Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Device"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
All designs and software are subject to change without prior written notice. Product updates might result in some di erences appearing between the actual product and the manual. Please contact customer service for the latest program and supplementary documentation. There might be errors in the print or deviations in the description of the functions, operations and technical data.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Device under allowed humidity and temperature conditions. Storage Requirement Store the Device under allowed humidity and temperature conditions.
Use the power cords that are recommended for the region and conform to the rated power speci cations. The Device is a class I electrical appliance. Make sure that the power supply of the Device is connected to a power socket with protective earthing. The Device must be installed at a height of 2 meters or below.
Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 Overview ........................................1 2 Local Operations ....................................2 2.1 Preparation ....................................2 2.1.1 Basic Con guration Procedure ..........................2 2.1.2 Button Description ................................. 2 2.1.3 Input Method Introduction ............................3 2.2 Initialization ....................................
Page 7
2.9.1 Con guring Time ................................22 2.9.2 Con guring Face Parameters ..........................23 2.9.3 Con guring the Volume ............................24 2.9.4 Con guring the Language ............................25 2.9.5 Con guring Screen Parameters ..........................25 2.9.6 Restoring Factory Defaults ............................26 2.9.7 Restarting the Device ..............................
Page 8
3.6.4 Con guring Work Schedules ..........................60 3.6.5 Con guring Attendance Modes ..........................62 3.7 Con guring Audio and Video ............................64 3.7.1 Con guring Video ................................ 64 3.7.2 Con guring Audio ................................ 68 3.8 Communication Settings ..............................69 3.8.1 Network Settings ................................69 3.8.1.1 Con guring TCP/IP ............................
Page 9
3.10.5.1 Exporting and Importing Con guration Files .................. 90 3.10.5.2 Con guring the Fingerprint Similarity Threshold ................. 91 3.10.5.3 Restoring the Factory Default Settings ....................91 3.10.6 Maintenance ................................. 91 3.10.7 Updating the System ..............................92 3.10.7.1 File Update ................................. 92 3.10.7.2 Online Update ..............................
Page 10
4.5.4 Con guring Work Schedules ..........................118 4.5.5 Con guring Attendance Modes ......................... 120 4.6 Con guring Access Control ............................. 122 4.6.1 Con guring Unlock Methods ..........................122 4.6.2 Con guring Face Parameters ..........................123 4.6.3 Con guring Access Control Parameters ......................124 4.6.4 Con guring Alarms ..............................
Page 11
5.4.3 Monitoring Door Status ............................154 Appendix 1 Important Points of Face Registration ......................156 Appendix 2 Important Points of Fingerprint Registration Instructions ..............159 Appendix 3 Security Recommendation ........................... 161 (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
1 Overview The Device is an access control panel that supports unlocking through faces, passwords, ngerprints, cards, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers.
2 Local Operations Con gurations might di er depending on the actual product. External expansion modules are only available on select models. 2.1 Preparation 2.1.1 Basic Con guration Procedure Figure 2-1 Basic con guration procedure 2.1.2 Button Description The Device has non-touch screen. Operate the Device through the buttons. When the device screen is o , press any button except the door bell button to light up the screen.
Figure 2-2 Buttons Table 2-1 Button description Button Description Return to the previous menu. Con rm button The selected option can be shifted in both upward and downward directions on the screen using the buttons. The selected option can be shifted left or right on the screen using the buttons.
Input the letter This part uses entering M as the example. 1. Press the 6 button on the input box. 2. Press the 4 button. Input the number Change to the number input method, and then press the corresponding number button. Input the character Change to the character input method, and then press the corresponding number button.
2.3 Home Screen Figure 2-3 Home screen Table 2-2 Home screen description Description Displays the current date, time and day. Displays the network connection status. The Wi-Fi and Wi-Fi AP function are available on select models. Unlock by password: Enter the user password, temporary password or admin password to open the door.
This function is only available on select models. 2.4.3 Unlocking by Face Verify the identity of an individual by detecting the face. Make sure that the face is centered on the face detection frame. Do not wear the mask during the veri cation. 2.4.4 Unlocking by User Password Enter the user ID and password to unlock the door.
Step 4 Select OK, and then press OK. 2.4.5 Unlocking by Admin Password Enter only the admin password to unlock the door. The door can be unlocked through admin password except for always closed door. One device allows for only one admin password. Prerequisites The admin password was con gured.
2.4.6 Unlocking by Temporary Password Unlock the door by the temporary password. Procedure Step 1 Add the Device to DMSS. DMSS will generate a temporary password, which allows you unlock the door before it expires. Step 2 Press to select , and then press OK.
Figure 2-10 Home screen Step 2 Press to select admin, and then press OK. Step 3 Press OK, and then enter the password that is con gured during the initialization. to select OK, and then press OK. Step 4 Press 2.6 Person Management You can add new users, view user/admin list and edit user information.
Page 21
Parameter Description The name can have up to 30 characters (including Name numbers, symbols, and letters). Register ngerprints. A user can register up to 3 ngerprints, and you can set a ngerprint to the duress ngerprint. An alarm will be triggered when the duress ngerprint is used to unlock the door.
Page 22
Parameter Description General User: General users can unlock the door. Blocklist User: When users on the blocklist unlock the door, a blocklist alarm will be triggered. Guest User: Guests can unlock the door within a de ned period or for a designated number of times. After the de ned period expires or the unlocking times run out, they cannot unlock the door.
