Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Device"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in...
Page 3
Version Revision Content Release Time Updated communication V1.2.0 settings, access control settings November 2023 and more. V1.1.0 Updated the manual. October 2023 V1.0.0 First Release. June 2023 Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, audio, fingerprints, and license plate number.
1 Overview The Device is an access controller that supports unlocking through faces, passwords, fingerprints, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers.
2 Local Operations Configurations might differ depending on the actual product. ● Models with non-touch screen needs connecting a wired USB mouse. This section uses the ● models with touch screen as an example. External expansion modules are only available on select models. ●...
2.3 Standby Screen You can unlock the door through faces, cards, passwords, and QR code. You can also make calls through the intercom function. Unlock methods might differ depending on the models of the product. If there is no operation in 30 seconds, the Device will go to the standby mode. ●...
Table 2-2 Home screen description Name Description Date and time Current date and time. Enter user password, public password or temporary Password password to unlock the door. Tap the QR code icon and scan QR code to unlock the door. QR code For models that have a standalone QR code module or connect a QR expansion module.
Administrator account: Can log in to the main menu of the Device and has door access ● permissions. Procedure Step 1 Press and hold the standby screen for 1.5 seconds. Step 2 Select a verification method to enter the main menu. Face: Enter the main menu by face recognition.
Step 10 Click OK. 2.7 Unlocking Methods You can unlock the door through faces, passwords, fingerprints, cards, and more. 2.7.1 Unlocking by Cards Place the card at the swiping area to unlock the door. This function is only available on select models. 2.7.2 Unlocking by Face Verify the identity of an individual by detecting their faces.
2.7.5 Unlocking by QR code The QR code method is available when the Device is used with the visitor module of DSS. Procedure Step 1 On the standby screen, tap The QR code icon is displayed only after you go to Functions > Face Recognition Interface Shortcut to enable QR code.
Page 16
Figure 2-3 Add the user Table 2-3 Parameters description Parameter Description The No. is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the No. is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
Page 17
Parameter Description Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint. An alarm will be triggered when the duress fingerprint is used to unlock the door. Fingerprint Fingerprint function is only available on select models. ●...
Parameter Description General User : General users can unlock the door. ● Blocklist User : When users in the blocklist unlock the door, an blocklist ● alarm will be triggered. Guest User : Guests can unlock the door within a defined period or for ●...
Related Operations On the User screen, you can manage the added users. Search for users: Tap and then enter the username or user ID. ● Edit users: Tap the user to edit user information. ● Delete users ● Delete one by one: Select a user, and then tap Delete in batches: On the User List screen, tap to delete all users.
Page 20
Figure 2-5 Combination unlock Tap Unlock Method, and select unlock methods. Step 3...
Page 21
Figure 2-6 Unlock method Tap +And or /Or to configure combinations. Step 4 To cancel your selection, tap the selected method again. +And : ● Verify all the selected unlock methods to open the door. People have to complete verification in the order of card, fingerprint, face and password.
Step 2 Tap Combination Unlock next to Unlock Method, and then select Unlock by Period from the list. For details on how to configure unlock by period, see "3.6.1.2 Configuring Unlock Methods". Step 3 to save changes. 2.9.1.3 Configuring Unlock by Multiple Users Procedure Step 1 Select Access Control Management.
Page 23
Figure 2-7 Alarm Table 2-4 Description of alarm parameters Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. This helps prevent card holders from giving their card to other people to allow them access. When anti-passback is enabled, the card holder must leave the secure area through an exit reader before the system will grant them access again.
Parameter Description Door Detector With the door detector wired to your device, alarms can be triggered when doors are opened or closed abnormally. There are 2 types of door detectors: NC detector and NO detector. Normally Closed: In this mode, a short circuit in the sensor indicates ●...
Table 2-5 Parameters description Parameter Description Normally Open : The door remains unlocked all the time. ● Normally Closed : The door remains locked all the time. ● Door Status Normal : If Normal is selected, the door will be locked and ●...
Figure 2-10 Create departments Step 3 2.10.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to come to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime.
Page 27
Figure 2-11 Create shifts Table 2-6 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance records.
Figure 2-12 Time interval (even number) For example: If the interval is 120 minutes, then the clock-out time for period 1 is from 12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00. If a person clocks out multiple times during period 1, the latest time will be valid, and if they clock in multiple times during period 2, the earliest time will be valid.
Step 2 Click to add holiday plans. Step 3 Configure the parameters. Figure 2-14 Create holiday plans Table 2-7 Parameters description Parameter Description Attendance Holiday No. The number of the holiday. Attendance Holiday The name of the holiday. Start Time The start and end time of the holiday.
Page 30
Figure 2-15 Configure work schedules Procedure Select Attendance > Schedule Config. Step 1 Step 2 Set work schedules for individuals. 1. Tap Personal Schedule. 2. Enter the user ID, and then tap 3. On the calendar, select a day, and then select a shift. The shift is scheduled for the day.
