Face recognition access control device with fever detection (3 pages)
Summary of Contents for TimeTec AC1 Series
Page 1
. t i m e t e c c l o u d . c o m Smart AC1 Series Smart AC1/TD Smart AC1/FTD Face Recognition Access Device with Fever Detection User Guide...
Page 2
TimeTec Holding. Every precaution has been made to supply complete and accurate information. Information in this document is subject to change without prior notice.
w w w . t i m e t e c c l o u d . c o m TABLE OF CONTENTS NOTICE FOR USE 1.1 Finger Positioning 1. Standing Position, Facial Expression And Standin Posture 1. Palm Registration 1.4 Face Registration 1.5 Standby Interface 1.6 Virtual Keyboard 1.7 Verification Mode...
Page 4
w w w . t i m e t e c c l o u d . c o m 7 PERSONALIZE SETTINGS Interface Settings Voice Settings Bell Schedules Punch States Options Shortcut Keys Mappings 8 DATA MANAGEMENT 5-6 9 ACCESS CONTROL Access Control Options Time Schedule Holiday Settings Combined Verification Settings...
w w w . t i m e t e c c l o u d . c o m Notice for Use Finger Positioning Recommended fingers: index, middle, or ring fingers; avoid using the thumb or pinky, as they are difficult to accurately pressed onto the fingerprint reader Too close Note: Please use the correct method...
w w w . t i m e t e c c l o u d . c o m Palm Registration Place your palm in the palm multi-mode collection area, such that the palm is placed parallel to the device. Make sure to keep space between your fingers.
w w w . t i m e t e c c l o u d . c o m Standby Interface After connecting the power supply, enter the following standby interface: Note: 1 Click to enter the User ID input interface. 2 When there is no super administrator set in the device, click to enter the menu.
w w w . t i m e t e c c l o u d . c o m Verification Mode Palm Verification 1: N Palm Verification mode Compare the palm image collected by the palm collector with all the palm data in the device. The device will automatically distinguish be- tween the palm and the face verification mode, and place the palm in the area that can be col-...
w w w . t i m e t e c c l o u d . c o m Fingerprint Verification 1: N fingerprint verification mode Compares the fingerprint that is being pressed onto the fingerprint reader with all of the fingerprint data that is stored in the device. The device will enter the fingerprint authentication mode when a user presses his/her finger onto the fingerprint scanner.
w w w . t i m e t e c c l o u d . c o m If the user has registered face and password in addition to his/her fingerprints and the verification method is set to fingerprint/ password/ face verification, the fol- lowing screen will appear.
w w w . t i m e t e c c l o u d . c o m Press on the main interface and enter the 1:1 facial verification mode. Enter the user ID and click [OK]. If an employee registers palm and password in addition to face, the following screen will appear.
w w w . t i m e t e c c l o u d . c o m Combined Verification To increase security, this device offers the option of using multiple forms of verifica- tion methods. A total of 7 different verification combinations can be used, as shown below: Note: 1.
w w w . t i m e t e c c l o u d . c o m Main Menu Press on the initial interface to enter the main menu, as shown below: Items Descriptions To add, edit, view, and delete basic information about a user. User Mgt.
w w w . t i m e t e c c l o u d . c o m User Management Adding Users Click User Mgt. on the main menu. Click New User. Register a User ID and Name Enter the user ID and name. Note: 1.
Page 15
w w w . t i m e t e c c l o u d . c o m Note: : If the selected user role is the Super Admin, the user must pass the identity authentication to access the main menu. The authentication is based on the authentication method(s) that the super ad- ministrator has registered.
w w w . t i m e t e c c l o u d . c o m Register user photo When a user registered with a photo passes the authentication, the registered photo will be displayed. Click User Photo, click the camera icon to take a photo. The system will return to the New User interface after taking a photo.
w w w . t i m e t e c c l o u d . c o m Note: The operation of editing a user is the same as that of adding a user, except that the user ID cannot be modified when editing a user.
w w w . t i m e t e c c l o u d . c o m User Role If you need to assign some specific permissions to certain users, you may edit the “User De- fined Role” under the User Role menu. You may set the permission scope of the custom role (up to roles) and enroller, that is, the permission scope of the operation menu.