2.6.2 Viewing User Information View the user or administrator information. You can edit or delete the user and administrator information. Procedure Step 1 On the Main Menu, select Users. Select User List, or select Admin List. Step 2 The user list displays all the user information in the Device. The admin list displays all the administrator information in the device.
Edit users or administrators: Press to select the user or the administrator, and then press OK. Delete users or administrators Delete one by one: 1. On the user list or the admin list screen, press to select the user or the administrator, and then press OK.
Figure 2-15 Access control management 2.7.1 Con guring Unlock Combinations Use card, ngerprint, face, password or their combinations to unlock the door. The available unlock modes might di er depending on the product model. Procedure Step 1 On the Main Menu, select Access Control Management > Combination Unlock. Step 2 Press OK to con gure the combination method and the veri cation method.
2.7.2 Con guring Alarms An alarm will be triggered when the entrance or exit is abnormally accessed. Procedure Step 1 On the Main Menu, select Access Control Management > Alarm. Step 2 Con gure the alarm parameters. Figure 2-17 Alarm settings Table 2-4 Description of alarm parameters Parameter Description...
Parameter Description when doors are opened or closed abnormally. There are 2 types of door detectors: NC detector and NO detector. Normally Closed: The sensor is in a shorted position when the Door Detector Type door or window is closed. Normally Open: An open circuit is created when the window or door is actually closed.
the door fails to open, you must wait for the con gured veri cation time interval before attempting to verify your identity again. Procedure Step 1 On the Main Menu screen, select Access Control Management > Veri cation Interval (sec). Enter the time interval, select OK, and then press OK.
Parameter Description It stands for Dynamic Host Con guration Protocol. DHCP When DHCP is turned on, the Device will automatically be assigned the IP address, subnet mask, and gateway. If this function is turned on, you can manage devices Cloud Service without applying for DDNS, setting port mapping or deploying transit servers.
You can modify the SSID and con gure the password through Security. After the Wi-Fi AP is enabled, wait about 1 minutes to connect it. The security is None by default. Figure 2-20 Connect to Wi-Fi AP Result Use your computer to connect to Wi-Fi AP of the Device to access its webpage. 2.8.2 Con guring RS-485 Procedure Step 1...
Table 2-7 Parameter description External device Description The Device functions as a card reader and sends data to other external access controllers to control access. Output Data type: Select Card Number. Outputs data based on the card Access Controller number when users swipe their cards to unlock doors; outputs data based on user's rst card number when users use other unlock methods.
Page 32
Figure 2-22 Wiegand settings Table 2-8 Description of Wiegand settings Parameter Description When the Device connects to a third-party device through the Wiegand input port, and the card number read by the Device is in the Wiegand Input Card No. Inversion reverse order from the actual card number.
2.9 System Settings Figure 2-23 System settings 2.9.1 Con guring Time Con gure system time, such as date and time. Procedure Step 1 On the Main Menu, select System > Time. Step 2 Con gure the time parameters. Figure 2-24 Time settings Table 2-9 Description of time parameters Parameter Description...
Parameter Description 1. Press to select Time, and then press OK. Time 2. Press the number button to enter the time, and then press Esc. to select Date Format. 1. Press Date Format 2. Press or OK to select the date format. to select Time Zone.
Name Description When the same face remains in front of the lens after the rst Valid Face Interval (sec) successful recognition, the Device will perform recognition again for the face after a de ned interval. When the same face remains in front of the lens after the rst Invalid Face Interval (sec) failed recognition, the Device will perform recognition again for the face after a de ned interval.
2.9.4 Con guring the Language Change the language on the Device. On the Main Menu, select System > Language, select the language for the Device. 2.9.5 Con guring Screen Parameters Con gure when the display should turn o and the logout time. Procedure Step 1 On the Main Menu, select System >...
The logout time must be less than the screen o time. 2.9.6 Restoring Factory Defaults Background Information Restoring factory defaults will cause data loss. Please be advised. Procedure On the Main Menu, select System > Factory Defaults. Step 1 Step 2 Restore factory defaults if necessary.
Make sure that a USB is inserted to the Device before you export data or update the system. To avoid failure, do not pull out the USB or perform any operation of the Device during the process. You can use a USB to export the information from a Device to another Device. Face images are not allowed to be imported through USB.
We recommend you import the data to the device with the same model and version. Data transmission between devices with di erent models and versions will cause data loss. 2.10.3 Updating the System Update the system of the Device through USB. If you start the Device for the rst time or restore the Device to factory default settings, the Device automatically backups the system les within the rst 10 minutes.
2.12.1 Viewing Data Capacity On the Main Menu, select Info > Data Capacity, you can view storage capacity of each data type. 2.12.2 Viewing Device Version On the Main Menu, select Info > Device Version, you can view the device version, such as serial No., software version and more.
3 Webpage Operations On the webpage, you can also con gure and update the Device. Web con gurations di er depending on models of the Device. 3.1 Initialization Initialize the Device when you log in to the webpage for the rst time or after the Device is restored to the factory defaults.
Figure 3-1 Reset password Up to two security codes will be generated when the same QR code is scanned. If the security code becomes invalid, refresh the QR code and scan again. After you scan the QR code, you will receive a security code in your linked e-mail address.
Figure 3-2 Home page Table 3-1 Home page description Description Main menu. : Enter the home page. : Display in full screen. : Enter the Security page. : Scan the QR code with your phone to view the product documents. This function is only available on select models : Log out or restart the device.