Page 31
Figure 2-16 Schedule shifts to individuals 4. Tap Step 3 Set works schedules for departments. 1. Tap Department Schedule. 2. Tap a department, and then select shifts for a week. Shifts are scheduled for the week. 0 indicates rest. ● 1 to 24 indicates the number of the pre-defined shifts.
Figure 2-17 Schedule shifts to a department The defined work schedule is in a week cycle and will be applied to all employees in the department. Step 4 2.10.5 Configuring Attendance Modes When you clock in or clock out, you can set the attendance modes to define the attendance status. Procedure On the main menu screen, click Attendance .
Page 33
Figure 2-18 Enable attendance Click Mode Settings, and then select an attendance mode. Step 3 The attendance records will also be synchronized to the management platform. Figure 2-19 Attendance mode Table 2-8 Attendance mode Parameter Description The screen displays the attendance status automatically after you Auto/Manual Mode clock in or out, but you can also manually change your attendance status.
Page 34
Parameter Description The screen displays your attendance status automatically after you Auto Mode clock in or out. Manual Mode Manually select your attendance status when you clock in or out. When you clock in or out, the screen will display the pre-defined Fixed Mode attendance status all the time.
Table 2-9 Attendance mode parameters Parameters Description Check In Clock in when your normal workday starts. Break Out Clock out when your break starts. Break In Clock in when your break ends. Check Out Clock out when your normal workday ends. Overtime Check In Clock in when your overtime period starts.
2.11.1.1 Configuring the IP Address Set an IP address for the Device to connect it to the network. After that, you can log in to the webpage and the management platform to manage the Device. Procedure On the Main Menu, select Communication Settings > Network > IP Settings. Step 1 Step 2 Set the IP address.
Page 37
2.11.1.2 Configuring Auto Registration Add the device to a management platform, so that you can manage it on the platform. Procedure On the Main Menu, select Communication Settings > Network > Auto Registration. Step 1 To avoid exposing the system to security risks and data loss, control the management platform permissions.
Page 38
The Wi-Fi function is only available on select models. ● Wi-Fi AP and Wi-Fi function cannot be enabled at the same time. ● After Wi-Fi is enabled, wait about 1 minute to connect Wi-Fi. ● Step 3 to search available wireless networks. Step 4 Select a wireless network and enter the password.
Page 39
Wi-Fi AP and Wi-Fi function cannot be enabled at the same time. ● Every time you power on the Device, the Wi-Fi AP function will be automatically ● enabled for 30 minutes. Figure 2-26 Connect to Wi-Fi AP Related Operations You can also tap the right corner on the standby screen to view the Wi-Fi AP status.
Figure 2-27 Wi-Fi AP 2.11.2 Configuring RS-485 This function is only available on select models. Procedure On the Main Menu, select Communication Settings > RS-485 Settings. Step 1 Step 2 Select an external device.
Page 41
Figure 2-28 External device type Table 2-12 Port description External device Description The Device functions as a card reader and sends data to other external access controllers to control access. Output Data Type: Card Number : Outputs data based on the card number ●...
External device Description After the security module is enabled, the door exit button, lock control and fire linkage of the Device become not effective. You can verify the identification through the methods of ● face, card, fingerprint and password on the Device to unlock the door security module lock.
Figure 2-29 Wiegand output Table 2-13 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits. ● Wiegand Output Type Wiegand34 : Reads 4 bytes or 8 digits. ●...
Page 44
Figure 2-30 Time Table 2-14 Description of time parameters Parameter Description 24-hour System The time is displayed in 24-hour format. Date & Time Set up the date. Time Set up the time. Date Format Select a date format. 1. Tap DST Setting and enable it. 2.
2.12.2 Configuring Face Parameters Face parameters might differ depending on the models of the Device. Procedure On the main menu, select System Settings > Face Parameter Config. Step 1 Step 2 Configure the face parameters, and then tap Figure 2-31 Face parameter Table 2-15 Description of face parameters Name Description...
Name Description When the same face remains in front of the lens after the first Valid Face Interval (sec) successful recognition, the Device will perform recognition again for the face after a defined interval. When the same face remains in front of the lens after the first Invalid Face Interval (sec) failed recognition, the Device will perform recognition again for the face after a defined interval.
Table 2-16 Parameters description Parameters Description Speaker Volume Tap the volume, and then tap to adjust the volume. Microphone Volume When this function is enabled, touch screen devices will produce tap Screen Tap Sound sound and non-touch screen devices will produce mouse click sound. 2.12.4 Configuring the Language Change the language on the Device.
2.12.7 Restoring Factory Defaults Restoring the device to the factory settings might cause data loss. Please be advised. Restore through the Software 1. On the Main Menu, select System Settings > Factory Defaults. 2. Restore factory defaults if necessary. Restore the factory default settings if necessary. Factory Defaults : Resets all configurations and data except for IP settings and the type of ●...
