Foreword General This manual introduces the installation and basic operations of the Face Recognition Access Controller (hereinafter referred to as "access controller"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
About the Manual ● The manual is for reference only. Slight differences might be found between the manual and the product. ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual.
Important Safeguards and Warnings This section introduces content covering the proper handling of the access controller, hazard prevention, and prevention of property damage. Read carefully before using the access controller, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the access controller under allowed humidity and temperature conditions.
Page 5
● The access controller is a class I electrical appliance. Make sure that the power supply of the access controller is connected to a power socket with protective earthing.
Table of Contents Foreword ..............................I Important Safeguards and Warnings ....................... III 1 Overview ............................... 1 Introduction ..........................1 Features ............................1 Application ............................ 1 Dimension and Component ......................2 2 Connection and Installation ........................3 Cable Connections ......................... 3 Installation Notes ...........................
Page 7
3.10.9 Reboot..........................28 USB ............................28 3.11.1 USB Export ........................28 3.11.2 USB Import ........................29 3.11.3 USB Update ........................30 Features ............................ 30 3.12.1 Privacy Setting ......................... 32 3.12.2 Result Feedback ....................... 33 Record ............................35 Auto Test ........................... 36 System Info ..........................
Page 8
Online User ..........................62 System Log ..........................63 4.17.1 Querying Logs ........................63 4.17.2 Backup Logs ........................64 4.17.3 Admin Log ........................64 Exit ............................64 5 FAQ ..............................65 Notes of Temperature Monitoring ..................66 Notes of Face Recording/Comparison ................. 67 Cybersecurity Recommendations ..................
Overview Introduction The access controller is an access control panel that supports unlock through faces, passwords, cards, and supports unlock through their combinations. Features LCD display, the resolution of 7-inch access controller is 1024 × 600. Support face unlock, IC card unlock, and password unlock; unlock by period ...
Networking Dimension and Component Dimensions and components of model Y (mm [inch]) Table 1-1 Component description (2) Name Name Temperature monitoring unit Display IR light Card swiping area Phototransistor White LED illuminator Dual cameras...
Connection and Installation Cable Connections The access controller needs to be connected to devices like sirens, readers, and door contacts. Table 2-1 Port description Port Cable color Cable name Description Black RD– Negative electrode of external card reader. Positive electrode of external card reader. Blue CASE Tamper alarm input of the external card reader.
Port Cable color Cable name Description gray White Connected to the common GND port. green White Brown ALARM1 Alarm 1 input port. White Connected to the common GND port. yellow White ALARM2 Alarm 2 input port. purple Black and red RS-232 receiving port.
Page 13
Temperature Monitoring Requirement It is recommended to install the temperature monitoring unit in an indoor windless environment (a relatively isolated area from the outdoor), and maintain the ambient temperature at 10 °C to 35 °C. Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable ...
Places Not Recommended Places not recommended Installation Make sure that the distance between the camera and ground is 1.4 meters. Installation height...
Page 15
Installation diagram Installation Procedure Fix the temperature monitoring unit to the bracket with 3 screws. Drill five holes (four bracket installation holes and one cable entry) in the wall according to holes in the bracket. Fix the bracket on the wall by installing the expansion screws into the four bracket installation holes.
System Operations Basic Configuration Procedure Basic configuration procedure Common Icons Table 3-1 Icon description Icon Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. Turn to the previous page of the list. Turn to the next page of the list.
Initialization Administrator and password set on this interface are used to log in to the web management platform. The administrator password can be reset through the email address you entered if the administrator forgets the password. The password must consist of 8 to 32 non-blank characters and contain at least two types of ...
Homepage Table 3-2 Homepage description Description Unlock methods: Card, face and password. When card, face, and password are all set as unlock mode, the password icon will not be displayed at the top left corner of the access controller. Date & Time. Displays the current date and time. Display the network status and USB status.
Page 19
Different modes support different unlock methods, and the actual interface shall prevail. Administrator login The main menu interface is displayed.
Main menu Unlocking Methods You can unlock the door through faces, passwords, and cards. 3.6.1 Cards Put the card at the card swiping area to unlock the door. 3.6.2 Face Make sure that your face is centered on the face recognition frame, and then you can unlock the door.
on the homepage. Enter the user ID, and then tap Enter the user password, and then tap The door is unlocked. 3.6.4 Administrator Password Enter the administrator password, and then you can unlock the door. There is only one administrator password for one access controller.