Page 44
Figure 3-3 Add users Table 3-2 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, User ID letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including Name numbers, symbols, and letters).
Page 45
Parameter Description assigned to the person, they will follow the established department schedule. Department Schedule: Assign department schedule to the user. Personal Schedule: Assign personal schedule to the user. Schedule Mode This function is only available on select models. If you set the schedule mode to department schedule here, the personal schedule you have con gured for the user in Attendance >...
Page 46
Parameter Description People can unlock the door or take attendance during the de ned holiday. Holiday Plan You can select more than one holiday. Click Upload to upload a face image. Each person can only add up to 2 face images. You can view or delete the face image after you upload it.
Page 47
Parameter Description Enter the user password. The maximum length of the password is 8 digits. The duress password is the unlock password + 1. For example, if the user password is 12345, Password the duress password will be 12346. A duress alarm will be triggered when a duress password is used to unlock the door.
3.5 Con guring Access Control 3.5.1 Person Management Procedure On the home page, select Person Management, and then click Add. Step 1 Step 2 Con gure user information. Figure 3-4 Add users (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Page 49
Table 3-3 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, User ID letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including Name numbers, symbols, and letters).
Page 50
Parameter Description People can unlock the door or take attendance during the de ned period. Period You can select more than one period. People can unlock the door or take attendance during the de ned holiday. Holiday Plan You can select more than one holiday. Click Upload to upload a face image.
Page 51
Parameter Description This function is only available on select models. Enter the card number manually. 1. Click Add. 2. Enter the card number, and then click Add. Read the number automatically through the enrollment reader or the Device. 1. Click Add, and then click Modify to select an enrollment reader or the Device.
Parameter Description Register ngerprints. A user can register up to 3 ngerprints, and you can set a ngerprint to the duress ngerprint. An alarm will be triggered when the duress ngerprint is used to unlock the door. Enroll ngerprints through an enrollment reader or the Device.
Page 53
Figure 3-5 Basic parameters Table 3-4 Basic parameters description Parameter Description Name The name of the door. Set the door status. Normal: The door will be unlocked and locked according to your Door Status settings. Always Open: The door remains unlocked all the time. Always Closed: The door remains locked all the time.
Parameter Description Displays the noti cation on the screen when a person verifying their identity on the Device. High Speed Mode: The system prompts Successfully veri ed or Not authorized on the screen. Simple Mode: Displays user ID, name and veri cation time after access granted;...
Page 55
Figure 3-6 Unlock settings Table 3-5 Unlock settings description Parameter Description Unlock methods might di er depending on the models of Unlock Method (Multi-select) product. After a person is granted access, the door will remain unlocked Door Unlock Duration for a de ned time for them to pass through. It ranges from 0.2 to 600 seconds.
Figure 3-7 Unlock by period Unlock by multiple users. 1. In the Unlock Mode list, select Unlock by multiple users. 2. Click Add to add groups. 3. Select unlock method, valid number and user list. If only one group is added, the door unlocks only after the number of people in the group who grant access equals the de ned valid number.
Page 57
Figure 3-8 Alarm Table 3-6 Description of alarm parameters Parameter Description An alarm will be triggered when a duress card, duress Duress Alarm password or duress ngerprint is used to unlock the door. Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered.
Parameter Description With the door detector wired to your device, alarm can be triggered when doors are opened or closed abnormally. The door detector includes 2 types, including NC detector and NO detector. Door Detector Normally Closed: The sensor is in a shorted position when the door or window is closed.
Figure 3-9 Alarm event linkage Table 3-7 Alarm event linkage Parameter Description If the door is opened abnormally, an intrusion alarm will be triggered. Intrusion Alarm Buzzer: The buzzer sounds when an intrusion alarm is triggered. You Linkage can con gure the alarm duration. When the door remains unlocked for longer than the de ned timeout duration, the door timeout alarm will be triggered and last for the Unlock Timeout Alarm...
Page 60
Figure 3-10 Face detection parameters Step 3 Con gure the parameters. Table 3-8 Description of face parameters Name Description Adjust the accuracy level of face recognition. Higher threshold means higher accuracy and lower false recognition rate. Face Recognition Threshold When the threshold is too low such as 0, the false recognition rate will be extremely high.
Figure 3-11 Exposure parameters Table 3-9 Exposure parameters description Parameter Description Face Exposure After the face exposure function is enabled, the face will be exposed at the de ned brightness to detect the face Face Target Brightness image clearly. Face Exposure Interval Detection The face will be exposed only once in a de ned interval.
Page 62
Figure 3-12 Card parameters Table 3-10 Card parameters description Item Parameter Description The IC card can be read when this function is enabled. Card Settings IC Card This function is only available on select models. (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020...
Page 63
Item Parameter Description The encrypted card can be read when this function is enabled. IC Card Encryption & Veri cation Make sure IC Card is enabled. Prevent unlocking through duplicated NFC card after this function is enabled. This function is only available on models that support IC cards.
Item Parameter Description Place the card on the reader, enter the card number, and then click Write to write card number to the card. DESFire Card Write Card Number Des re card function must be enabled. Only supports hexadecimal format. Supports up to 8 characters.
Figure 3-13 Con gure time periods Step 4 Drag the time slider to con gure time for each day. Step 5 (Optional) Click Copy to copy the con guration to the rest of days. Step 6 Click OK. 3.5.7.2 Con guring Holiday Plans You can con gure up to 128 holiday groups (from No.0 through No.127), and for each holiday group, you can add up to 16 holidays in it.
