Kedacom KSCA121 Series User Manual

Face recognition access control system

Advertisement

Quick Links

KEDACOM
User Manual for Face Recognition
Access Control System
of KSCA121 Series
V1.1 (September, 2021)

Advertisement

Table of Contents
loading

Summary of Contents for Kedacom KSCA121 Series

  • Page 1 KEDACOM User Manual for Face Recognition Access Control System of KSCA121 Series V1.1 (September, 2021)
  • Page 2 User Manual Trademarks ® ® ® , Kedacom , TrueSens , and NexVision are registered trademarks of Suzhou Keda Technology Co., Ltd. in China and various other countries. All other trademarks mentioned in this document are the property of their respective holders.
  • Page 3 User Manual Target Audience Administrators and Operators of Video Surveillance Products Document Version V1.1 Software Version 7.3.3 Applicable Models KSCA121 series Related Document Quick Start Guide Convention Icon Convention Notes and warnings: necessary supplements to operations Menu, e.g. Drag to Zoom >...
  • Page 4: Table Of Contents

    Face Recognition Access Control System User Manual Contents Product Brief ............................5 Device Touch Screen ..........................9 Startup ............................. 9 2.1.1 Local Activation ......................... 9 2.1.2 Stand-By Interface ........................10 Login ............................... 11 Personnel ............................12 2.3.1 Register ........................... 12 2.3.2 Search .............................
  • Page 5 Face Recognition Access Control System User Manual 3.1.5 Main Interface ......................... 51 Basic Functions ..........................52 3.2.1 Live View ..........................52 3.2.2 Playback ..........................53 3.2.3 Snapshot ..........................56 3.2.4 Local Setting ........................... 56 Network ............................59 3.3.1 IP and Port ..........................59 3.3.2 Access Protocol ........................
  • Page 6: Product Brief

    User Manual 1. Product Brief KSCA121 series are a kind of face recognition access control and attendance system. It supports multiple opening modes, including face/card/fingerprint, face & card & fingerprint, full match of face and ID photo, and remote help. It manages access electric lock and checks on work attendance through face recognition.
  • Page 7 Face Recognition Access Control System User Manual Picture 1-2 Product appearance (Vertical type)
  • Page 8 Face Recognition Access Control System User Manual Picture 1-3 Product appearance (Desk type) Features:  2.0MP 1/2.8” high-performance image sensor;  H.264 encoding, 1080P@25fps HD live video;  8-inch LCD touch screen, show face comparison information and provide good man-machine interaction;...
  • Page 9 Face Recognition Access Control System User Manual  Support stand-alone off-line operation, input card and face information locally to manage without platform or command center;  Real-time uploading data to the command center to manage the blacklist at real time; ...
  • Page 10: Device Touch Screen

    Face Recognition Access Control System User Manual 2. Device Touch Screen 2.1 Startup Please refer to the Quick Start Guide for device installation and wire connection. For first-use of the device, user should activate it by any of the three methods: local activation, web client activation and IPCSearch activation.
  • Page 11: Stand-By Interface

    Face Recognition Access Control System User Manual Picture 2-2 Local activation Enter password, confirm password, and the email address for claiming password; Tap “Activate” to activate the device. Note:  To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters.
  • Page 12: Login

    Face Recognition Access Control System User Manual Picture 2-3 Stand-by interface  If the person to be recognized is in the database (registered or imported) and the face recognition score reaches the threshold, it will show verification succeeded and display the person‟s name at the bottom of the screen. ...
  • Page 13: Personnel

    Face Recognition Access Control System User Manual 2.3 Personnel Tap Menu>Personnel to register and search personnels. Picture 2-5 Personnel management 2.3.1 Register Tap Menu > Personnel > Register to add new user and register information such as name, certificate type, certificate No. and etc. Tap Menu >...
  • Page 14 Face Recognition Access Control System User Manual Tap “Confirm” to enter the information registration interface and input name, certificate type, certificate No. and etc. Picture 2-7 Registration information Picture 2-8 Registration information When there is an access card, tap “Access Card” to select a card and put the access card on the card area to register access card number;...
  • Page 15: Search