Page 22
New User Info Configure parameters on the interface. Table 3-3 New user parameter description Parameter Description Enter user IDs. The IDs can be numbers, letters, and their combinations, and the User ID maximum length of the ID is 32 characters. Each ID is unique. Name Enter names with at most 32 characters (including numbers, symbols, and letters).
Parameter Description User: Users only have door unlock permission. Admin: Administrators can unlock the door and also have parameter configuration permission. No matter whether there is an administrator in the access controller, administrator identity authentication is needed. Period You can set a period in which the user can unlock the door. Holiday You can set a holiday plan in which the user can unlock the door.
Page 24
3.8.1.1 Period Config You can configure 128 periods (weeks) whose number range is 0–127. You can set four periods on each day of a period (week). Users can only unlock the door in the periods that you set. 3.8.1.2 Holiday Group You can set group holidays, and then you can set plans for holiday groups.
3.8.2 Unlock There are three unlock modes: unlock mode, unlock by period, and group combination. Unlock modes vary with controller access models, and the actual controller access shall prevail. 3.8.2.1 Unlock Mode When the Unlock Mode is on, users can unlock through cards, faces, passwords, or any one of all the unlocking methods.
Page 26
And then the Unlock Mode interface is displayed. Enable the Unlock Mode. means enabled. means not enabled. 3.8.2.2 Unlock by Period Doors can be unlocked through different unlock modes in different periods. For example, in period 1, the door can only be unlocked through cards; and in period 2, doors can only be locked through faces.
Page 27
means not enabled. 3.8.2.3 Group Combination Doors can only be unlocked by a group or groups that consist of more than two users if the Group Combination is enabled. Select Access > Unlock Mode > Group Combination. Group Combination to create a group.
to go back to the previous interface. to save the settings. Enable the Group Combination. means enabled. means not enabled. 3.8.3 Alarm Configuration Administrators can manage visitors’ unlock permission through alarm configuration. Select Access > Alarm. The Alarm interface is displayed. Alarm means enabled.
Parameter Description door contact released. A timeout alarm will be triggered if the time that a user takes to unlock the Door Sensor door exceeds the Door Sensor Timeout time. Timeout The Door Sensor Timeout time range is 1–9999 seconds. Only when the Door Sensor On is enabled can the intrusion alarm and door Door Sensor On sensor timeout alarm be triggered.
Page 30
IP address configuration Table 3-6 IP configuration parameters Parameter Description The IP address, subnet mask, and gateway IP address should be on the IP Address/Subnet Mask/Gateway same network segment. After configuration, tap to save the Address configurations. DHCP (Dynamic Host Configuration Protocol). When the DHCP is enabled, the IP address can be automatically acquired, DHCP and the IP address, subnet mask and gateway IP address cannot be...
3.9.1.3 Wi-Fi You can connect the access controller to the network through Wi-Fi if the access controller has Wi-Fi function. 3.9.2 Serial Port Settings Select serial input or serial output according to the use of the external devices. Select Connection > Serial Port, and then the Serial Port interface is displayed. Serial port Select Serial Input when external devices that are with card reading and writing functions are ...
Select Wiegand Output when the access controller works as a reader that can be connected to the controller. See Table 3-8. Table 3-8 Wiegand output Parameter Description The Wiegand Output Type determines the card number or the digit of the number that can be recognized by the access controller.
3.10.2 Face Parameter Face parameter Tap a parameter and do configuration, and then tap Table 3-9 Face parameter Name Description Face Recognition Face recognition accuracy can be adjusted. The larger the value is, the Threshold higher the accuracy will be. Max.
Page 34
Name Description Recognition the wider range of the profiles will be recognized. Pupillary distance is the pixel value of the image between the centers of the pupils in each eye. You need to set an appropriate value so that the access controller can recognize faces as needed.
Name Description No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt Mask Mode mask reminder and passage is allowed. Mask intercept: Mask is detected during face recognition.
After the access controller is restored to the factory settings, IP address will not be changed. You can select whether to retained user information and logs. You can select to restore the access controller to the factory settings with all user information ...
USB export Select the data type that you want to export. The prompt Confirm to export is displayed. Tap OK. Data exported will be saved in the USB. 3.11.2 USB Import Only data in the USB that was exported from one access controller can be imported into another access controller.
USB Import Select the data type that you want to import. The prompt Confirm to import is displayed. Tap OK. Data in the USB flash drive will be imported into the access controller. 3.11.3 USB Update USB flash drive can be used to update the system. Rename the updating file name to "update.bin", and save the "update.bin"...
Page 39
Features Table 3-10 Feature description Parameter Description Privacy Setting See "3.12.1 Privacy Setting" for details. If the third party card reader needs to be connected to the access controller through the wiegand output port, you need to enable the Card Card No.