Page 66
Figure 3-14 Add a holiday group Step 5 Click Add, and then add a holiday to a holiday group. Click OK. Step 6 Figure 3-15 Add a holiday to a holiday group Step 7 Click Plan Management, and then click Add. Step 8 Select a number for the holiday plan, and then enter a name for it.
Figure 3-16 Add holiday plan Step 10 Click OK. 3.5.8 Privacy Settings Procedure On the webpage, select Access Control > Privacy Settings. Step 1 Step 2 Enable snapshot function. Face images will be captured automatically when people unlock the door. Figure 3-17 Enable snapshot Step 3 Click Apply.
3.6 Con guring Attendance This function is only available on select models. 3.6.1 Con guring Departments Procedure Step 1 Select Attendance Con g > Department Settings. Step 2 Click to rename the department. There are 20 default departments. We recommend you rename them. Figure 3-19 Create departments Related Operations You can click Default to restore departments to default settings.
Page 69
Figure 3-20 Create shifts Table 3-11 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
Page 70
Figure 3-21 Time interval (even number) For example: If the interval is 120 minutes, then the clock-out time for period 1 is from 12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00. If a person clocks out multiple times during period 1, the latest time will be valid, and if they clock in multiple times during period 2, the earliest time will be valid.
3.6.3 Con guring Holiday Con gure holiday plans to set periods for attendance to not be tracked. Procedure Step 1 Select Attendance Con g > Shift Con g > Holiday. Step 2 Click Add to add holiday plans. Step 3 Con gure the parameters.
Page 72
Figure 3-24 Con guring work schedules Procedure Step 1 Select Attendance Con g > Schedule Con g. Step 2 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. 3. On the calendar, select a day, and then select a shift. You can also click Batch Con gure to schedule shifts to multiple days.
You can only set work schedules for the current month and the next month. 0 indicates break. 1 to 24 indicates the number of the per-de ned shifts. 25 indicates business trip. 26 indicates leave of absence. Step 3 Set works schedules for departments. 1.
Page 74
Figure 3-27 Attendance modes Table 3-13 Attendance mode Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. Break Out: Clock out when your break starts.
restore it to previous settings. Default: Restore the attendance settings to factory defaults. 3.7 Con guring Audio and Video 3.7.1 Con guring Video Log in to the webpage, select Audio and Video Con g > Video Default: Restore to defaults settings. Capture: Take a snapshot of the current image.
Page 76
Status Figure 3-29 Status Table 3-15 Parameters description of status Parameter Description The image hue is di erent in di erent scene mode. Close: Scene mode function is turned o . Auto: The system automatically adjusts the scene mode based Scene Mode on the photographic sensitivity.
Page 77
Exposure Figure 3-30 Exposure Table 3-16 Exposure parameter description Parameter Description Set anti- icker to reduce icker and decrease or reduce uneven colors or exposure. 50Hz: When the mains electricity is 50 Hz, the exposure is automatically adjusted based on brightness of the surroundings to prevent the appearance of horizontal lines.
Page 78
Parameter Description You can set the exposure to adjust image brightness. Auto: The Device automatically adjusts the brightness of images based the surroundings. Shutter Priority: The Device adjust the image brightness according to the set range of the shutter. If the image is not bright enough but the shutter value has reached its upper or lower limit, the Device will automatically adjust the gain value for ideal brightness level.
Table 3-17 Image description Parameter Description Brightness The brightness of the image. Higher value means brighter images. Contrast is the di erence in the luminance or color that makes an Contrast object distinguishable. The larger the contrast value is, the greater the color contrast will be.
Parameters Description Audio File Click Upload audio les to the platform. No voice prompts during the set time when you verify your DND Mode identity on the Device. You can set up to 4 periods. Step 3 Click to upload audio les to platform for each audio type. Only supports MP3 les that are less than 20 KB with a sampling rate of 16K.
Page 81
Figure 3-33 TCP/IP Table 3-19 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. DHCP: It stands for Dynamic Host Con guration Protocol. Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway. MAC Address MAC address of the Device.
Parameter Description IPv6 address is represented in hexadecimal. IPv6 version do not require setting subnet masks. Default Gateway The IP address and default gateway must be in the same network segment. Preferred DNS Set IP address of the preferred DNS server. Alternate DNS Set IP address of the alternate DNS server.
Figure 3-34 Wi-Fi Wi-Fi and Wi-Fi AP cannot be enabled at the same time. Wi-Fi function is only available on select models. Step 3 Click +, and then enter the password of the Wi-Fi. The Wi-Fi is connected. Related Operations DHCP: Enabled this function and click Apply, the Device will automatically be assigned a Wi-Fi address.
Figure 3-35 Wi-Fi AP Result After enabled, you can connect to the Device Wi-Fi through your phone, and log in to the webpage of the Device on your phone. 3.8.1.4 Con guring Port You can limit access to the Device at the same time through webpage, desktop client and mobile client.
Figure 3-36 Con gure ports Except for Max Connection and RTSP Port, you need to restart the Device to make the con gurations e ective after you change other parameters. Table 3-20 Description of ports Parameter Description You can set the maximum number of clients (such as Max Connection webpage, desktop client and mobile client) that can access the Device at the same time.
Page 86
Figure 3-37 Basic service Table 3-21 Basic service parameter description Parameter Description SSH, or Secure Shell Protocol, is a remote administration protocol that allows users to access, control, and modify their remote servers over the internet. Mutlicast/Broadcast Search Search for devices through multicast or broadcast protocol. The Common Gateway Interface (CGI) is an intersection between web servers through which the standardized data exchange between external applications and servers is...