2.13.1 Exporting to USB You can export data from the Device to a USB. The exported data is encrypted and cannot be edited. Procedure On the Main Menu, select USB Management > USB Export. Step 1 Select the data type you want to export, and then tap OK. Step 2 When the data is exported in Excel, it can be edited.
Page 51
Table 2-17 Function description Parameter Description Password reset: The password can be reset when you turn on ● this function. Enable HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a ● protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands;...
Page 52
Parameter Description Select identity verification methods on the standby screen. Password: Its icon is displayed on the standby screen. ● QR code: It's icon is displayed on the standby screen. ● This function is only available on select models. Doorbell: It's icon is displayed on the standby screen. ●...
Parameter Description Select the function that the port can be used for. Port Config When the cables can be used as different functions, Port ● Config is displayed. The functions might differ according to the actual device ● models. 2.15 Records Management On the main menu, select Records Management >...
3 Web Operations On the webpage, you can also configure and update the Device. Web configurations differ depending on models of the Device. 3.1 Initialization Initialize the Device when you log in to the webpage for the first time or after the Device is restored to the factory defaults.
3.3 Resetting the Password Reset the password through the linked email when you forget the admin password. Procedure On the login page, click Forgot password. Step 1 Read the on-screen prompt carefully, and then click OK. Step 2 Step 3 Scan the QR code, and you will receive a security code.
Figure 3-2 Home page Table 3-1 Home page description Description Main menu. : Enter the home page. ● : Select a language on the device. ● : Log out or restart the device. ● : Enter the Security page. ● : Scan the QR code with your phone to view the product ●...
Page 57
Figure 3-3 Add the user Table 3-2 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
Page 58
Parameter Description Department Add users to a department. If a department schedule is assigned to the person, they will follow the established department schedule. For how to create department, see "2.10.1 Configuring Departments". Department Schedule: Assign department schedule to the user. For details, ●...
Page 59
Parameter Description Click Upload to upload a face image. Each person can only add up to 2 face images. You can view or delete the face image after you upload it. Face The face image is in jpg, jpeg, png format and must be less than 100 KB. Enter the user password.
Parameter Description Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint. An alarm will be triggered when the duress fingerprint is used to unlock the door. Enroll fingerprints through an enrollment reader or the Device. 1.
Page 61
Figure 3-4 Basic parameters Table 3-3 Basic parameters description Parameter Description Name The name of the door. Set the door status. Normal: The door will be locked and unlocked according to your ● Door Status settings. Always Open: The door remains unlocked all the time. ●...
Page 62
Parameter Description Displays the notification on the screen when a person verifying their identity on the Device. High Speed Mode: The system prompts Successfully verified or ● Not authorized on the screen. Simple Mode: Displays user ID, name and verification time after ●...
Page 63
Figure 3-5 Unlock settings Table 3-4 Unlock settings description Parameter Description Unlock methods might differ depending on the models of Unlock Method (Multi-select) product. When PIN code authentication is enabled, you can open the door PIN Code Authentication with just the password. After a person is granted access, the door will remain unlocked Door Unlocked Duration for a defined time for them to pass through.
Figure 3-6 Unlock by period Unlock by multiple users. ● 1. In the Unlock Mode list, select Unlock by multiple users. 2. Click Add to add groups. 3. Select unlock method, valid number and user list. If only one group is added, the door unlocks only after the number of people in the group who grant access equals the defined valid number.
Page 65
Figure 3-8 Alarm Table 3-5 Description of alarm parameters Parameter Description An alarm will be triggered when a duress card, duress Duress Alarm password or duress fingerprint is used to unlock the door. Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered.
Parameter Description With the door detector wired to your device, alarm can be triggered when doors are opened or closed abnormally. The door detector includes 2 types, including NC detector and NO detector. Door Detector NC: The sensor is in a shorted position when the door or ●...
Page 67
Figure 3-9 Alarm linkage Step 3 Create a name for the alarm zone. Enable Link Fire Safety Control, and select a type for the alarm input device. Step 4 NC: The alarm input is in a normally closed (NC) circuit state when the alarm has not ●...
3.6.4 Configuring Alarm Event Linkage Procedure Step 1 On the Main Menu, select Access Control > Alarm > Alarm Event Linkage. Step 2 Configure alarm event linkages. Figure 3-10 Alarm event linkage Table 3-6 Alarm event linkage Parameter Description If the door is opened abnormally, an intrusion alarm will be triggered. Buzzer: The buzzer sounds when an intrusion alarm is triggered.
Parameter Description When the door remains unlocked for longer than the defined timeout duration, the door timeout alarm will be triggered and last for the defined time. Buzzer: The buzzer sounds when the unlock timeout alarm is ● triggered. You can configure the alarm duration. Unlock Timeout Alarm Custom time: Customize the duration.
