Page 2
Unauthorized reproduction of part or all of this manual’s content in any form is prohibhited. Product specification may change whithout prior notice to improve functionality. NITGEN&COMPANY and NITGEN logos are registered trademarks of NITGEN & COMPANY. Other names and trademarks belong to resprective companies. NITGEN & COMAPY Customer Service Center Tel: +82.2.513.2147...
Page 3
Table of Contents CHAPTER 1 ....................4 GETTING STARTED ..................4 1.1 P ................5 RODUCT NTRODCUTION 1.2 P ..................6 RODUCT ACKAGE 1.3 P ..................7 RODUCT ETAIL 1.4 I .....................9 NITIAL CREEN CHAPTER 2 ....................11 BASIC OPERATIONS .................11 2.1 A ..................12 DMINISTRATOR 2.2 N ....................
Page 5
The eNBioAccess-T5 allows administrator to remotely monitor and manage geographically dispersed terminals efficiently. User-friendly software Biometric Ergonomic technology Design For easy interactive interface, the eNBioAccess-T5 has 4.3” Touch TFT-LED screen. It provides not only fingerprint recognition, but also various authentication methods and combination.
Page 6
1.2 Product Package The eNBioAccess-T5 package consists of the following components. For detailed information about installation, please refer to the installation guide. If any of the following items is missing, please contact NITGEN “Cumstomer Support Team”. Terminal Wall Bracket Adaptor...
Page 7
1.3 Product Detail ① Touch Screen LCD ② Camera ③ Status LED Blue: Stand-by Green: Success Red: Fail ④ Fingerprint Scanner ⑤ Card Scanner < Front View > ① Reset Button ② USB Port ③ Speaker < Bottom View >...
Page 8
① Door/Aux Jumper ② Wiegand In ③ Battery Area ④ Tamper Switch ⑤ Power Con. ⑥ Wiegand Out ⑦ Network ⑧ Aux Con. ⑨ Door Con. < Rear View >...
Page 9
1.4 Initial Screen ① Network Status ② Door Status ③ Server Message Bar ④ Date & Time ⑤ Administrator Menu Button ⑥ Authentication Button...
Page 10
Update user from server Set option from server Server is seting options for terminal. Delete user from server Server deletes an user. Delete all from server Server deletes all users. eNBioAccess-T5 is supported inAccesssManager Professional V1.2.0.0(file version 1.2.1.0) or above.
Page 12
2.1 Administrator 2.1.1 How to config network 1 ) Wireline network ⒝ Click “Network” icon in sub menus. ⒜ Click administrator menu in initial screen ⒞ Click “NORMAL” Button. ⒟ Select “wireline” button. Data encryption mode can be selected as DES or AES_256 mode.
Page 13
⒢ Input terminal ID from 1 to 2000. Do not input ⒣ Input IP address of PC used as AccessManger server and click “OK” button. the same ID with other terminal. ⒤ Above shows the display after setting. ⒥ Connect LAN cable to network connector in the To save configuration, click “Save”...
Page 14
2 ) Wireless Network ⒜ Click administrator menu in initial screen. ⒝ Click “Network” icon in sub menus. ⒞ Click “NORMAL” Button. ⒟ Select “wireline” button. Data encryption mode can be selected as DES or AES_256 mode. Click “AP list” ⒠...
Page 15
⒤ Input terminal ID from 1 to 2000. Do not input the ⒥ Select “Server IP”, keypad will be displayed. To input number, click “Num” button. same ID with other terminal. ⒦ Above shows the display after setting. ⒧ Network status shows unregistered terminal. To save configuration, click “Save”...
Page 16
3 ) Standalone ⒜ Click administrator menu in initial screen. ⒝ Click “Network” icon in sub menus ⒞ Click “NORMAL” Button. ⒟ Option lists are displayed. ⒠ Select “Disable” button. ⒡ After saving, it moves to above menu. Click “Save” button to maintain current values. To go to initial screen, click “Home”...