    Face Recognition Access Control System User Manual  When one access card is shared by several people, please make sure the verification method is the same, otherwise there will be a mess. Tap “Save” to complete personnel registration; Note: If the certificate number of the same type already exists when saving the information, it will pop up “The ertificate number already exists, please confirm if you would like to save anyway.”...
  • Page 16 Face Recognition Access Control System User Manual Picture 2-10 Search result Select the expected one and tap to view the personnel detail. Picture 2-11 Personnel detail...
  • Page 17: Network

    Face Recognition Access Control System User Manual  Edit: Tap “Edit” to edit the information, but the certificate type and certificate No. are non-editable; tap “Save” to finish.  Delete: Tap “Delete” and select “Confirm” to delete the personnel information. 2.4 Network Tap Menu >...
  • Page 18: Wireless

    Face Recognition Access Control System User Manual Picture 2-13 Ethernet Select “Mode”. If selecting “DHCP”, it will assign IP address automatically; if selecting “Static”, input “IP Address”, “Subnet Mask” and “Default Gateway” manually; tap “Save” to finish configuration. 2.4.2 Wireless Tap Menu >...
  • Page 19 Face Recognition Access Control System User Manual Picture 2-14 WiFi When it‟s necessary to access to wireless network, enable “Station Mode”, and select AP hotspot from the list for the device to connect to. Picture 2-15 Station mode Select a hotspot from the list and enter the “WiFi” setting interface; select mode according to actual request, including “Static”...
  • Page 20: Peripheral

    Face Recognition Access Control System User Manual enter the password; when selecting “Static”, configure IP address, subnet mask and default gateway manually.After finishing, tap “Save” to connect to the selected WiFi network. Picture 2-16 Wifi- DHCP and Static 2.4.3 Peripheral Tap Menu >...
  • Page 21: Wigan

    Face Recognition Access Control System User Manual Picture 2-17 Peripheral Select a peripheral device, options including “Access Control Host”, “Gate Control”, “Elevator Control” and “Card Reader”. Tap “Save” to finish. 2.4.4 Wigan Tap Menu > Network > Wigan, and configure parameters by actual request. When connecting to the access control host through Wigan port, the WG0 wire of the buttcock line connects to the D0 wire of access control host, the WG1 wire to the D1 wire of access control host, and the GND wire to the earth wire of access control host.
  • Page 22 Face Recognition Access Control System User Manual Picture 2-18 Wigan  Mode: Options include Wiegand 26 and Wiegand 34. The data transmission rules are as follows:  It transmits 10-bit “Int” type data and the limit value is 4294967295. When the data is over the limit value, it will turn the first bit to 0.
  • Page 23: Settings

    Face Recognition Access Control System User Manual Picture 2-19 Output ID 2.5 Settings Tap Menu > Settings and configure “Basic Info”, “Time”, “Face” “Fingerprint” (some models support), “Advanced” and “Language”. Picture 2-20 Settings...
  • Page 24: Basic

    Face Recognition Access Control System User Manual 2.5.1 Basic Tap Menu > Settings > Basic Info and configure parameters such as voice volume, text prompt, light tips, white light control, auto screen-off, auto screen-off time and etc. Picture 2-21 Basic info ...
  • Page 25 Face Recognition Access Control System User Manual  Text Prompt Tap “Text Prompt” to enter the text prompt interface; select the prompt text displayed on the main interface when the device recognizes a user, options including “Name”, “ID No.”, “Name& ID No.” and “Disable”; if selecting “Disable”, when the device recognizes a user, there will be no text prompt;...
  • Page 26: Time

    Face Recognition Access Control System User Manual Picture 2-24 White light control  Auto Screen-Off Enable or disable auto screen-off function. If enabled, user can configure the auto screen-off time (unit: second). If no operation is done to the device in the configured duration, the device will skip to the stand-by interface.
  • Page 27: Face

    Face Recognition Access Control System User Manual Picture 2-25 Time  Time Format: Tap “Time Format” and select a displaying format of time, options including “MM-DD-YYYY”, “DD-MM-YYYY” and “YYYY-MM-DD”. Tap “Save” to validate setting.  Time: Tap “Time” to enter time setting interface and configure date and time manually;...
  • Page 28 Face Recognition Access Control System User Manual Picture 2-26 Face  Face Posture Threshold: Configure the threshold score for face recognition, the range being 0~100 points. The device will assess face posture from the perspective of vertical pitching angle, horizontal level angle and interorbital distance; if the score is lower than the preset value, the face recognition will fail, and face comparison or face registration will fail.
  • Page 29: Advanced