Page 70
Figure 3-11 Face detection parameters Step 3 Configure the parameters. Table 3-7 Description of face parameters Name Description Adjust the accuracy level of face recognition. Higher threshold means higher accuracy and lower false recognition rate. Face Recognition Threshold When the threshold is too low such as 0, the false recognition rate will be extremely high.
Page 71
Name Description Turn on: The illuminator is turned on in low-light conditions. ● Turn off: The illuminator is turned off all the time. ● Illuminator This function is only available on select models. When the same face remains in front of the lens after the first Valid Face Interval (sec) successful recognition, the Device will perform recognition again for the face after a defined interval.
Page 72
Name Description Detects 4 to 6 face images at a time. Combination unlock cannot be used with this, and the door will be unlocked when one of the people are successfully verified. Multi-face Recognition The number of face images which are supported might differ depending on the model of the product.
3.6.6 Configuring Card Settings Background Information This function is only available on select models. Procedure Step 1 Log in to the webpage. Select Access Control > Card Settings. Step 2 Step 3 Configure the card parameters. Figure 3-13 Card parameters Table 3-9 Card parameters description Item Parameter...
Page 74
Item Parameter Description Only the encrypted IC card can be read when this function is enabled. IC Card Encryption & Verification Make sure IC Card is enabled. Prevent unlocking through duplicated NFC card after this function is enabled. This function is only available on models ●...
3.6.7 Configuring QR Code Procedure Step 1 On the webpage, select Access Control > Card Settings. Figure 3-14 QR code Table 3-10 QRR code parameters Parameters Description Enable QR Code Exposure The QR code will be exposed at the defined brightness, and the QR code can be detected and read clearly.
Page 76
1. Configure the plan number and the plan name. 2. Drag the time slider to configure time for each day. 3. (Optional) Click Copy to copy the configuration to the rest of days. Figure 3-15 Configure general plan Click OK. Step 4 3.6.8.2 Configuring Holiday Plan You can configure up to 128 holiday groups (from No.0 through No.127), and for each holiday...
Page 77
Figure 3-16 Add a holiday group 2. Click Add , add a holiday to a holiday group, and then click OK. Figure 3-17 Add a holiday to a holiday group Click OK. Step 4 Click Plan Management , and then click Add. Step 5 1.
Figure 3-18 Add holiday plan Step 6 Click OK. 3.6.9 Configuring Expansion Modules For Device that supports connecting expansion modules, configure the type of the module that the Device supports. Background Information The type the expansion module might differ depending on models of the Device. ●...
Face images will be captured automatically when people unlock the door. Figure 3-19 Enable snapshot Click Apply. Step 3 3.6.11 Configuring Port Functions Some ports can function as different ports, you can set them to different ports based on the actual needs.
Page 80
Local verification: The identifications are verified on the Access Controller. ● Figure 3-21 Configure the elevator control parameters Step 4 Click next to the elevator controller to configure the parameters, and then enable the elevator controller. One access controller can connect to up to 8 elevator controllers. Figure 3-22 Configure the parameters Table 3-11 Device parameters description Parameter...
Parameter Description Configure the elevator control duration. The value ranges from 0 second to 999 seconds. The duration priority is: Access Controller or door station > Lift Control Duration (sec) elevator controller > elevator control module. For example, if you configure the duration on the Access Controller and the elevator control module, the duration on the Access Controller shall prevail.
3.7.1 Using the Device as the SIP Server 3.7.1.1 Configuring SIP Server When the Device functions as the SIP server, it can connect up to 500 VTHs. Procedure Select Intercom Settings > SIP Server. Step 1 Turn on SIP Server. Step 2 The device settings will be automatically restored to factory defaults if the SIP server status changes.
Page 83
Figure 3-25 Basic parameters Table 3-13 Basic parameters description Parameter Description Select Door Station. Device Type Cannot be set. When you turn on the group call function, the door station calls the Group Call main VTH and the extensions at the same time. The setup is effective after the door station restarts.
Page 84
Figure 3-26 Add door station Table 3-14 Add VTO configuration Parameter Description Device Type Select Door Station. To view the number of the door station, go to the Device screen of the door station, and then enter the number of door station on this page. Registration Keep it default.
Page 85
3.7.1.4 Adding the VTH When the Device functions as the SIP Server, you can add all VTHs in the same unit to the SIP server to make sure that they can call each other. Background Information When there are main VTH and extension, you need to turn on the group call function first, and ●...
Page 86
Figure 3-27 Add one by one Table 3-15 Room information Parameter Description First Name Last Name Enter the name of the VTH to help you differentiate VTHs. Alias...
Page 87
Parameter Description Enter the room number of the VTH. The room number consists of 1-5 digits, and must conform to the configured room number on the VTH. When there are main VTH and extensions, the room number of main VTH ends with -0 and the room number of Room No.