Page 17
2.1.2 How to add user 1 ) administrator registration Fingerprint Only ⒝ Click “User” icon in sub menus ⒜ Click administrator menu in initial screen. ⒞ Click “USER” butoon. ⒟ To add new user, click “+” button. ⒠ Registration scrren is displayed. ⒡...
Page 18
⒤ Select the finger you wish to register. ⒥ The terminal requires fingerprint twice. Place your finger on the scanner after voice instruction. ⒦ The terminal displays fingerprint image. ⒧ The above displays screen when fingerprint is After capturing first image, please remove the successfully captured twice.
Page 19
2 ) 일반 사용자 등록 Password Only ⒝ Click “User” icon in sub menus ⒜ Click administrator menu in initial screen ⒞ Click “USER” butoon. ⒟ To add new user, click “+” button. ⒠ Registration scrren is displayed. ⒡ ID keypad is displayed The first user will be registered with master privilege Select “ID”...
Page 20
⒤ Keypad for password is displayed. ⒥ After inputing password, click “OK” button. To confirm password, please input password again. ⒦ If password isregistered, “Password” button is ⒧ shows that ID “0001” is added. changed with blue mark. Click ‘Save” button to finish registration. The above image shows the registration of ID “0001”...
Page 21
2.1.3 How to delete user 1 ) How to delete single user ⒝ Click “User” icon in sub menus ⒜ Click administrator menu in initial screen ⒞ Click “USER” button. ⒟ Select user to be deleted. In example, ID”0001” is selected. ⒠...
Page 22
2 ) How to delete all users ⒜ Click administrator menu in initial screen ⒝ Click “Initialization” icon in sub menus ⒞ Click “INITIALIZE” button. ⒟ Click “DELETE ALL USER” button. ⒠ The above warning message is displayed. ⒡ After deleting all users, above message is To continue, click “Yes”...
Page 23
⒤ It shows “User/Template” and “Admin” count as ‘0’.
Page 24
⒠ In this screen, when to open door can be ⒡ As configured correctly, Successful selected. authentication displays popped-up window and The default is that door1 is configured as to open door-open icon in initial screen. door when ahtuentication succeeds. eNBioAccess-T5 supports two doors.
Page 25
2 ) How to config T&A ⒜ Click administrator menu in initial screen. ⒝ Click “Authenticiation Management” icon in sub menus ⒞ Click “T&A” button. ⒟ Select T&A mode from Simple/Normal/Expanded/Auto TNA. (For more information, refer to chapter 3.5.2.) ⒠ After selecting T&A type, “T&A Auth Only” ⒡...
Page 26
2.2 Normal User 2.2.1 Authentication There are two authentication mode – 1:1 verficiation and 1:N identification. For 1:1 verification, an user inputs ID and try to authenticate. For 1:N identification, an user try to authenticate without ID. For more information, please refer to chaper 3.5.1. 1 ) 1:1 Verification (A) Fingerprint authentication ⒜...
Page 27
(B) Password Authentication ⒜ For 1:1 verifiation, click “Authentication” icon in ⒝ The keypad for ID is displayed. initial screen. ⒞ Input user ID. ⒟ The keypad for password is displayed. ⒠ Input password. ⒡ If succeeded, the welcome window is pop-uped.
Page 28
2 ) 1:N Identification (A) Fingerprint Authentication ⒜ Place finger on the scanner in initial screen. ⒝ Fingerprint image is captured. ⒞ If succeeded, the welcome window is pop-uped. (B) Card Authentication ⒝ The card request window is pop-uped. ⒜ Place card on card scanner in initical screen. ⒞...
Page 29
2.2.2 Multimodal Authentication 1) AND Method AND method is used to combine more than two authentication types to authenticate users only if all of types are satisfied. The following example explains how to authenticate user having “Fingerprint AND Password” multimodal method. ⒜...
Page 30
⒢ Input password. ⒣ If succeeded, the welcome window is pop-uped. 2) OR Method OR method is used to combine more than two authentication types to authenticate user if any of type is satisfied. The following example explains how to authenticate user having “Password OR Card”...