    Face Recognition Access Control System User Manual 2.5.4 Advanced Tap Menu > Settings > Advanced to delete personnel data and event data, restore to default settings, restore to factory default and etc. Picture 2-27 Advanced  Delete personnel data Tap “Delete personnel data” and it will pop up a prompt dialogue box. Tap “Confirm” and the device will clear all personnel data.
  • Page 30 Face Recognition Access Control System User Manual Tap “Call for Help” to enable or disable the function; after enabling, there will be 2 icons showing on the standby interface, call center and call user. Call center Call user Picture 2-28 Call for help ...
  • Page 31: Language

    Face Recognition Access Control System User Manual to enter call center interface and have conversations with the back-end platform when it connects.  Call user This function is unavailable now. Note: The “Call for Help” function is available only when the device accesses to the specific back-end platforms.
  • Page 32 Face Recognition Access Control System User Manual Picture 2-30 Access control Default Test Method: Tap “Default Test Method” to pop up a dialogue box; select a test  method, options including “Face”, “Card”, “Face & Card”, “Face/Card” and etc. Note: ...
  • Page 33: Management

    Face Recognition Access Control System User Manual  Door Magnetism Input: This function is used to feedback access control status to the platform. Options include “Normally Closed” and “Normally Open”, and the former is the default. When selecting “Normally Closed”, the door magnetism port SENS connects to the door magnetism switch NC port, and GND to door magnetism COM port;...
  • Page 34 Face Recognition Access Control System User Manual Picture 2-31 Management  Change Password Tap to select user and enter the “Administrator Info” interface; tap “Change Password” to enter “Change Password” interface; input the “Old Password”, “Change Password”, and “New Password Confirm”; tap “Save” to finish. Picture 2-32 Change password...
  • Page 35 Face Recognition Access Control System User Manual Note:  To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters.
  • Page 36: Event Search

    Face Recognition Access Control System User Manual Picture 2-34 Card login 2.8 Event Search The function of event search requires a TF card, so make sure the TF card has been inserted and works normally. Tap Menu > Event Search, and search event records. Picture 2-35 Search events...
  • Page 37: Storage

    Face Recognition Access Control System User Manual Input one or more of the conditions such as name, certificate No., event type and trigger time and tap “Search” to search expected event records. 2.9 Storage Tap Menu > Storage and view the “Memory Status” and “Memory Strategy”. Picture 2-36 Storage ...
  • Page 38: Function Test

    Face Recognition Access Control System User Manual Picture 2-37 Storage status  Capacity status: This table shows the “Maximum Number” and “Used Number” of “User”, “Card” and “Event”.  External storage: This table shows the “Total Capacity”, “Free Space” and “Status” of external storage.
  • Page 39: Sound Test

    Face Recognition Access Control System User Manual Picture 2-38 Function test 2.10.1 Sound Test Tap Menu > Function Test > Sound Test, and test if the sound function of the device is OK. Picture 2-39 Sound test...
  • Page 40: Card-Reader Test

    Face Recognition Access Control System User Manual Tap “Start Testing” and talk to the device. If you can hear what you said in 5 s normally, the sound function of the device is OK. 2.10.2 Card-Reader Test Tap Menu > Function Test > Card-Reader Test and test if the card reader works normally.
  • Page 41: Network Test

    Face Recognition Access Control System User Manual Picture 2-41 IO test  Magnetic Door Button Test: Confirm the device is connected to the door lock correctly. Tap “Start Testing” and if the door lock is normal, the door magnetic button triggers normally. ...
  • Page 42: System

    Face Recognition Access Control System User Manual Picture 2-42 Network test In “Destination Address”, input the IP address of the destination device and tap  “Ping” to display the result of accessing the destination IP address. It is used to test if the network between the device and the destination device is connected.
  • Page 43: Device Info