Page 88
Figure 3-28 Batch add Table 3-16 Add in batches Parameter Description The number of floors of the building, which ranges from 1 to Floors in Unit The number of rooms on each floor, which ranges from 1 to Rooms on Each Floor First Room No.
Figure 3-29 VTS management Table 3-17 VTS parameters Parameter Description Enter 888888+ VTS No, which can include up to 9 digits. For the VTS No. VTS No, go to Device screen on the VTS. IP Address The IP address of the VTS. Registration Password Keep it as default.
Page 90
Figure 3-30 Use VTO as the SIP server Table 3-18 SIP server configuration Parameter Description IP/Domain Name IP address or domain name of the VTO. Port 5060 by default when VTO works as SIP server. Username Leave them as default. Registration Password SIP Domain VDP.
3.7.2.2 Configuring Local Parameters Configure the parameters of the Device when you use another VTO as the SIP server. Procedure Select Intercom Settings > Local Device Config. Step 1 Step 2 Configure the parameters. Figure 3-31 Configure the parameters Table 3-19 Parameters description Parameter Description Select Door Station.
Page 92
Do not enable SIP Server. Figure 3-32 Alternate server Table 3-20 SIP server configuration Parameter Description Server Address IP address of the platform. Port 5080 by default when the platform works as SIP server. Registration Password Leave them as default. SIP Domain Leave it as default.
Page 93
3.7.3.2 Configuring Local Parameters Configure the parameters of the Device when the platform is used as the SIP server. Procedure Select Intercom Settings > Local Device Config. Step 1 Step 2 Configure the parameters. Figure 3-33 Basic parameter Table 3-21 Parameters description Parameter Description Device Type...
3.7.3.3 Registration Management When the management platform works as the SIP server, you can view and manage all devices that registered to SIP server. Procedure Select Intercom Settings > Registration Management. Step 1 Step 2 You can view and edit the devices. Figure 3-34 View and manage devices 3.7.4 Call Config Configure the call function of the Device.
Only when the Device is set as the SIP server, and VTH and VTS are added to the SIP ● server on the Device Setting page, the corresponding device type is displayed. Figure 3-35 Call room type and phone book mode Step 3 Add VTH and VTS.
Figure 3-36 Create departments Related Operations You can click Default to restore departments to default settings. 3.8.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime. Procedure Step 1 Select Attendance Config >...
Page 97
Figure 3-37 Create shifts Table 3-23 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
Page 98
When the time interval between 2 periods is an even number, you can divide the time ● interval by 2, and assign the first half of the interval to the first period, which will be the clock out time. The second half of the interval should be assigned to the second period as the clock in time.
3.8.3 Configuring Holiday Configure holiday plans to set periods for attendance to not be tracked. Procedure Select Attendance Config > Shift Config > Holiday. Step 1 Step 2 Click Add to add holiday plans. Step 3 Configure the parameters. Figure 3-40 Create holiday plans Table 3-24 Parameters description Parameter Description...
Page 100
Figure 3-41 Configure work schedules Procedure Select Attendance Config > Schedule Config. Step 1 Step 2 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. 3. On the calendar, select a day, and then select a shift. You can also click Batch Configure to schedule shifts to multiple days.
Page 101
Figure 3-42 Personal schedule You can only set work schedules for the current month and the next month. 0 indicates break. ● 1 to 24 indicates the number of the pre-defined shifts. For how to configure shifts, see ● "2.10.2 Configuring Shifts". 25 indicates business trip.
Figure 3-43 Schedule shifts to a department The defined work schedule is in a week cycle and will be applied to all employees in the department. 3.8.5 Configuring Attendance Modes Procedure Step 1 Select Attendance Config > Attendance Config. Enable Local Attendance, and then set the attendance mode. Step 2 Step 3 Configure attendance modes.
Page 103
Figure 3-44 Attendance modes Table 3-25 Attendance mode Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. ●...
Related Operations Refresh: If you do not want to the save the current changes, click Refresh to cancel changes and ● restore it to previous settings. Default: Restore the attendance settings to factory defaults. ● 3.9 Configuring Audio and Video 3.9.1 Configuring Video Procedure Select Audio and Video Config >...
Page 105
Parameter Description Video compression standard to deliver good Compression video quality at lower bit rates. The sub-stream supports D1, VGA and Resolution QVGA. The number of frames (or images) per Frame Rate (FPS) second. Sub Stream It indicates the amount of data transmitted Bit Rate over an internet connection in a given amount of time.
Page 106
Parameter Description Day/Night mode affects light compensation in different situations. Auto : The system automatically adjusts the day/night mode ● Day/Night based on the photographic sensitivity. Colorful : In this mode, images are colorful. ● Black and white : In this mode, images are in black and white. ●...