Page 31
(A) If correct password is used, ⒡ succeeded, the welcome window is pop-uped. (B) If password is wrong, The terminal fails to authenticate user and requests card accoriding to predefined multimodal method. ⒡ The card request window id pop-uped. ⒢ If succeeded, the welcome window is pop-uped. Place card on card scanner.
Page 32
3) ETC In this mode, administrator can sort authentication types to the mandatory and the optional. “Required auth” column means mandatory types and “AUTH TYPE1” means optional types. User must satisfy all of mandatory types and any of optional types. (If there is only one optional type, it must be satisfied).
Page 33
2.2.3 T&A Mode Authentication 1) Simple T&A Mode ⒜ The above image is initial screen in simple T&A ⒝ For password or 1:1 verification, Input user ID to mode. be authenticated. The left icon is used for “Coming to Work”. On the For card or 1:N identification, place card or finger other hand, the right icon is used for “Leaving work”...
Page 34
⒞ If succeedd, “Welcome” or “Good-bye” window is ⒟ pop-uped. ⒠ ⒡ 3) Expaneded T&A Mode ⒜ The above image is initial screen in expaneded ⒝ ⒝ For password or 1:1 verification, Input user ID T&A mode.. to be authenticated. “Coming to Work”, “Expaneded”, and “Leaving For card or 1:N identification, place card or finger Work”...
Page 35
⒠ When selecting “Expanded” icon, user can input ⒡ If succeedd, result window is pop-uped. function key number from 1 to 98. The above image shows an example of ‘24’. ⒢ The result of expanded T&A can be checked in log.
Page 36
2.2.4 Error Message of Authentication ⒜ ID does not exist. ⒝ Authentication fails. ⒞ The terminal does not finish capture of fingerprint during pre-defined time. ⒟ The terminal does not get password or card during pre-defined time.
Page 37
Chapter 3 Administrator Menu 3.1 Menu Diagram 3.2 Menu Usage 3.3 Administrator Registration 3.4 User Management 3.5 Authetication Options 3.6 System Management 3.7 Network Options 3.8 USB Management 3.9 External Connection 3.10 Initialization...
Page 38
3.1 Menu Diagram Administrator menu consists of 7 sub-menus.
Page 41
3.2 Menu Usage After entering administrator menu, Sub-menus are displayed as icons and each sub-menu has several lists. For intuitive and easy interface, lists are displayed when each sub-menu is selected. And for easy switching, sub-menus are shown in top area of screen. ①...
Page 42
position. ② Sub Menus: Switching to other sub menus ③ Lists: A group of items of selected sub-menu. ④ Save Button: It is activated when current configuration is changed. To maintain changed configuration, click this button. ⑤ Back Button: Going to above stage.
Page 43
1) How to change value ① If the change of option is possible, a related button is activated. To change, click button. The current value is displayed as blue color or blue dot. ② If the value you want is shown, click number to select. If not, click arrow to find value.
Page 44
2) How to use keypad When inputing ID or password and changing values, the following numeric keypad is displayed. ①Close ②Delete ③Clear ④End ⑤Number Key ① Close: Cancel current input and close keypad ② Delete: Delete last input ③ Clear: Clear all inputs ④...
Page 45
For alpha-numeric keypad, the following keypad is displayed. ①End ②Close ④Clear ③Delete ⑤Number/Alpabet ⑥Capital ① End: Finish input ② Close: Cancel current input and close keypad ③ Delete: Delete last input ④ Clear: Clear all inputs ⑤ Number/Alphabet: Change between number and alphabet ⑥...
Page 46
3.3 Administrator Registration Administrator has the right to change system options, manage users, and enter the administrator menu. The first user will be registered as administrator. Administrator can be added in terminal or “AccessManger Pro.”. ⒝ Click “User” icon in sub menus. ⒜...
Page 47
⒢ After inputting ID, click “OK” button. ⒣ In “AUTH TYPE1” select “Finger”. The default ID length is 4. (For more information, please refer to chapter (The ID length can be changed. For more 3.4.1.). information, please refer to chapter 3.6.4.) ⒤...