Page 19
w w w . t i m e t e c c l o u d . c o m Note: During privilege assignment, the main menu is on the left and its sub-menus are on the right. You only need to select the features in sub-menus.
w w w . t i m e t e c c l o u d . c o m Communication Settings Set parameters of the network, serial communication, PC connection, WIFI, cloud server and Wiegand. Tap COMM. on the main menu Network Settings When the device needs to communicate with a PC over the Ethernet, you need to configure network settings and ensure that the device and the PC are con-...
w w w . t i m e t e c c l o u d . c o m PC Connection To improve data security, please set a Comm Key for communication between the device and the PC. If a Comm Key is set, this connection pass- word must be entered before the device can be connected to the PC software.
w w w . t i m e t e c c l o u d . c o m Wiegand Setup To set the Wiegand input and output parameters. Click Wiegand Setup on the Comm. Settings interface. Wiegand input Descriptions Items Values range from 6 bits, 4 Wiegand...
Page 23
w w w . t i m e t e c c l o u d . c o m Wiegand Format Definitions Wiegand34a ESSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCO Consists of 4 bits of binary code. The 1st bit is the even parity bit of the nd to 17th bits, while the 4th bit is the odd parity bit of the 18th to rd bits.
Page 24
w w w . t i m e t e c c l o u d . c o m Wiegand output Items Descriptions When SRB is enabled, the lock is controlled by the SRB to prevent the lock from being opened due to device removal. Wiegand Format Values range from 6 bits, 4 bits, 6 bits, 7 bits, and 50 bits.
w w w . t i m e t e c c l o u d . c o m System Settings Set related system parameters to optimize the performance of the device. Click System on the main menu interface. Date and Time Click Date Time on the System interface.
w w w . t i m e t e c c l o u d . c o m Access Logs Setting Click Access Logs Setting on the System interface. Items Descriptions Camera Mode Whether to capture and save the current snapshot image during verification.
w w w . t i m e t e c c l o u d . c o m Face Parameters Click Face on the System interface. Items Descriptions 1:N Match Under 1:N verification mode, the verification will only be successful when Threshold the similarity between the acquired facial image and all registered facial templates is greater than the set value.
Page 28
w w w . t i m e t e c c l o u d . c o m Items Descriptions The rotation angle tolerance of a face for facial template registration and Face Rotation comparison. Angle If a face’s rotation angle exceeds this set value, it will be filtered by the al- gorithm, i.e.
w w w . t i m e t e c c l o u d . c o m Fingerprint Parameters Click Fingerprint on the System interface. Items Descriptions Under 1:1 verification method, the verification will only be suc- 1:1 Match Threshold cessful when the similarity between the acquired fingerprint data and the fingerprint template associated with the entered user ID...
w w w . t i m e t e c c l o u d . c o m Palm Parameters Descriptions Items Under 1:1 Verification Method, Palm 1:1 Click Palm on the System interface. only when the similarity between Matching the verifying palm and the user’s Threshold...
w w w . t i m e t e c c l o u d . c o m Personalize Settings You may customize interface settings, audio and bell. Click Personalize on the main menu interface. Interface Settings You can customize the display style of the main interface. Click User Interface on the Personalize interface.
w w w . t i m e t e c c l o u d . c o m Voice Settings Click Voice on the Personalize interface. Items Descriptions Voice Prompt Select whether to enable voice prompts during op- erating.
w w w . t i m e t e c c l o u d . c o m Edit a bell On the All Bell Schedules interface, tap the bell to be edited. Click Edit, the editing method is the same as the operations of adding a bell. Delete a bell On the All Bell Schedules interface, tap the bell to be deleted.
w w w . t i m e t e c c l o u d . c o m Shortcut Keys Mappings Users may define shortcuts as attendance status or functional keys. On the main interface, when the shortcut keys are pressed, the corresponding attendance status or function interface will quickly display.
Page 35
w w w . t i m e t e c c l o u d . c o m Delete Management Click Delete Data on the Data Mgt. interface. Items Descriptions Delete Access Records To delete attendance data/access records conditionally. Delete Attendance Photo To delete attendance photos of designated personnel.
Page 36
w w w . t i m e t e c c l o u d . c o m Note: When deleting the access records, attendance photos or blacklisted photos, you may se- lect Delete All or Delete by Time Range. Selecting Delete by Time Range, you need to set a specific time range to delete all data with the period.
w w w . t i m e t e c c l o u d . c o m Access Control Access Control is used to set the schedule of door opening, locks control and other param- eters settings related to access control. Click Access Control on the main menu interface.