Page 107
Table 3-28 Exposure parameter description Parameter Description Set anti-flicker to reduce flicker and decrease or reduce uneven colors or exposure. 50Hz : When the mains electricity is 50 Hz, the exposure is ● automatically adjusted based on brightness of the surroundings to prevent the appearance of horizontal lines.
Figure 3-48 Image Table 3-29 Image description Parameter Description Brightness The brightness of the image. Higher value means brighter images. Contrast is the difference in the luminance or color that makes an Contrast object distinguishable. The larger the contrast value is, the greater the color contrast will be.
Page 109
Figure 3-49 Configure audio parameters Table 3-30 Parameters description Parameters Description Speaker Set the volume of the speaker. Microphone Volume Set the volume of the microphone. When this function is enabled, touch screen devices will produce Screen Tap Sound tap sound and non-touch screen devices will produce mouse click sound.
3.9.3 Configuring Motion Detection When there are moving objects detected and reaches the set threshold, the screen will be awaken. Background Information This function is only available on select models. Procedure Select Audio and Video Config > Motion Detection Settings. Step 1 Step 2 Enable the motion detection function.
3.9.4 Configuring Local Coding Set the view area in the video talk and preview. Background Information This function is only available on select models. ● This function is enabled by default when it works with a VTH. The preview might be not ●...
3.10 Communication Settings 3.10.1 Network Settings 3.10.1.1 Configuring TCP/IP You need to configure IP address of Device to make sure that it can communicate with other devices. Procedure Step 1 Select Communication Settings > Network Setting > TCP/IP. Step 2 Configure the parameters.
Page 113
Figure 3-52 TCP/IP Table 3-31 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. ● DHCP: It stands for Dynamic Host Configuration Protocol. ● Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway.
Page 114
Parameter Description IP Address If you set the mode to Static, configure the IP address, subnet mask and gateway. Subnet Mask IPv6 address is represented in hexadecimal. ● Default Gateway IPv6 version do not require setting subnet masks. ● The IP address and default gateway must be in the same ●...
Page 115
Static: Enable this function, manually enter a Wi-Fi address, and then click Apply, the Device will ● connect to the Wi-Fi. 3.10.1.3 Configuring Wi-Fi AP The Wi-Fi function is available on select models. ● The Wi-Fi and Wi-Fi AP cannot be enabled at the same time. ●...
3.10.1.4 Configuring Port You can limit access to the Device at the same time through webpage, desktop client and mobile client. Procedure Select Communication Settings > Network Setting > Port. Step 1 Step 2 Configure the ports. Except for Max Connection and RTSP Port, you need to restart the Device to make the configurations effective after you change other parameters.
Page 117
3.10.1.5 Configuring Basic Service When you want to connect the Device to a third-party platform, turn on the CGI and ONVIF functions. Procedure Select Communication Settings > Network Settings > Basic Services. Step 1 Step 2 Configure the basic service. Figure 3-56 Basic service Table 3-33 Basic service parameter description Parameter...
Page 118
Parameter Description Set the authentication mode, including safe mode and compatibility mode. It is recommended to choose Security Mode. Security Mode (recommended): Does not support accessing ● Private Protocol Authentication the device through Digest, DES, and plaintext authentication Mode methods, improving device security. Compatible Mode: Supports accessing the device through ●...
Page 119
Figure 3-57 Cloud service Step 3 Click Apply. Step 4 Scan the QR code with DMSS to add the device. 3.10.1.7 Configuring Auto Registration The auto registration enables the devices to be added to the management platform without manual input of device information such as IP address and port. Background Information The auto registration only supports SDK.
Page 120
Figure 3-58 Auto Registration Table 3-34 Automatic registration description Parameter Description Status Displays the connection status of auto registration. Server Address The IP address or the domain name of the server. Port The port of the server that is used for automatic registration. The registration ID (user defined) of the device.
Page 121
Figure 3-59 CGI auto registration Table 3-35 Automatic registration description Parameter Description Supports up to 32 bytes, including Chinese, numbers, letters, and Device ID special characters. Address Type Supports 2 methods to register. Host IP Host IP: Enter the IP address of the third-party platform. ●...
3.10.1.9 Configuring Auto Upload Send user information and unlock records through to the management platform. Procedure On the home page, select Communication Settings > Network Settings > Auto Step 1 Upload. (Optional) Enable Push Person Info. Step 2 When the user information is updated or new users are added, the Device will automatically push user information to the management platform.
Page 123
Figure 3-61 Configure parameters Table 3-37 Configure the RS-485 parameters Parameter Description Access Controller ● Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Output Data type: Card Number: Outputs data based on card number when users swipe card to unlock door;...
Parameter Description The number of bits used to transmit the actual data in a serial communication. Data Bit It represents the binary digits that carry the information being transmitted. A bit sent after the data and optional parity bits to indicate the end of a data Stop Bit transmission.