Page 48
⒪ “TIMEZONE” and “FP Option” are applied to ⒫ If “FP OPTION” is seletected, security level, and current regiatration user. sensor options such as brightness, contrast, and For timezone, Select configration from 1 to 16. gain are selected. ‘0’ means disable. ⒬...
Page 49
3.4 User Management user management menu, adminstirator controls user registration/delete/change, check users and logs. To enter “User Management”, click “USER” icon in administrator menu.
Page 50
Sub items of User Management USER: Administrator can register, delete, change and view users in this list. For each user, administrator sets specific options such as security level and sensor capture options. LOG: Adminitrator can view all logs or search logs for specific user. CARD: This is for specific use what we called “simple card registration”...
Page 51
3.4.1 User Item 1) User Registration The terminal has capacity of 100,000 users. In the limit of user capacity, it supports 100,000 templates. For one fingerprint, two templates are necessary. For user registration, each user consumes from 0 to 20 templates. If the count of templates reaches to 100,000, new user must be registrated without fingerpint.
Page 52
3. Select privilege of user – administrator or normal. 4. If selecting “Use Custom”, administrator can change security level and sensor capture options such as brightness, contrast, and gain. Normally, the default values are used. The custom setting is recommended to be used restrictly for wet or dry finger.
Page 53
2) FP OPTION Security Level (Range: 1 ~ 9, Default: 5): This value controls fingerprint security. The higher value you set, the higher security is set. In other words, False Reject Ratio (FRR) is high and False Accept Ratio (FAR) is low in higher value. But FRR is low and FAR is high in lower value.
Page 54
1:1 verification. To restore default value, select “Use Default” and click “Save” button. 5. More than one of “Auth Type1” must be selected. For multimodal authentication, select type in “Auth Type2” 3) Fingerprint Enrollment...
Page 55
When selecting “Finger” in “ Auth Type1”, fingerpint enrollment screen is displayed. Please place finger on finerprint scanner for first capture. After capturing first finger, please remove and replace the same finger on finerprint scanner for second capture.
Page 56
If the fingerpint enrollment is finished successfully, green dot glows on finger. To cancel finger, click green dot to disable. Please click “Save” button to save current fingerprint. 4) Password Enrollment When selecting “Password” in “Auth type1”, numeric keypad is poped-up.
Page 57
5) Card Enrollment When selecting “Card” in “Auth Type1”, card request image is displayed. Please contact card on card scanner. 6) Multimodal Authentication If more than two authentication types are enrolled, multimodal type can be used. And multimodal type is selected in “Auth Type2”. If “AND”...
Page 58
If all of authentication types are enrolled, “AND”, “OR” and “ETC” multimodal types are enabled. “ETC” type provides the method that user contomizes authentication types with mandatory and optional classes. “Required auth” means mandatory type and “AUTH TYPE1” means optional type. By using arrow keys, authentication sequence and type can be changed.
Page 59
1. Administrator can view all users in the list. 2. If more than 5 users, administrator scrolls user list using left or right arrow key.
Page 60
3. To find specific user, click blank list shown as the above image to popped-up numeric keypad and input ID. Partial ID is possible. 4. Click “Search” button to start.
Page 61
5. The searching result is displayed. The above example shows user ID having “1” string in their ID. 8) Modify user Select an user to be modified from user list. If an user does not show current list, scroll list or search list using specific pattern. All information except ID can be changed, but if there is only one administrator, it cannot be changed to normal user.
Page 62
1. Click user to be modified from user list. 2. Modify items such as privilege, password, and so on. Click “Save” button. Caution If there is only one administrator, the administrator cannot be changed to normal user.
Page 63
9) Delete user The terminal processes deleting user in the same way processing modifying to protect user from being deleted by mistake. Click user from user list and click wastebasket. The warning window is pop-uped. To continue, click “OK” button.
Page 64
3.4.2 Log Item The authentication result is saved in the terminal as log data for future use. Log data consists of log-type, result and time. By selecting log, more information can be viewed such as who is authenticated, which type of authentication is used and so on. 1.