3.12.1 Privacy Setting Privacy setting Table 3-11 Features Parameter Description If the PWD Reset Enable function is enabled, you can reset the password. PWD Reset Enable The PWD Reset function is enabled by default. Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network.
Parameter Description Clear all captured Tap the icon, and you can delete all captured photos. photos 3.12.2 Result Feedback You can select a result feedback mode as needed. Mode 1 Mode 1...
Search punch records Auto Test When you use the access controller for the first time or when the access controller malfunctioned, you can use auto test function to check whether the access controller can work normally. Do actions according to the prompts.
Auto test When you select Auto Test, the access controller will guide you to do all the auto tests. System Info You can view data capacity, device version, and firmware information of the access controller on the System Info interface.
Web Operations The access controller can be configured and operated on the web. Through the web you can set network parameters, video parameters, and access controller parameters; and you can also maintain and update the system. Initialization You need to set a password and an email address before logging in to the web for the first time. Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of the access controller in the address bar, and then press Enter.
Page 47
Auto check You can decide whether to select Auto Check or not. It is recommended that Auto Check be selected to get the latest program in time. Click Next. Finished configuration Click Complete, and the initialization is completed. The web login interface is displayed.
Login Open IE web browser, enter the IP address of the access controller in the address bar, and press Enter. Use browser newer than IE 8, otherwise you might not log in to the web. Make sure that the computer used to log in to the web is in the same LAN with the ...
Page 49
Tips Read the tips. Click OK. The Reset Password interface is displayed. Reset Password Scan the QR code on the interface, and you will get the security code. At most two security codes will be generated by scanning the same QR code. If ...
Please use the security code within 24 hours after you receive it. Otherwise, it will become invalid. If wrong security codes are entered for consecutive five times, the administrator will be frozen for five minutes. Enter the security code you have received. Click Next.
Page 51
Modifying alarm linkage parameter Table 4-1 Alarm linkage parameter description Parameter Description Alarm Input You cannot modify the value. Keep it default. Name Enter a zone name. There are two options: NO and NC. Alarm Input Type If alarm input type of the alarm device you purchased is NO, then you should select NO;...
4.4.2 Alarm Log You can view the alarm type and time range in the Alarm Log interface. Select Alarm Linkage > Alarm Log. The Alarm Log interface is displayed. Alarm log Select a time range and alarm type, and then click Query. The query results are displayed.
Data capacity Video Setting You can set parameters including data rate, image parameters (brightness, contrast, hue, saturation, and more), and exposure on the Video Setting interface. 4.6.1 Data Rate Data rate Table 4-2 Data rate parameter description Parameter Description Video Standard There are two options: NTSC and PAL.
Parameter Description There are four options: D1, VGA, 720p and 1080p. Select an option Video Format according to the video quality you want. Main The rate at which consecutive frames appear on a display. The frame Frame Rate Format rate range is 1–30fps. The number of bits that are conveyed or processed per unit of time.
Parameter Description Auto: The system automatically adjusts scene modes. Sunny: In this mode, image hue will be reduced. Night: In this mode, image hue will be increased. Sunny is selected by default. Day/Night mode decides the working status of the fill light. Auto: The system automatically adjusts the day/night modes.
Parameter Description Auto: The access controller will automatically adjust brightness of images. Shutter Priority: The access controller will adjust image brightness according to shutter exposure value range. If the image brightness is not enough and the shutter value has reached upper or lower limit, the access controller will adjust gain value automatically to get ideal brightness.
The red rectangles are motion detection area. The default motion detection range is all the rectangles. To draw a motion detection area, you need to click Remove All first. The motion detection area you draw will be a non-motion detection area if you draw in the default motion detection area.
4.6.6 Image Mode There are three options: indoor, outdoor and other. Select Indoor when the access controller is installed indoors; select Outdoor when the access controller is installed outdoors; and select Other when the access controller is installed at places with backlights like corridors and hallways. Image mode Face Detect You can configure human face related parameters on this interface to increase the accuracy of the...
Page 59
Face detect Configure parameters. Table 4-5 Face detect parameter description Parameter Description Face Recognition The larger the value is, the higher the accuracy will be. Threshold Max. Angle of Face The larger the angle is, the wider range of the profiles will be recognized. Recognition This function prevents people from unlocking by human face images or Anti-fake Threshold...