Figure 3-62 Wiegand output Table 3-38 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits. ● Wiegand Output Type Wiegand34 : Reads 4 bytes or 8 digits. ●...
3.11.1 User Management You can add or delete users, change users' passwords, and enter an email address for resetting the password when you forget your password. 3.11.1.1 Adding Administrators You can add new administrator accounts, and then they can log in to the webpage of the Device. Procedure Step 1 On the home page, select System >...
Page 127
3.11.1.2 Adding ONVIF Users Background Information Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established for the development of a global open standard for the interface of physical IP-based security products, which allows the compatibility from different manufactures. ONVIF users have their identities verified through ONVIF protocol.
Click OK. Step 3 3.11.1.3 Resetting the Password Reset the password through the linked email when you forget your password. Procedure Select System > Account. Step 1 Step 2 Enter the email address, and set the password expiration time. Step 3 Turn on the password reset function.
Page 129
Figure 3-66 Date settings Table 3-40 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Time to ● sync time with computer. NTP: The Device will automatically sync the time with the NTP ●...
Parameter Description 1. (Optional) Enable DST. 2. Select Date or Week from the Type. 3. Configure the start time and end time of the DST. Click Apply. Step 3 3.11.3 Configuring the Shortcuts Procedure On the webpage, select System > Shortcut Settings. Step 1 Step 2 Configure the shortcut parameters.
Page 131
Table 3-41 Parameters description Parameter Description The icon of the password unlock method is displayed on the standby Password screen. The QR code icon is displayed on standby screen. This function is not QR code available for Device with a standalone QR code module. After the doorbell function is turned on, doorbell icon is displayed on the standby screen.
3.12 Personalization Configure themes and add video or image advertisements to the Device. The function is available on select models. ● Decoding of video containing B-frames sent from the platform is not supported. ● Images with a bit depth of 1 cannot be processed. ●...
1. Click 2. Select image from the local and upload it. Supports PNG, JPG, BMP. Image size must be less than 2 M. Related Operations Click to delete uploaded images or videos. Videos and images in use cannot be deleted. 3.12.2 Configuring Themes Procedure On the home page, select Personalization >...
Page 134
Figure 3-70 Advertisement mode 2. Select the display mode. Original Scale: Plays the image and video in the original size. ● Full Screen: Plays the image and video in full screen. ● 3. Click Add to add time schedules. You can add up to 10 schedules. 4.
Page 135
Figure 3-71 Add time schedules Step 5 Configure greetings. 1. Select Greetings from the Custom Content. 2. Select the template. 3. Enter the title and subtitle.
Figure 3-72 Greetings 4. Click Apply. 3.13 Management Center 3.13.1 One-click Diagnosis The system automatically diagnoses the configurations and the status of the device to improve its performance. Procedure On the home page, select Maintenance Center > One-click Diagnosis. Step 1 Click Diagnose.
Figure 3-73 One-click diagnosis 3.13.2 System Information 3.13.2.1 Viewing Version Information On the webpage, select System > Version, and you can view version information of the Device. 3.13.2.2 Viewing Legal Information On the home page, select System > Legal Info, and you can view the software license agreement, privacy policy and open source software notice.
Page 138
Related Operations click Export to export the searched logs to your local computer. ● Click Encrypt Log Backup, and then enter a password. The exported file can be opened only ● after entering the password. Click to view details of a log. ●...
Select Maintenance Center > Log > USB Management. Step 2 Make sure that a USB is inserted to the Device before you export data or update the ● system. To avoid failure, do not pull out the USB or perform any operation of the Device during the process.
3.13.5.2 Restoring the Factory Default Settings Procedure Select System > Config. Step 1 Restoring the Device to its default configurations will result in data loss. Please be advised. Step 2 Restore to the factory default settings if necessary. Factory Defaults : Resets all the configurations of the Device and delete all the data. ●...
3.13.7.2 Online Update Procedure On the home page, select System > Update. Step 1 In the Online Update area, select an update method. Step 2 Select Auto Check for Updates, and the Device will automatically check for the latest ● version update.
Figure 3-76 Network test 3. Click Test. The result is displayed in the Test Result area. You can copy the result. 3.14 Security Settings(Optional) 3.14.1 Security Status Scan the users, service, and security modules to check the security status of the Device. Background Information User and service detection: Check whether the current configuration conforms to ●...
Figure 3-77 Security Status Related Operations After you perform the scan, the results will be displayed in different colors. Yellow indicates that the security modules are abnormal, and green indicates that the security modules are normal. Click Details to view the details on the results of the scan. ●...
Figure 3-78 HTTPS Step 4 Click Apply. Enter “https://IP address: https port" in a web browser. If the certificate is installed, you can log in to the webpage successfully. If not, the webpage will display the certificate as wrong or untrusted. 3.14.3 Attack Defense 3.14.3.1 Configuring Firewall Configure firewall to limit access to the Device.