Page 65
Log list shows the basic information such as log-type, result and time. To find specific data log, click block window above log list and input the date. To check more information of log, click log. The above image shows detail information of one log.
Page 66
3.4.3 Card Item This function is for administrator to register users with card. In this registration, a terminal does not require other information. This is for special case when administrator wishes to add many users having cards. These users are registered with auto-gernerated ID and also viewed in user list.
Page 67
2. Present the card on card scanner when card request image is displayed. User ID is generated automatically. 3. User registered by simple card mode can be viewed in user list, but name is blank.
Page 68
4. To authenticate, present the card on card scanner. ID is gernerated from “0000”. If there is user having same ID, ID is increased to find blank ID. Simple card registration is only available in network mode...
Page 69
3.5 Authentication Options In this menu, administrator can change options for authentication, sensor options for system, T&A mode, and Card type.
Page 70
Sub Items of Authentication Options Default: In this item, administrator can set terminal security level, the use of 1:N identification, and 1:N timout. T&A: In this item, administrator can set T&A mode. CAMERA: In this item, administrator can control the use of snapshot camera and snapshot display.
Page 71
3.5.1 Default Item In this item, Administrator can set authentication base operation config such as terminal security level for 1:1 verification and 1:N identification, the use of 1:N identification, and 1:N timeout. Security Level This value is used as the threshold to decide whether fingerprint is granted or not.
Page 72
1:1/1:N Authentication options The eNBioAccess-T5 provides two fingerpint authentication methods such as 1:1 verfication and 1:N identification. For 1:1 verfication, ID must be input before authenticating fingerprint, while for 1:N identification, ID does not need to authenticate fingerpint. Normally 1:1 is used for speeding up authentication, and 1:N is used for easy authentication.
Page 73
1:N Identification Timeout 1:N identification uses similarity sorting method. It sorts out all registered fingerprints template data according to the similarity with current inputed fingerpint. And it searches from most similar templates. The terminal cannot find matching template, it takes long time.
Page 74
3.5.2 T&A Item In T&A mode, user must click function key before authentication. And the log is transferred to server with information which function key is selected. According function keys, It is recorded as “Coming to Work”, “Going Out”, “Leaving Work”, and “Coming Back” for more efficient T&A How to Configure T&A Type 1.
Page 75
3. Enable “T&A Only” for the enterance to be granted only if user is authenticated through T&A mode. 4. Click “Save” button to maintain current configuration. Caution After enabling “T&A Only”, user must select function key before trying to authenticataion. 3.5.3 Camera The terminnal has internal snapshot camera for capturing user according to options.
Page 76
How to configure camera 1. Select “Camera” item in ‘Authentication Options” sub-menu. 2. In “Capture” mode, select when to capture user’s snapshot. For example, if “Auth success” is selected, the terminal captures user’s snapshot only when authentication is succeeded. 3. “Resolution” supports low (320x240 pixels) mode. 4.
Page 77
3.5.4 Timezone Item The terminal provides door access timezone configuration that door can be opened or closed in pre-defined time. User’s timezone can be viewed in “User Management” “USER” item. But, Timezone configuration is only possible through “AccessManager Pro” program. 1.
Page 78
2. The above image shows the example when timezone 1 is viewed. Timezone can be scrolled using left or right arrow key. The allowance table is expressed with hour-base cell. Caution for timezone Timezone can be made up to 16 different types through “Access Manager Pro.”.
Page 79
3.5.5 ETC Item Save Log Administrator selects whether log is saved or not after authentication. Logs can be viewed in “USER” icon “LOG” item or “AccessManager Pro.” User Name Administrator selects whether user name is displayed or not in authentication result window.
Page 80
3.6 System Management In this menu, administrator selects main view background image, language, time, sound, and so on for user’s preference.
Page 81
Sub Items for System Management DISPLAY: Administrator can select system language and LCD brightness. SOUND: Administrator can select soucnd effect, the use of voice, and the volume. SENSOR: Adminitsrator can configure sensor capture timeout and LFD (Live Finger Detection) level. USER: Administrator can configure user information such as ID length, the number of templates for one finger.