    Face Recognition Access Control System User Manual Picture 2-43 System 2.11.1 Device Info Tap Menu > System > Device Info and view information such as “Model”, “Serial No.”, “Hardware Version”, “Software Version”, “ISP Version” and etc. Picture 2-44 Device information...
  • Page 44: Device Log

    Face Recognition Access Control System User Manual 2.11.2 Device Log Tap Menu > System > Device Log and configure device log. Picture 2-45 Device log  Enable Log Records Tap “Enable Log Records” and the device will record user operations, alarm messages, system tasks and system exception logs.
  • Page 45 Face Recognition Access Control System User Manual Tap “Log Type” and select a type, options including “All”, “User Operation”, “Alarm Message”, “System Task” and “System Exception”; select “Trigger Time”, options including “Today”, “Yesterday”, “This Week”, “Last Week”, “This Month”, “Last Month”, “All” and “Custom”. When selecting “Custom”, user needs to input “Start Time”...
  • Page 46: Web Client

     Activate through IPCSearch Get IPCSearch from our website and install it according to the prompts (address: https://www.kedacom.com/cn/softtools/index.jhtml); After finishing installation, run IPCsearch and the system will search the cameras in LAN and display the list as shown below.
  • Page 47 Face Recognition Access Control System User Manual Picture 3-1 IPCSearch Note: Alias is subject to the actual search result. Select the device to be activated, right click and select “Activate”. On the popup interface, configure admin user password and email for claiming password. Click “Activate”...
  • Page 48: Configure Network Parameters

    Face Recognition Access Control System User Manual Configure the IP address of PC in the same network segment as that of the camera and input the camera address http://device IP address:8080 in browser. The device activation interface will pop up, as shown below: Picture 3-3 Activate through browser Configure admin user password and email for claiming password.
  • Page 49: Log In And Log Out Of The Web Client

    Face Recognition Access Control System User Manual Select a device whose network parameters should be modified. Click “Modify Params” or right click the mouse. Modify parameters and fill admin user name (admin) and the password set when activating the device. Picture 3-4 Modify Parameter Click “OK”...
  • Page 50 Face Recognition Access Control System User Manual address:8080” in the browser to enter the login interface. Input username and the password set during activation and click “Login”. Picture 3-6 Web Client Login Interface After login successfully for the first time, download and install the plug-in according to the prompts.
  • Page 51 Face Recognition Access Control System User Manual Picture 3-8 Quick Setting Picture 3-9 Unselect Configuration Guide  Log Out of the Web Client Click the icon at the top right corner of the interface to log out of the web client.
  • Page 52: Reset Password

    Face Recognition Access Control System User Manual 3.1.4 Reset Password If user enters a wrong username or password for 6 times, the camera IP will be locked up for 10 minutes, during which user cannot login to this camera. If user forgets the password, reset the password.
  • Page 53: Basic Functions

    Face Recognition Access Control System User Manual  Settings: configure camera functions and system parameters. Basic Functions 3.2.1 Live View Click “Live View” to enter the preview interface. Picture 3-12 Live View  Aspect Ratio Function Icon The live view window displays image in standard screen ratio 4:3. The live view window displays image in wide screen ratio of 16:9.
  • Page 54: Playback

    Face Recognition Access Control System User Manual disable audio. Click to select audio channel. Drag the slide bar to adjust volume Click this button to call and talk to camera. Click again to stop talking. Snapshot, click to capture current image. Click select camera snapshot or local snapshot.
  • Page 55 Face Recognition Access Control System User Manual Picture 3-13 Playback Operation steps: Select recording duration from the calendar. If there is background color on a date, it means there is recording on that day; Click "Search" and the video will be displayed directly in the timeline on the right (the highlight parts on the timeline);...
  • Page 56 Face Recognition Access Control System User Manual Decelerate playing speed; click the icon to decelerate the speed of playing the video, one-click to decelerate by 1/2x and one more click by 1/4x, max by 1/8x. Accelerate playing speed; click the icon to accelerate the speed of playing the video, one-click to accelerate by one time, max 8 times.
  • Page 57: Snapshot