Parameter Description TLSv1.1 refers to Transport Layer Security version 1.1. TLS is a cryptographic protocol designed to provide secure and authenticated communication over a computer network. TLSv1.1 Security risks might present when TLSv1.1 is enabled. Please be advised. LLDP is the abbreviation for Link Layer Discovery Protocol, which is a data link layer protocol.
Figure 3-38 Cloud service Step 3 Click Apply. Step 4 Scan the QR code with DMSS to add the device. 3.8.1.7 Con guring Auto Registration The auto registration enables the devices to be added to the management platform without manual input of device information such as IP address and port.
Figure 3-39 Auto Registration Table 3-22 Automatic registration description Parameter Description Status Displays the connection status of auto registration. Server Address The IP address or the domain name of the server. Port The port of the server that is used for automatic registration. The registration ID (user de ned) of the device.
Parameter Description Host IP Host IP: Enter the IP address of the third-party platform. Domain Name: Enter the domain name of the third-party Domain Name platform. Access the third-party platform through HTTPS. HTTPS secures HTTPS communication over a computer network. Click OK.
Parameter Description Select the type of event that will be pushed to the management platform. Before you use this function, enable Push Person Event Type Info. Person information can only be pushed to one management platform and unlock records can be pushed to multiple management platforms.
Table 3-25 Description of RS-485 parameters Parameter Description Access Controller Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Card Reader: The Device functions as an access controller, External Device and connects to an external card reader.
Page 93
When the Device connects to a third-party device through the Wiegand input port, and the card number read by the Device is in the reverse order from the actual card number. In this case, you can turn on Card No. Inversion function. Select Wiegand Output when the Device functions as a card reader, and you need to connect it to another access controller.
3.9 Con guring the System 3.9.1 User Management You can add or delete users, change users' passwords, and enter an email address for resetting the password when you forget your password. 3.9.1.1 Adding Administrators You can add new administrator accounts, and then they can log in to the webpage of the Device. Procedure Step 1 On the home page, select System >...
Only admin account can change password and admin account cannot be deleted. 3.9.1.2 Adding ONVIF Users Background Information Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for the development of a global open standard for the interface of physical IP-based security products, which allows the compatibility from di erent manufactures.
Parameter Description There three permission groups which represents di erent permission levels. admin: You can view and manage other user accounts on the ONVIF Device Manager. Group Operator: You cannot view or manage other user accounts on the ONVIF Device Manager. User: You cannot view or manage other user accounts and system logs on the ONVIF Device Manager.
Page 97
Figure 3-46 Date settings (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Table 3-28 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Time to sync time with computer. NTP: The Device will automatically sync the time with the NTP server. Time Server: Enter the domain of the NTP server. Port: Enter the port of the NTP server.
Figure 3-47 One-click diagnosis 3.10.2 System Information 3.10.2.1 Viewing Version Information On the webpage, select Maintenance Center > System Info > Version, and you can view version information of the Device. 3.10.2.2 Viewing Legal Information On the home page, select Maintenance Center > System Info > Legal Info, and you can view the software license agreement, privacy policy and open source software notice.
Click Encrypt Log Backup, and then enter a password. The exported le can be opened only after entering the password. Click to view details of a log. 3.10.4.2 Unlock Records Search for unlock records and export them. Procedure Step 1 Log in to the webpage.
Make sure that a USB is inserted to the Device before you export data or update the system. To avoid failure, do not pull out the USB or perform any operation of the Device during the process. You have to use a USB to export the information from the Device to other devices. Face images are not allowed to be imported through USB.
Con guration les can only be imported to devices that have the same model. 3.10.5.2 Con guring the Fingerprint Similarity Threshold Con gure the ngerprint similarity threshold. The higher the value is, the higher accuracy is, and the lower the pass rate. Procedure Step 1 Log in to the webpage.
Step 3 Set the time, and then click Apply. The Device will restart at the scheduled time, or you can click Restart to restart it immediately. 3.10.7 Updating the System Use the correct update le. Make sure that you get the correct update le from technical support. Do not disconnect the power supply or network, and do not restart or shutdown the Device during the update.
3.10.8.1 Exporting Procedure Step 1 On the home page, select Maintenance Center > Advanced Maintenance > Export. Step 2 Click Export to export the serial number, rmware version, device operation logs and con guration information. 3.10.8.2 Packet Capture Procedure Step 1 On the home page, select Maintenance Center >...
Hover over the icons of the security modules to see their running status. Figure 3-51 Security Status Related Operations After you perform the scan, the results will be displayed in di erent colors. Yellow indicates that the security modules are abnormal, and green indicates that the security modules are normal. Click Details to view the details on the results of the scan.
If there are no certi cates in the list, click Certi cate Management to upload a certi cate. Figure 3-52 System service Step 4 Click Apply. IP address httpsport Enter “https:// " in a web browser. If the certi cate is installed, you can log in to the webpage successfully.
Figure 3-54 Add IP information Step 5 Click OK. Related Operations Click to edit the IP information. Click to delete the IP address. 3.11.3.2 Con guring Account Lockout If the incorrect password is entered for a de ned number of times, the account will be locked. Procedure Step 1 Select...
Figure 3-55 Account lockout Login Attempt: The limit of login attempts. If the incorrect password is entered for a de ned number of times, the account will be locked. Lock Time: The duration during which you cannot log in after the account is locked. Step 3 Click Apply.