Page 82
MAIN VIEW: Administrator can change main view background image. TIME & DATE: Administrator can change system time and date.
Page 83
3.6.1 Display Item LANGUAGE You can select the system language of a terminal, it affects display language and voice. LCD Brightness LCD brightness can be set from 10 to 100. The default valuel is 80. The higher value you set, the brighter LCD it shows.
Page 84
3.6.2 Sound Item Sound The sound consists of voice and effect. It selects which sound is played. It provides four modes – “Voice and Effect”, “Only Voice”, “Only Effect” and “Not in use” Volume It controls the volume of sound. It can be set from 0 to 100. And the default is 20.
Page 85
3.6.3 Sensor Item In this item, administrator can set sensor capture-timeout, LFD level and sensor options such as brightness, contrast, and gain. These valules are system options and are applied to all users except whose options are defined individually. Time out It defines how long sensor waits for fingerpint to quit capturing.
Page 86
Sensor Options These options – Brightness, Contrast, and Gain – are used for fingerpint image tunning. The above shows the default values. We recommend that these default values do not change. If there is any case for changing these values, please contact technical support.
Page 87
3.6.4 USER Item In this item, ID length of user can be changed. To change ID length, there must be no users in terminal. Please delete all users before changing ID length of user. The template count is currently fixed to 2. Click what you wish to change or click input keypad.
Page 88
3.6.5 INFORMATION Item Administrator views system information such as terminal ID, network mode, firmware version, OS version, the number of user, the number of template, the number of administrator, T&A mode, and card type. This information is read-only.
Page 89
3.6.6 Card Item Administrator can configure the usage of card and card type. 1. To enable card, select “Normal” button.
Page 90
2. If the usage of card is enabled, Select card type. The terminal supprots Mifare, EM, HID, and iClass. To use card authentication, card module must be installed in the terminal.
Page 91
3.6.7 Main View Item Main view image can be changed. There are a few of images stored in the terminal. Administrator scrolls images through arrow keys and select image by clicking “Save” button. If administrator is not satisfied in bundle images, administrator can download new image through “AccessManager Pro.”...
Page 92
3.6.8 DATE & TIME Item In this item, Administrator can set system date & time.
Page 93
How to set date 1. Click “DATE” button to change date. Monthly calendar is displayed. 2. To change year, click year button and input value.
Page 94
3. To change month, click month button and input value from 1 to 12. 4. Administrator scrolls monthly calendar through left or right arrow keys to find correct month and click date. (The previous or next month is displayed in gray color.)
Page 95
How to set time 1. Click “TIME” button to change time. Digital clock is displayed. 2. To change value, click up/down arrow or click number to pop-up numeric keypad.
Page 96
3.7 Network Options eNBioAccess-T5 provides two operation modes – network or standalone. Wireline and wireless(Optional) networks are all supported.
Page 97
Sub Items of Network Options NORMAL: Administrator configures network type, encryption type, connection interval and so on. TCP/IP: Administrator sets server IP address, network mask, port, IP addres, DHCP, and so on.
Page 98
3.7.1 NORMAL Item Type Network mode is configured. There are three modes – standalone, wireline, and wireless. Encryption It defines which encryption method is used on data when terminal communicates with server. DES and AES 256bit are supported. Ping time It defines the interval time that terminal checks the connection to server.
Page 99
1 ) Standalone Mode If external network is not used, terminal operates in standalone mode. All functions are processed through touch-screen interface. 1. Select “Disable” button to operate terminal in standalone. To apply, click “Save” button. In standalone mode, all functions including registration and deletion are processed in terminal.
Page 100
2 ) Network Mode In network mode, terminal communicates with server using TCP/IP protocol controlled remotely. Several terminals manipulated in server at the same time. And registration and DB management are processed in server. To operate network mode, management program “AccessManager Pro.”...