    Face Recognition Access Control System User Manual 3.2.3 Snapshot Click “Snapshot” to enter the interface of snapshot management. User can view or download snapshots in TF card. Picture 3-14 Snapshot Snapshot search and download steps: Select required picture type(s) on the left checkboxes; Select duration of snapshots from "Time".
  • Page 58 Face Recognition Access Control System User Manual Picture 3-15 Local setting  Play  Protocol: Select the stream output protocol, options including UDP and TCP, default being TCP; UDP is applicable when the request for image quality is not high and the network is unstable. ...
  • Page 59 Face Recognition Access Control System User Manual  Enable Vertical Synchronization: When there is image tearing, enable vertical synchronization to improve image quality. Usually it‟s unnecessary to enable this option as it will increase CPU utilization.  Display Status Info: After enabling this function, there will be a status icon in the menu bar at the bottom of the live view window.
  • Page 60: Network

    Face Recognition Access Control System User Manual  Local Snapshot: Client captures an image and saves it locally. The image quality is ordinary, but there is no time delay.  Snapshot Save Path: Configure the local save path for snapshots captured during playback.
  • Page 61 Face Recognition Access Control System User Manual  IP Address Configuration When the IP version is IPV4, select “Static” or “DHCP” mode. When selecting static mode, configure IP address, subnet mask and default gateway manually; when selecting DHCP mode, the system obtains IP address automatically;...
  • Page 62 Face Recognition Access Control System User Manual camera IP address. For example, if HTTPS port is edited as 5545, when you login through browser, you need to input "http://camera IP address:5545. The number is 5544 by default, ranging 1 ~ 65535. ...
  • Page 63: Access Protocol

    Face Recognition Access Control System User Manual 3.3.1.4 Multicast Go to Settings > Network > IP and Port > Multicast, and configure parameters such as stream type, media type, multicast address. Note: Multicast is a method of data packet transmission. The source host can send the data packets to every host in the group by sending a datagram only.
  • Page 64 Face Recognition Access Control System User Manual 3.3.2.1 ONVIF The client supports adding device to the back-end platform through ONVIF protocol, which enables different network video products such as cameras and recorders from different manufacturers to communicate with each other. Configuration steps are as follows: Go to Settings >...
  • Page 65 Face Recognition Access Control System User Manual Picture 3-21 SIP Select the “Registered VMS”; Select “Enable”; Enter parameters such as network access ID, VMS ID, VMS address, VMS port number, user name/password and video encoding channel ID, which are all provided by VMS; Click “Save”...
  • Page 66 Face Recognition Access Control System User Manual Picture 3-22 DPSS Select “Enable”; Enter VMS address, port number and network access ID, and select UUID type from the dropdown list; Click “Save” to validate settings. 3.3.2.4 VIID The device can upload the captured snapshots to VIID platform for future data analysis and comparison.
  • Page 67 Face Recognition Access Control System User Manual interval, it will judge the other side has been disconnected. For example, if the parameter is set 30, the system will send the packet once every 30 s; Enter installation address and regionalism if necessary for device positioning;...
  • Page 68: Other Protocols

    Face Recognition Access Control System User Manual Enter PDNS IP address and port number in “PDNS Server” and “PDNS Port”; Click “Save” to finish setting and show connection status. 3.3.3 Other Protocols 3.3.3.1 DDNS DDNS (Dynamic Domain Name Server) is to connect the device to various servers so that user can login to the device through servers.
  • Page 69 Face Recognition Access Control System User Manual Picture 3-27 FTP Input FTP “Server Address” and “Port”; Input “User Name” and “Password” of users who have the authority to upload. If an anonymous user also has the authority to upload, select "Anonymous"...
  • Page 70 Click "Save" to validate setting. It will show dynamic IP after dialing succeeds. 3.3.3.4 K-SNMP K-SNMP is KEDACOM private network management protocol. Configuration steps are as follows: Go to Settings > Network > Other Protocols > K-SNMP; Picture 3-29 K-SNMP Input "Network Management Server IP Address"...
  • Page 71 Face Recognition Access Control System User Manual Select “Enable” to enable QoS function; Configure "DSCP for Audio/Video" and “DSCP Management”, ranging 0 ~ Note: There are 64 DSCP priority levels (0-63), which identify different priority levels of packets, 0 with the lowest priority and 63 with the highest.
  • Page 72 Face Recognition Access Control System User Manual Select "Auto" or "Manual" for mapping mode. When selecting “Manual”, enter “External Port Number” manually; Click "Save" to validate setting. 3.3.3.7 SMTP SMTP stands for Simple Message Transfer Protocol. When an alarm is triggered, the system will send email notification automatically through SMTP protocol.
  • Page 73: Access Control

