows: 10.29 TTS Function By use of the TTS technology, the device converts normal language text into the speech that can be output as WAV files. The device dynamically edits and plays the speech so that users can enjoy clear natural voice. Users can modify or customize individualized voice prompts as desired by using PC software. ...
B&W Screen Series Standalone Access Controller and Reader User Manual (Professional Version) 10.30 Statement on Human Rights and Privacy Dear Customers: Thank you for choosing the hybrid biometric products designed and manufactured by us. As a worldrenowned provider of biometric technologies and services, we pay much attention to the compliance with the laws related to human rights and privacy in every country while constantly performing research and development. We hereby make the following statements: 1. All of our fingerprint recognition devices for civil use only collect the characteristic points of fingerprints instead of the fingerprint images, and therefore no privacy issues are involved. ...
10. Appendix 10.31 EnvironmentFriendly Use Description The Environment Friendly Use Period (EFUP) marked on this product refers to the safety period of time in which the product is used under the conditions specified in the product instructions without leakage of noxious and harmful substances. The EFUP of this product does not cover the consumable parts that need to be replaced on a regular basis such as batteries and so on. The EFUP of batteries is 5 years. Names and Concentration of Toxic and Hazardous Substances or Elements Toxic and Hazardous Substances or Elements Parts Name Pb Hg Cd Cr6+ PBB PBDE ...
Need help?
Do you have a question about the TF1700 and is the answer not in the manual?
Questions and answers