Page 101
(B) Wireless Network 1. To select wireless network, click “Wireless” button and click “AP List” to view AP list. 2. The above shows the samples of AP. Select appropriate AP. (If WIFI Dongle is not initialized correctly, blank AP list can be displayed.)
Page 102
3. After selecting AP, the name of AP is displayed. To apply, click “Save” button. (According to the AP, more information such as protection key is required.) To use wireless network, WIFI dongle must be installed in the terminal. This dongle is an option.
Page 103
3.7.2 TCP/IP To operate network, TCP/IP configuration must be accomplished. The necessary informations are the use of DHCP, terminal ID, server IP, server port and terminal network settings. 1. “Terminal ID” means unique identification number that server uses. This number must be unique for terminals connecting to server. The input range is from 1 to 2000.
Page 104
4. In “DHCP”, it is selected whether DHCP is used or not. If DHCP is used, terminal network settings are not necessary. What is DHCP( Dynamic Host Configuration Protocol) DHCP is a network protocol that is used to configure devices which are connected to a network so that they can communicate on an IP network.
Page 105
3.8 USB Management The terminal supports USB memory which is used for upgrading firmware, uploading/downloading user DB, and downloading log data. To manipulate log, “log saving” option must be enabled. Downloading log is possible in network and standalone mode. But, uploading/downloading user DB is only possible in standalone mode.
Page 106
Sub Items of USB Management LOG DOWNLOAD: It downloads log to USB memory. The period of log to be downloaded can be set. USER DOWNLOAD: It downloads user DB to USB memory. USER UPLOAD: It uploads user DB to USB memory. FW UPDATE: It updates firmware exsiting in USB memory.
Page 107
3.8.1 LOG DOWNLOAD Item Logs are downloaded to USB memory in specific period that is configured by “Start” and “Stop” button. “Type” defines which logs are downloaded from logs which are in period. “Not sent log” means newly added log from last downloading. “All logs” means all logs those are in period.
Page 108
3.8.2 FW UPDATE Item The terminal provides updating firmware from USB memory. 1. Save “SW300_Cab.CAB” file to USB memory in PC. 2. Connet USB memory to USB port located in the bottom of terminal. There are two ways to update firmware. Please select 3.1.1 or 3.2.1.
Page 109
3.2.1. Press reset button in the bottom of terminal or select “Initialize” icon “Initialize” item in administrator menu to reboot system. 3.2.2. After rebooting, firmware reads new firmware from USB memory. Updating firmware is also possible through “AccessManage Pro.” in network mode.
Page 110
3.8.3 USER DOWNLOAD Item After clicking “USER DOWNLOAD” item, download status window is popped-up. To start downloading, click “Download” button. User DBs are saved as “SW300_User.ndb” in root directory of USB memory. If there exists the same name file, postfix “_number” is added to filename such as “SW300_User_1.ndb”, “SW300_User_2.ndb”...
Page 111
3.8.4 USER UPLOAD Item After clicking “USER UPLOAD” upload status window is popped-up. To start uploading, click “Upload” button. User DB file named as “SW300_User.ndb” file must exist in the root directory of USB memory. It there exists user having the same ID, this user is ignored when uploading.
Page 112
3.9 External Connection The terminal provides various external connections such as Wiegand and Door. In this menu, Administrator controls external connection’s configraution.
Page 113
Sub Items of External Connection WIEGAND: In this item, administrator can configure wiegand output format when authentication is succeeded. The output data can be user ID or card number. Door: In this item, administrator can configure door control signals and operation.
Page 114
3.9.1 WIEGAND This item configures wiegand output format and information when authenticaton is succeeded. Type It selects which wiegand format is used. The terminal supports two types – 26-bit format or 34-bit format. Normally, 34-bit format is used for Mifare card whereas 26-bit format is used for HID, iClass, or EM card.
Page 115
User ID None 26 Bit E.Parity(1)+ Facility(8) + ID (16) + O.Parity(1) 34 Bit E.Parity(1)+ Facility(16) + ID (16) + O.Parity(1) Card None number 26 Bit E.Parity(1) + 24bit Card CSN + O.Parity(1) 34 Bit E.Parity(1) + 32bit Card CSN + O.Parity(1) Facility Code This data is used when user ID is outputted through wiegand output.