Page 38
w w w . t i m e t e c c l o u d . c o m Access Control Options To set the parameters of the control lock of the terminal and related equipment. Click Access Control Options on the Access Control interface. Items Descriptions Whether to turn on the gate control mode or not, when set to...
w w w . t i m e t e c c l o u d . c o m Items Descriptions Normal open time Scheduled time period for “Normal Open” mode, so that the door is always unlocked during this period. Period When setting up the master and slave, the status of the master Master Device...
w w w . t i m e t e c c l o u d . c o m Note: 1. When the ending time is earlier than the starting time, such as 23:57~23:56, it indicates that access is pro- hibited all day;...
w w w . t i m e t e c c l o u d . c o m Edit a Holiday On the Holidays interface, select a holiday item to be modified. Click Edit to modify holiday parameters. Delete a Holiday On the Holidays interface, select a holiday item to be deleted and click Delete.
w w w . t i m e t e c c l o u d . c o m Anti-passback Setup It is possible that users may be followed by some persons to enter the door without verification, resulting in security problem.
w w w . t i m e t e c c l o u d . c o m Duress Options Settings If a user activated the duress verification function with specific authentication method(s), when he/she is under coercion during authentication with such meth- od, the device will unlock the door as usual, but at the same time a signal will be sent to trigger the alarm.
w w w . t i m e t e c c l o u d . c o m Attendance Search When the identity of a user is verified, the record will be saved in the device. This function enables users to check their access records.
Page 45
w w w . t i m e t e c c l o u d . c o m . The record search succeeds. Click the record in green to view its details. 4. The below figure shows the details of the selected record. Smart AC1/TD...
w w w . t i m e t e c c l o u d . c o m Autotest To automatically test whether all modules in the device function properly, which include the LCD, audio, camera and real-time clock (RTC). Click Autotest on the main menu interface.
w w w . t i m e t e c c l o u d . c o m System Information With the system information option, you can view the storage status, the version informa- tion of the device, and so on. Click System Info on the main menu interface.
w w w . t i m e t e c c l o u d . c o m Connect to Software 1.1 Connect to AWDMS/ Ingress Software Download this file from this links below: Ingress version 4.0.1.9 (with AWDMS support) Ingress Server: https://s3.amazonaws.com/files.fingertec.com/Software+Releases/In- gress/2020/4.0.1.9/Ingress+Server+(MySQL).zip...
Page 49
w w w . t i m e t e c c l o u d . c o m Click Extract Go to the AWDMS.1 fold- er. Look for setup.exe and click on setup.exe. Once the User Account Control permission is prompted, select to continue.
Page 50
w w w . t i m e t e c c l o u d . c o m Click Next to continue. End-user Software License Agree- ment. Select “I accept the agree- ment”, then click Next. Leave the Port and ADMS Port in default mode, click Next.
Page 51
The installation is now in progress. Click Finish to restart the computer. Once this icon appears on the desktop, double tap on the “TimeTec Cloud AWDMS” icon to run the AWDMS. The ADWMS login screen will be launched in the web browser.
w w w . t i m e t e c c l o u d . c o m 1. Configure AWDMS Setup Tool By default, AWDMS will be installed with a Postgresql Server. However, it is recommended to switch to MySQL for better support. In order to switch to MySQL, please run the AWDMS setup tool after the screen below appears.
Page 53
w w w . t i m e t e c c l o u d . c o m Press any key to begin the AWDMS setup. Your computer screen might flash for a few times. Click “Yes” at the popup dialog box to continue. Once com- pleted, press any key to exit this window.
w w w . t i m e t e c c l o u d . c o m 1.4 Configure AWDMS in Ingress Software By now, you should have your AWDMS setup completed. Now, you may proceed to Ingress to configure the AWDMS.
w w w . t i m e t e c c l o u d . c o m Appendix Requirements of Live Collection and Registration of Visible Light Face Images 1. It is recommended to perform registration in an indoor environment with an ap- propriate light source without underexposure or overexposure.
Page 56
w w w . t i m e t e c c l o u d . c o m Requirements for Visible Light Digital Face Image Data Digital photo should be straightly edged, colored, half-portrayed with only one person, and the person should be uncharted and not in uniform.
Page 57
. t i m e t e c c l o u d . c o m Right to Privacy TimeTec thank you for opting this robust biometric recognition product. At TimeTec, we care about privacy. Being one of the renowned providers of core biometric recog-...
Need help?
Do you have a question about the AC1 Series and is the answer not in the manual?
Questions and answers