3.11.4 Installing Device Certi cate Create a certi cate or upload an authenticated certi cate, and then you can log in through HTTPS on your computer. 3.11.4.1 Creating Certi cate Create a certi cate for the Device. Procedure > CA Certi cate > Device Certi cate. Step 1 Select Step 2...
Related Operations Click Enter Edit Mode on the Device Certi cate page to edit the name of the certi cate. Click to download the certi cate. Click to delete the certi cate. 3.11.4.2 Applying for and Importing CA Certi cate Import the third-party CA certi cate to the Device.
certi cate is successfully installed. Click Recreate to create the request le again. Click Import Later to import the certi cate at another time. Related Operations Click Enter Edit Mode on the Device Certi cate page to edit the name of the certi cate. Click to download the certi cate.
servers. For example, when 802.1x protocol is used, the CA certi cate for switches is required to authenticate its identity. Background Information 802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them access to the network. Procedure Step 1 Select...
Figure 3-61 Data encryption Table 3-29 Data encryption description Parameter Description Streams are encrypted during transmission Enable through private protocol. Private Protocol Encryption Type Keep it as default. Update Period of Ranges from 0 h -720 h. 0 means never Secret Key update the secret key.
4 Phone Operations Before logging in to the webpage of the Device on your phone, make sure that you have initialized the Device through the webpage on the computer. We recommend you use your phone in portrait mode and day mode. You can log in to the webpage of the Device on your phone through the following methods.
The default administrator name is admin, and the password is the one you set up during initialization. We recommend you change the administrator password regularly to increase security. If you forget the administrator login password, you can reset the password through the webpage on the computer.
Page 117
Figure 4-2 Door status The Common Function area displays the con guration menu of the Device. Click More to view all the con guration menus. Figure 4-3 Common functions View the serial number and the version information on the Version area. Click > to view the version details.
Figure 4-4 Version 4.3 Person Management Add the person and con gure the permissions. Procedure Step 1 Log in to the webpage. Click Person Management, and then click +. Step 2 Step 3 Con gure user information. Figure 4-5 Add the person (1) D-162, Okhla Industrial Area sales@timewatchindia.com (+91)-11-41916615...
Page 119
Figure 4-6 Add the person (2) Table 4-1 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, User ID letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including Name numbers, symbols, and letters).
Page 120
Parameter Description Enter the card number manually. 1. Click Add. 2. Enter the card number, and then click Add. Read the number automatically through the Device. 1. Click Add. 2. Swipe cards on the card reader. A 60-second countdown is displayed to remind you to swipe cards, and the system will read the card number automatically.
Page 121
Parameter Description Set a date on which the door access and attendance Validity Period permissions of the person will be expired. People can unlock the door or take attendance during the de ned period. Period You can select more than one period. People can unlock the door or take attendance during the de ned holiday.
Parameter Description assigned to the person, they will follow the established department schedule. Department Schedule: Assign department schedule to the user. Personal Schedule: Assign personal schedule to the user. Schedule Mode This function is only available on select models. If you set the schedule mode to department schedule here, the personal schedule you have con gured for the user in Attendance >...
Figure 4-7 Maintenance 4.4.3 Con guring Time Procedure Step 1 Log in to the webpage. Select More > System > Time. Step 2 Step 3 Con gure the time. Figure 4-8 Con gure the time parameters D-162, Okhla Industrial Area sales@timewatchindia.com (+91)-11-41916615 +91-95999-53923...
Table 4-2 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Phone to sync time with the phone. NTP: The Device will automatically sync the time with the NTP server. Time Server: Enter the domain of the NTP server. Port: Enter the port of the NTP server.
Page 125
Figure 4-9 Department settings Step 3 Click the department to rename the department, and then click Save. There are 20 default departments. We recommend you rename them. Figure 4-10 Rename the department Related Operations You can click to restore departments to default settings. D-162, Okhla Industrial Area sales@timewatchindia.com (+91)-11-41916615...
4.5.2 Con guring Shifts Con gure shifts to de ne time attendance rules. Employees need to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime. Procedure Step 1 Log in to the webpage.
Page 127
Figure 4-12 Con gure the shift Table 4-3 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
Page 128
Figure 4-13 Time interval (even number) For example: If the interval is 120 minutes, then the clock-out time for period 1 is from 12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00. If a person clocks out multiple times during period 1, the latest time will be valid, and if they clock in multiple times during period 2, the earliest time will be valid.
4.5.3 Con guring Holiday Con gure holiday plans to set periods for attendance to not be tracked. Procedure Step 1 Log in to the webpage. Step 2 Select More > Attendance Con g > Shift Con g > Holiday. Click + to add holiday plans. Step 3 Step 4 Con gure the parameters, and then click Save.
Page 130
Figure 4-16 Con guring work schedules Procedure Step 1 Log in to the webpage. Step 2 Select More > Attendance Con g > Schedule Con g. Step 3 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. After you con gure the Schedule Mode as the Personal Schedule when you add the person, the person is displayed in the person list.
Figure 4-17 Department schedule 0 indicates rest. 1 to 24 indicates the number of the per-de ned shifts. 25 indicates business trip. 26 indicates leave of absence. The de ned work schedule is in a week cycle and will be applied to all employees in the department.
Page 132
Figure 4-18 Attendance con guration Table 4-5 Description of attendance parameters Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. Break Out: Clock out when your break starts.