    Face Recognition Access Control System User Manual Access Control 3.4.1 Personnel  Personnel Query Go to Settings > Access Control > Personnel > Personnel Query, and query personnel info. Enter anyone or more of the information such as name, certificate number and access control card, and click “Query”...
  • Page 74 Face Recognition Access Control System User Manual Picture 3-35 Basic setting  Voice Prompt: Select the voice prompt for user recognition. If selecting “Close”, there will be no voice prompt during recognition. Picture 3-36 Voice prompt  Text Tip: Select the text tip for user recognition. If selecting “Close”, there will be no text tip during recognition.
  • Page 75 Face Recognition Access Control System User Manual the device in the configured duration, the device will skip to the stand-by interface. If disabled, the device will not screen-off automatically.  Voice for “Access Permitted”: Configure the prompt voice when verification succeeds.
  • Page 76 Face Recognition Access Control System User Manual  Default Verification Method: Select default verification method, options as shown below. Picture 3-40 Verification method  Authorization Method: Select the authorization method for different verification method, options including “Front-End Authorization” and “Networking Authorization”.
  • Page 77 Face Recognition Access Control System User Manual Picture 3-41 Scheduled open/shut  Face Go to Settings > Access Control > Settings > Face, and configure face recognition parameters. Picture 3-42 Face parameters  Face Posture Threshold: Configure the threshold score for face recognition, the range being 0~100 points.
  • Page 78: Event

    Face Recognition Access Control System User Manual  Liveness Detection: Enable or disable liveness detection function. After enabling the function, the device will judge if the recognized object is truly a human face; if the object is not a real human face, the verification will fail. After enabling the function, the maximum recognition distance is 1.8m.
  • Page 79: Storage

    Face Recognition Access Control System User Manual Enter anyone or more of the information such as name, certificate number and event type, configure event start time and end time, and click “Query” to display the expected events on the list below. 3.4.4 Storage Go to Settings >...
  • Page 80 Face Recognition Access Control System User Manual  Format configuration includes "Time Format" (“MM-DD-YYYY”, “YYYY-MM-DD” and “DD-MM-YYYY”), "Display time in 2 lines" (to display time and date in different lines) and "Alarm in front of tag" (to display alarm text over label text). ...
  • Page 81: Video

    Face Recognition Access Control System User Manual Load font. Click “Load”, and select from “Default Font”, “Large Font”, “Medium Font” and „Small Font”; Click "Save" to validate setting. Note:  A number, an English letter or a punctuation mark occupies one character. ...
  • Page 82: Audio

    Face Recognition Access Control System User Manual  Max Key Frame Interval: Configure the interval frames between two key frames, ranging 1 ~ 250. Suggest applying the default value 75. The larger the value is, the less fluctuation of the stream there will be and the worse the image will be, vice versa.
  • Page 83: Event

    Face Recognition Access Control System User Manual  Echo Cancellation: Select the checkbox to cancel noises in the input audio and thus improve the audio quality. 3.5.3.2 Audio Decoding Go to Settings > Camera > Audio > Audio Decoding, and configure audio decoding.
  • Page 84: Abnormality Linkage

    Face Recognition Access Control System User Manual delay time of alarm output is 5s, and it will eliminate alarm automatically after the delay time ends; Note: The alarm output duration is by default 5s, and the delay time means the extended continuous time after the default 5s.
  • Page 85: Storage

    Face Recognition Access Control System User Manual Storage 3.7.1 Storage Management Go to Settings > Storage > Storage Management, and configure disk full strategy; view storage device list and format TF card; configure storage position of captured snapshots. Note: When the device is installed with a TF card and it works normally, user can configure scheduled recording and scheduled snapshot.
  • Page 86: Recording

    Face Recognition Access Control System User Manual  Progress: It shows the percentage of the formatting progress of TF card. Select the disk and click "Formatting" to format the selected disk.  Snapshot: Configure the save path of snapshots. According to actual requirements, select "Local storage"...
  • Page 87: Snapshot