Page 116
3.9.2 Door Item In this item, administrator controls door operation. There are two operation modes. The first is that the terminal controls door signals such as contact signal and door monitor signal. And the second is that door signals are used as the auxiliary interfaces – fire alarm or light alarm.
Page 117
“Fire alram” is input signal to receive fire warning signal. If the terminal receives fire warning, it displays warning message on screen. 1. “Result signal” is available only if corresponding door is selected as “Use” or “Light alarm” in “Function”. It selects when to output signal. 2.
Page 118
3.10 Initialization There are cases when the terminal needs to be cleared by deleting all users and deleting all logs, or be initialized to factory options. And there are also cases when touch calibration is needed. Those functions are available in this sub-menu.
Page 119
Sub Items of External Connection INITIALIZE: In this item, administrator can delete all users/logs and initialize options/configuration to factory values. CALIBARATION: In this item, administrator can calibrate touch panel. SELF TEST: In this item, administrator makes terminal self-test to diagnosis by itself.
Page 120
3.10.1 INITIALIZE Item DELETE ALL USER: It deletes all users stored in terminal. CLEAR LOG: It deletes all logs stored in terminal. RESET OPTION: It initializes options to factory value. REBOOT: It reboots system immediately. “RESET OPTION” is available only if there is no user in terminal.
Page 121
3.10.2 CALIBARAION Item If touch sensitivity and response is slow, use this touch calibration fucnton. ① ② ③ ④ ⑤ 1. Click “CALIBRATION” button. White screen is displayed. And ‘+’ mark is shown. Please press ‘+’ mark for a while. After impleting calibration, touch the screen once more to save new cabration value.
Page 122
3.10.3 SELF TEST Item The terminal diagnosises fingerprint sensor, network, time, camera and DB by itself. 1. To start self-test, click “Start Self Test” button.
Page 123
2. Warning message is popped-up. To continous, click “OK” button. 3. The test result for each part is marked as “OK” or “FAIL”.
Page 124
Chapter 4 Appendix 4.1 How to place fingerpint 4.2 How to use touch screen 4.3 Troubleshooting 4.4 Product Specfications...
Page 125
4.1 How to place fingerprint This chapter explains how to palce fingerpint for registration and authentication to get a better result. Please place finger to maximize the area of fingerpint and put stress on finger equally. If the max of pressing power is 100%, press finger using pressing power 70% to 80%.
Page 126
4.2 How to use touch screen To press accurate point in touch screen, please use fingertip or finger nail. If the position where finger was placed is different the position where finger was removed, the touch function may not work properly. There needs a caution.
Page 127
4.3 Troubleshooting <If the touch function does not work properly> 1. Please check if there is any dust on the touch screen, and clear the scrren with soft towel or paper. 2. If finger touching area is too large, sensitivity may drop. Please use fingertip when touching the screen.
Page 128
wipe finger with cloth for wet finger. < If RF card authentication fails> 1. Select “Authenication Options” icon “CARD” item in administarto menu and check if the card type matches the actual card. 2. In T&A mode, check if “T&A Only” is enabled. If so, user must click T&A button to be authenticated.
Page 129
<If user cannot be registered> The terminal operates in network mode which requires a proper netowkr connection for user registration by default. Check network connection or change the terminal to standalone mode. <If the terminal is unstable or does not operate> 1.
Page 130
Description 4.3” Touch Screen TFT-LCD, 480(H) x 272(W) 667MHz 32Bit RISC Memory 256MB RAM, 256MB Nand Flash Fingerpint Nitgen Optical sensor OPP06 sensor (500 DPI, LFD, Auto-on) Authentication 1:1 Verfication; Less than 0.5 sec Speed 1:1 Identification: Less than 1 sec for 4000...
Need help?
Do you have a question about the eNBioAccess-T5 and is the answer not in the manual?
Questions and answers