Parameter Description Manual Mode Manually select your attendance status when you clock in or out. When you clock in or out, the screen will display the per-de ned Fixed Mode attendance status all the time. Click Apply. Step 4 4.6 Con guring Access Control 4.6.1 Con guring Unlock Methods You can use multiple unlock methods to unlock the door, such as ngerprint, card, and password.
4.6.2 Con guring Face Parameters Con gure face detection parameters. Face parameters might di er depending on models of the product. Procedure Step 1 Log in to the webpage. Step 2 Click Face Parameters on the main menu, or select More > Access Control > Face Parameters.
Table 4-6 Description of face parameters Name Description Adjust the accuracy level of face recognition. Higher threshold means higher accuracy and lower false recognition rate. Face Recognition Threshold When the threshold is too low such as 0, the false recognition rate will be extremely high.
Page 136
Figure 4-21 Access control parameters (1) Figure 4-22 Access control parameters (2) Table 4-7 Description of access control parameters Parameter Description Basic Settings Name The name of the door. D-162, Okhla Industrial Area sales@timewatchindia.com (+91)-11-41916615 +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Page 137
Parameter Description Set the door status. Normal: The door will be unlocked and locked according to your settings. Door Status Always Open: The door remains unlocked all the time. Always Closed: The door remains locked all the time. If you verify your identity multiple times within a set period, only the earliest veri cation will be considered valid, and the door will not open after Veri cation...
4.6.4 Con guring Alarms An alarm will be triggered when an abnormal access event occurs. Procedure Step 1 Log in to the webpage. Step 2 Select More > Access Control > Alarm. Con gure alarm parameters, and then click Apply. Step 3 Figure 4-23 Alarm settings Table 4-8 Description of alarm parameters...
Page 139
Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person to gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
Parameter Description If the wrong password or card is used 5 times in a row Excessive Use Alarm within 60 seconds, the alarm for excessive use of illegal card will be triggered and lasts for a de ned time. 4.6.5 Con guring Alarm Event Linkage Procedure Step 1 Log in to the webpage.
Parameter Description The tamper alarm is triggered when someone has tried to physically damage the Device. Tamper Alarm Linkage Buzzer: The buzzer sounds when the tamper alarm is triggered. You can con gure the alarm duration. 4.6.6 Con guring Card Settings Background Information Procedure Step 1...
Page 142
Table 4-10 Card parameters description Item Parameter Description The IC card can be read when this function is enabled. IC Card This function is only available on select models. The encrypted card can be read when this function is enabled. IC Card Encryption &...
Item Parameter Description Select decimal format or hexadecimal format for the card number when Wiegand Card No. System Card No. System card reader is connected. The card No. system is the same for both card number input and output. Place the card on the reader, enter the card number, and then click Write to write card number to the card.
Page 144
Figure 4-28 TCP/IP Table 4-11 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. DHCP: It stands for Dynamic Host Con guration Protocol. Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway. MAC Address MAC address of the Device.
Parameter Description MTU (Maximum Transmission Unit) refers to the maximum size of data that can be transmitted in a single network packet in computer networks. A larger MTU value can improve network transmission e ciency by reducing the number of packets and associated network overhead.
4.7.3 Con guring Wi-Fi AP The Wi-Fi function is available on select models. The Wi-Fi and Wi-Fi AP cannot be enabled at the same time. Procedure Step 1 Log in to the webpage. Select More > Communication Settings > Wi-Fi AP. Step 2 Enable the function, and then click Apply.
4.7.5 Con guring Auto Registration Procedure Step 1 Log in to the webpage. Step 2 Select More > Network Setting > Auto Registration. Step 3 Enable the auto registration function, con gure the parameters, and then click Apply. Figure 4-30 Auto registration Table 4-12 Automatic registration description Parameter Description...
Page 148
When the Device connects to a third-party device through the Wiegand input port, and the card number read by the Device is in the reverse order from the actual card number. In this case, you can turn on Card No. Inversion function. Figure 4-31 Wiegand input Select Wiegand Output when the Device functions as a card reader, and you need to connect it to another access controller.
Parameter Description Pulse Interval Select the type of output data. No.: Outputs data based on user ID. The data format is Output Data Type hexadecimal or decimal. Card Number: Outputs data based on user's rst card number. 4.7.7 Con guring RS-485 Con gure the RS-485 parameters if you connect an external device to the RS-485 port.
Table 4-14 Description of RS-485 parameters Parameter Description Access Controller Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Card Reader: The Device functions as an access controller, External Device and connects to an external card reader.
Figure 4-34 Con gure the audio parameters Table 4-15 Parameters description Parameters Description Speaker Volume Set the volume of the speaker. When this function is enabled, the device will produce sound Screen Tap Sound when pressing the button. No voice prompts during the set time when you verify your DND Mode identity on the Device.
Figure 4-35 Logs 4.9.2 Unlock Records Search for unlock records. Procedure Step 1 Log in to the webpage. Step 2 Select More > Log > Unlock Records. Step 3 Click the record to view the details. 4.9.3 Alarm Logs View alarm logs. Procedure Step 1 Log in to the webpage.
5 Smart PSS Lite Con guration This section introduces how to manage and con gure the device through Smart PSS Lite. For details, see the user's manual of Smart PSS Lite. 5.1 Installing and Logging In Install and log in to Smart PSS Lite. For details, see the user manual of Smart PSS Lite. Procedure Step 1 Get the software package of the Smart PSS Lite from the technical support, and then install...