    Face Recognition Access Control System User Manual Select "Enable" to enable scheduled recording; Configure durations for scheduled recording. The default setting is 24 hours in bright blue color bars, or you can customize the durations; Picture 3-57 Arming durations  Set durations: Configure video recording durations according to the requirements.
  • Page 88 Face Recognition Access Control System User Manual Go to Settings > Storage > Storage Management to configure disk full strategy and format the TF card recognized by the camera. If formatting is successful, the status will turn “Normal” which means the storage card can be used normally; Go to Settings >...
  • Page 89: System

    Face Recognition Access Control System User Manual  Click the color bar to pop up a window for editing the accurate start time and end time; click "Save" to validate setting.  Click the color bar and there will be small white squares at the ends of it. Drag the small white squares to edit the start time and end time.
  • Page 90: User Security

    Face Recognition Access Control System User Manual Picture 3-59 Device info 3.8.2 User Security Go to Settings > System > User Security, and configure parameters such as user info, RTSP authorization, IP filter and security service. 3.8.2.1 User Go to Settings > System > User Security > User, and add or delete user, edit user name and password, configure user authorizations and etc.
  • Page 91 Face Recognition Access Control System User Manual Note: Anonymous login user has the authorization of live view only.  Add user: Click “Add”, and enter user name and password on the popup interface. Select user type from the dropdown list, and assign operation rights to newly added user from the authorization list.
  • Page 92 Face Recognition Access Control System User Manual Picture 3-63 Modify user Delete user: Select user and click “Delete” to delete the user.  Picture 3-64 Delete user Attention: “admin” user cannot be deleted and its user name cannot be edited. 3.8.2.2 RTSP Authorization Go to Settings >...
  • Page 93 Face Recognition Access Control System User Manual Picture 3-65 RTSP authorization 3.8.2.3 IP Filter IP filter is to configure access limitation of IP address. Configuration steps are as follows: Go to Settings > System > User Security > IP Filter; Picture 3-66 IP filter Select IP filtering mode from the dropdown list, options including “Disable”, “Blacklist”...
  • Page 94: Time

    Face Recognition Access Control System User Manual Picture 3-67 Security service  Enable SSH Login: Select “Enable SSH Login” to enable SSH service and user can login by SSH mode. Usually it's unnecessary to enable when the camera works normally. ...
  • Page 95 Access Control System User Manual Picture 3-68 Time setting  Time Setting: Set device time zone and device time. Click "Manual Setting", configure device time zone and device time on the popup interface. Select "Synchronize time with PC" to synchronize device time with PC time, and click "Save"...
  • Page 96: Serial Port

    Access Control System User Manual  NTP Clock Synchronization: Select “Enable” and configure “Server Address”, “NTP Port” and “Time Correction Interval”. When it is enabled, the camera will correct time on a time basis of the configured interval. Note: NTP (Network Time Protocol) is a protocol to synchronize time. It enables PC to synchronize with its server or time source such as quartz and GPS);...
  • Page 97: System Maintenance

    Access Control System User Manual  When the log type is “User Operation” or “Alarm Info”, select “Secondary type” to narrow the search scope.  The system can save maximum 2,000 entries of logs.  System Health Go to Settings > System > Log > System Health, and view system health status in recent one month, two months or three months.
  • Page 98 Access Control System User Manual  Import Parameter: Import local configuration file of other devices from PC without manual setting. Click "Import" and select local configuration file to import.  Advanced Configuration: Only "admin" user can perform advanced configuration. Click "Configuration", input the right password for advanced user and click "Confirm"...
  • Page 99: Appendix: Personnel Import Through Web Client

    Note: The pictures in the folder will display in the sequence of file names. After inputting all the personnel information, the status bar will show the number of processed entries and indicate starting compression; click “Compression” and there will be a file named “kedacom.zip” generated under directory “compression”.
  • Page 100 Access Control System User Manual 10) Comparing with “map.txt” file, find the corresponding columns in “config.csv” and modify the parameters. Edit “config.csv” and “map.txt” files and make sure the relationship and personnel information are all correct. 11) Rename the file “config.csv” as “user.csv”; after confirmation, compress the files of “images”, “user.csv” and “map.txt”...

Table of Contents