Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Access Controller"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
The manual will be updated according to the latest laws and regulations of related jurisdictions. ● For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Access Controller, hazard prevention, and prevention of property damage. Read carefully before using the Access Controller, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Access Controller under allowed humidity and temperature conditions.
Page 5
Operation Requirements Check whether the power supply is correct before use. ● Do not unplug the power cord on the side of the Access Controller while the adapter is powered ● Operate the Access Controller within the rated range of power input and output. ●...
1 Structure The front appearance might differ depending on different models of the Access Controller. Here we uses the fingerprint model as an example. Figure 1-1 Structure (Unit: mm [inch])
2 Connection and Installation 2.1 Wiring The Access Controller can be connected to devices like sirens, readers, and door detectors. Figure 2-1 Wiring of access controller If the access control security module is enabled, you need to purchase an access control security ●...
Installation Location Not Recommended Figure 2-5 Installation location not recommended 2.3 Installation Process The Access Controller has four installation methods: wall mount, floor bracket mount, turnstile mount and 86 case mount. This section only introduces wall mount and 86 case mount, and turnstile mount.
Figure 2-6 Wall mount 2.3.2 86 Case Mount This section uses fingerprint model Access Controller as an example. Procedure Step 1 Put an 86 case in the wall at an appropriate height. Step 2 Fasten the bracket to the 86 case with 2 screws. Step 3 Wire the Access Controller.
3 Local Configurations Local operations might differ depending on different models of Access Controller. 3.1 Initialization For the first-time use or after restoring factory defaults, you need to set a password and email address for the admin account. You can use the admin account to log in to the main menu screen of the Access Controller and the webpage.
If you forget the administrator password, send a reset request to your linked e-mail address. 3.2 Adding New Users Procedure Step 1 On the Main Menu, select User > New User. Step 2 Configure the parameters. Figure 3-2 New user...
Page 17
Table 3-1 Description of new user parameters Parameter Description Enter user IDs. The IDs can be numbers, letters, and their User ID combinations, and the maximum length of the ID is 32 characters. Each ID is unique. Enter name with at most 32 characters (including numbers, symbols, Name and letters).
Page 18
Parameter Description General : General users can unlock the door. ● Blocklist : When users in the blocklist unlock the door, service ● personnel will receive a notification. Guest : Guests can unlock the door within a defined period or for ●...
4 Web Configurations On the webpage you can also configure and update the Access Controller. Web configurations differ depending on models of the Access Controller. 4.1 Initialization Initialize the Access Controller when you log in to the webpage for the first time or after the Access Controller is restored to the factory defaults.
Page 20
Figure 4-1 Login Step 2 Enter the user name and password. The default administrator name is admin, and the password is the one you set up ● during initialization. We recommend you change the administrator password regularly to increase security. If you forget the administrator login password, you can click Forget password? to ●...
Appendix 1 Important Points of Intercom Operation The Access Controller can function as VTO to realize intercom function. Prerequisites The intercom function is configured on the Access Controller and VTO. Procedure Step 1 On the standby screen, tap Step 2 Enter the room No, and then tap...
Appendix 2 Important Points of QR Code Scanning Place the QR code at a distance of 30 cm–50 cm away from the lens of the Access Controller. It supports QR code that is less than 3.0 cm × 3.0 cm and less than 100 bytes in size. QR code detection distance differs depending on the bytes and size of QR code.
Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points: Make sure that your fingers and the scanner surface are clean and dry. ● Press your finger on the center of the fingerprint scanner. ●...
Page 24
How to Press Your Fingerprint on the Scanner Appendix Figure 3-2 Correct placement Appendix Figure 3-3 Wrong placement...
Appendix 4 Important Points of Face Registration Before Registration Glasses, hats, and beards might influence face recognition performance. ● Do not cover your eyebrows when wearing hats. ● Do not change your beard style greatly if you use the Device; otherwise face recognition might ●...
Page 26
Appendix Figure 4-1 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. ● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image ● recording.
Page 27
Appendix Figure 4-3 Face distance When importing face images through the management platform, make sure that image ● resolution is within the range from 150 × 300 pixels to 600 × 1200 pixels. It is recommended that the resolution be greater than 500 × 500 pixels, the image size be less than 100 KB, and the image name and person ID be the same.
Appendix 5 Security Recommendation Account Management 1. Use complex passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters; ● Include at least two types of characters: upper and lower case letters, numbers and symbols; ●...
Page 29
Network Configuration 1. Enable Allow list It is recommended that you turn on the allow list function, and only allow IP in the allow list to access the device. Therefore, please be sure to add your computer IP address and supporting device IP address to the allow list.
Page 30
and key management in place to prevent unauthorized personnel from damaging hardware and other peripheral equipment (e.g. USB flash disk, serial port).
Need help?
Do you have a question about the ASI7213S-W and is the answer not in the manual?
Questions and answers