Figure 5-1 Add devices Table 5-1 Parameters of IP adding Parameter Description We recommend you name devices with the monitoring area for easy Device Name identi cation. Select IP/Domain. Method to add IP/Domain: Enter the IP address or domain name of the device. SN: Enter the serial number of the device.
Step 2 Select a search method. Auto Search: Enter the username and the password of the device. The system will automatically search for devices that are on the same network to your computer. Device Segment Search: Enter the username and the password of the device, and then de ne the start IP and the end IP.
5.3.1 Con guring Card Type Set the card type before you assign cards to users. For example, if the assigned card is an ID card, set card type to ID card. Procedure Step 1 Log in to Smart PSS Lite. Step 2 Click Access Solution >...
Page 157
b. Add ngerprint. Select Add > Add Fingerprint, and then press nger on the scanner for three times continuously. Figure 5-4 Add basic information Step 3 Click Extended information to add extended information of the personnel, and then click Finish to save. (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com...
Page 158
Figure 5-5 Add extended information Step 4 Con gure permissions. 1) Click 2) Enter the group name, remarks (optional), and select a time template. 3) Select veri cation methods and doors. Step 5 Con gure permissions. For details, see "5.3.3 Assigning Access Permission". 1.
Figure 5-6 Con gure permission groups Click Finish. Step 6 After completing adding, you can click to modify information or add details in the list of sta . 5.3.2.2 Adding Users in Batches Procedure Step 1 Click Personnel Manger > Batch Update > Batch Add. (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com...
Page 160
Step 2 Select Card issuer or Device from the Device list, and then con gure the parameters. Figure 5-7 Add users in batches Table 5-2 Add users in batches parameters Parameter Description Start No. The user ID starts with the number you de ned. Quantity The number of users you want to add.
The card number will be read automatically. Click OK. Step 4 5.3.3 Assigning Access Permission Create a permission group that is a collection of door access permissions, and then link users with the group so that users can unlock doors associated with the permission group. Procedure Step 1 Click Access Solution >...
Figure 5-9 Add users to a permission group Step 8 Click OK. Users can unlock the door in this permission group after valid identity veri cation. 5.3.4 Assigning Attendance Permissions Create a permission group that is a collection of time attendance permissions, and then associate employees with the group so that they can punch in/out through de ned veri cation methods.
Page 163
Figure 5-10 Create a permission group The Time & Attendance supports punch-in/out through password, face attendance, card and ngerprint attendance. Card and ngerprint attendance are available on select models. Step 7 Click of the permission group you added. Step 8 Select users to associate them with the permission group.
Figure 5-11 Add users to a permission group Click OK. Step 9 5.4 Access Management 5.4.1 Remotely Opening and Closing Door You can remotely monitor and control door through the platform. For example, you can remotely open or close the door. Procedure Step 1 Click Access Solution >...
Related Operations Event ltering: Select the event type in the Event Info, and the event list displays the selected event type, such as alarm events and abnormal events. Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click to unlock.
Page 166
Figure 5-14 Monitor door status Related Operations Show All Door: Displays all doors controlled by the Device. Reboot: Restart the Device. Details: View the device details, such as IP address, model, and status. (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Appendix 1 Important Points of Face Registration Before Registration Glasses, hats, and beards might in uence face recognition performance. Do not cover your eyebrows when wearing hats. Do not change your beard style greatly if you use the Device; otherwise face recognition might fail.
Page 168
The face position below is for reference only, and might di er from the actual situation. Appendix Figure 1-1 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. Do not wear face masks, glasses, hats, heavy beards, or other face ornaments that in uence face image recording.
Page 169
Appendix Figure 1-3 Face distance When importing face images through the management platform, make sure that image resolution is within the range from 150 × 300 pixels to 600 × 1200 pixels. It is recommended that the resolution be greater than 500 × 500 pixels, the image size be less than 100 KB, and the image name and person ID be the same.
Appendix 2 Important Points of Fingerprint Registration Instructions When you register the ngerprint, pay attention to the following points: Make sure that your ngers and the scanner surface are clean and dry. Press your nger on the center of the ngerprint scanner. Do not put the ngerprint sensor in a place with intense light, high temperature, and high humidity.
Page 171
How to Press Your Fingerprint on the Scanner Appendix Figure 2-2 Correct placement Appendix Figure 2-3 Wrong placement (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Appendix 3 Security Recommendation Account Management 1. Use complex passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters; Include at least two types of characters: upper and lower case letters, numbers and symbols; Do not contain the account name or the account name in reverse order;...
It is recommended that you change the default port of HTTP and other services to any port between 1024 and 65535 to reduce the risk of being guessed by threat actors. Network Con guration 1. Enable Allow list It is recommended that you turn on the allow list function, and only allow IP in the allow list to access the device.
Page 174
key management in place to prevent unauthorized personnel from damaging hardware and other peripheral equipment (e.g. USB ash disk, serial port). (+91)-11-41916615 D-162, Okhla Industrial Area sales@timewatchindia.com +91-95999-53923 Phase I, New Delhi, 110020 www.timewatchindia.com...
Page 175
Contact Us D-162, Okhla Industrial Area, Phase-I, Delhi 110020 Email: sales@timewatchindia.com Phone: +91-11-41916615 Mobile No: +91-95999-53923 New Delhi - NCR Mumbai Ahmedabad Bengaluru Chennai Kolkata Dubai...
Need help?
Do you have a question about the TrueFace1000 and is the answer not in the manual?
Questions and answers