Page 60
Parameter Description When a person who does not have the access permission stands in front of the access controller and gets the face recognized, the controller will Recognition Timeout prompt that face recognition failed. The prompt interval is called recognition timeout. When a face has no access permission stands in front of the access Invalid Face Prompt controller, the controller will prompt that the face is invalid.
Parameter Description monitored temperature is 0.5 °C lower than the actual temperature, the correction value is set to 0.5 °C; if the monitored temperature is 0.5 °C higher than the actual temperature, the correction value is set to -0.5 °C. Only the access controller with a temperature monitoring unit supports this parameter.
Table 4-6 TCP/IP Parameter Description IP Version There is one option: IPv4. MAC Address MAC address of the access controller is displayed. Static Set IP address, subnet mask, and gateway address manually. DHCP After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured.
Default value is 80. If other value is used as port number, you need to add this HTTP Port value behind the address when logging in through browsers. Default value is 443. HTTPS Port RTSP Port Default value is 554. Click OK to complete the setting.
Select Network Setting > P2P. The P2P interface is displayed. Select Enable to enable P2P function. Click OK to complete the setting. Scan the QR code on your web interface to get the serial number of the access controller. Date Setting You need to set time zone, time, DST, and NTP for the access controller.
Date Setting Set parameters. Table 4-9 Date setting Parameter Description Time Zone Select time zone as needed. You can set system time manually, or you can click Sync with PC, to System Time scynchronize access controller time with the computer time. 1.
IP authority 4.10.2 Systems 4.10.2.1 System Service There are four options: SSH, PWD Reset Enable, CGI, and HTTPS. Refer to "3.12 Features” to select one or more than one of them. The system service configuration done on the web page and the configuration on the Features interface of the access controller will be synchronized.
4.10.2.3 Downloading Root Certificate Click Download Root Certificate. Select a path to save the certificate on the Save File dialog box. Double-click on the Root Certificate that you have downloaded to install the certificate. Install the certificate by following the onscreen instructions. User Management You can add and delete users, modify users’...
Onvif user Maintenance You can make the access controller reboot itself in idle time to improve the running speed of the access controller. You need to set the auto reboot date and time. The default reboot time is at 2 O’clock in the morning on Tuesday. Click Reboot Device, the access controller will reboot immediately.
4.13.1 Config Mgmt. When more than one access controller needs the same configuration, you can configure parameters for them by importing or exporting configuration files. Configuration management 4.13.2 Features Select result feedback mode as needed. For details, see "3.12.2 Result Feedback." Features 4.13.3 Wiegand Serial Port Setting Select Wiegand/serial port setting as needed.
Wiegand serial port setting Upgrade You can select Auto Check to upgrade the system automatically. You can also select Manual Check to upgrade the system manually. Upgrade Version Information You can view information including MAC address, serial number, MCU version, web version, security baseline version, and system version.
Online user System Log You can view and backup the system log on the System Log interface. System log 4.17.1 Querying Logs Select a time range and its type, click Query, and logs meet the conditions will be displayed.
4.17.2 Backup Logs Click Backup to back up the logs displayed. 4.17.3 Admin Log Enter Admin ID on the Admin Log interface, click Query, and then you will see the administrator’s operation records. Admin log Hover the mouse cursor over , and then you can see detailed information of the current user.
The access controller fails to start after power-on. Check whether the 12V power supply is correctly connected, and whether the power button is pressed. Faces cannot be recognized after the access controller powers on. Make sure that Face is selected in the unlock mode. See “3.8.2 Unlock”. Make sure that Face is selected as unlock mode in Access >...
Notes of Temperature Monitoring Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. Install the temperature monitoring unit in an indoor windless environment, and maintain the ...
Notes of Face Recording/Comparison Before Registration Glasses, hats, and beards might influence face recognition performance. Do not cover your eyebrows when wearing hats. Do not change your beard style greatly if you will use the device; otherwise face recognition ...
Page 76
Do not shake your head or body, otherwise the registration might fail. Avoid two faces appear in the capture frame at the same time. Face Position If your face is not at the appropriate position, face recognition effect might be influenced. Appendix Figure 2-2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair.
Page 77
Appendix Figure 2-3 Head position Appendix Figure 2-4 Face distance When importing face images through the management platform, make sure that image resolution is within the range 150 × 300–600 × 1200; image pixels are more than 500 × 500; image size is less than 75 KB, and image name and person ID are the same.
Cybersecurity Recommendations Mandatory actions to be taken for basic equipment network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols.
Page 79
5. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6.
Page 80
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend: ● Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. ● The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect.
Need help?
Do you have a question about the DHI-ASI7213Y-V3-T1P and is the answer not in the manual?
Questions and answers