Page 145
Figure 3-80 Add IP information Step 5 Click OK. Related Operations Click to edit the IP information. ● Click to delete the IP address. ● 3.14.3.2 Configuring Account Lockout If the incorrect password is entered for a defined number of times, the account will be locked. Procedure >...
Page 146
Figure 3-81 Account lockout Login Attempt: The limit of login attempts. If the incorrect password is entered for a ● defined number of times, the account will be locked. Lock Time: The duration during which you cannot log in after the account is locked. ●...
Figure 3-82 Anti-DoS attack Click Apply. Step 3 3.14.4 Installing Device Certificate Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS on your computer. 3.14.4.1 Creating Certificate Create a certificate for the Device. Procedure Step 1 Select...
Page 148
Figure 3-83 Certificate information The name of region cannot exceed 2 characters. We recommend entering the abbreviation of the name of the region. Click Create and install certificate. Step 5 The newly installed certificate is displayed on the Device Certificate page after the certificate is successfully installed.
Page 149
Region: The name of region must not exceed 3 characters. We recommend you enter ● the abbreviation of region name. Figure 3-84 Certificate information (2) Step 5 Click Create and Download. Save the request file to your computer. Step 6 Apply to a third-party CA authority for the certificate by using the request file.
Step 2 Click Install Device Certificate. Step 3 Select Install Existing Certificate , and click Next. Step 4 Click Browse to select the certificate and private key file, and enter the private key password. Figure 3-85 Certificate and private key Click Import and Install.
Figure 3-86 Install the trusted certificate Click OK. Step 4 The newly installed certificate is displayed on the Trusted CA Certificates page after the certificate is successfully installed. Related Operations Click Enter Edit Mode on the Device Certificate page to edit the name of the certificate. ●...
Table 3-42 Data encryption description Parameter Description Streams are encrypted during transmission Enable through private protocol. Private Protocol Encryption Type Keep it as default. Update Period of Secret Ranges from 0 h -720 h. 0 means never update the secret key. RTSP stream is encrypted during transmission Enable through TLS tunnel.
4 Phone Operations 4.1 Initialization When the phone is on the same LAN as the Access Controller, you can initialize the Access Controller for the first time or after the Device is restored to the factory defaults on the webpage of the phone.
If you forget the administrator login password, you can reset the password through ● the webpage on the computer. For details, see "3.3 Resetting the Password". Figure 4-1 Login page Click Login. Step 3 4.3 Home Page The home page is displayed after you successfully log in. at the upper-right corner of the webpage.
Page 156
Figure 4-2 Admin page The Door Status area displays the status of the door. You can remotely open or close the door. ● You can also configure the door status as Always Open or Always Closed.
Page 157
Figure 4-3 Door status The Common Function area displays the configuration menu of the Device. Click More to view ● all the configuration menus. Figure 4-4 Common functions View the serial number and the version information on the Version area. Click > to view the ●...
Figure 4-5 Version 4.4 Person Management Add the person and configure the permissions. Procedure Step 1 Log in to the webpage. Click Person Management , and then click +. Step 2 Step 3 Configure user information. Figure 4-6 Add the person (1)
Page 159
Figure 4-7 Add the person (2) Table 4-1 Parameters description Parameter Description The User ID is like employee ID, which can be numbers, letters, and their combinations, and the maximum length of the number is 30 characters. The name can have up to 32 characters (including numbers, symbols, and Name letters).
Page 160
Parameter Description Enter the card number manually. ● 1. Click Add. 2. Enter the card number, and then click Add. Read the number automatically through the Device. ● 1. Click Add. 2. Swipe cards on the card reader. A 60-second countdown is displayed to remind you to swipe cards, and the system will read the card number automatically.
Parameter Description People can unlock the door or take attendance during the defined holiday. Holiday Plan You can select more than one holiday. Lock Permission Select the local and external lock as needed. General User : General users can unlock the door. ●...
Select More > System > Maintenance. Step 2 Set the time, and then click Apply. Step 3 The Device will restart at the scheduled time, or you can click Restart to restart it immediately. Figure 4-8 Maintenance 4.5.3 Configuring Time Procedure Step 1 Log in to the webpage.
Page 163
Figure 4-9 Configure the time parameters Table 4-2 Time settings description Parameter Description Manual Set: Manually enter the time or you can click Sync Phone ● to sync time with the phone. NTP: The Device will automatically sync the time with the NTP ●...
Click Apply. Step 4 4.5.4 Data Capacity You can see how many users, cards, face images, fingerprints, logs, unlock records, and other information that the Device can store. Log in to the webpage and select More > System > Data Capacity. 4.6 Configuring Attendance This function is only available on select models.
There are 20 default departments. We recommend you rename them. Figure 4-11 Rename the department Related Operations You can click to restore departments to default settings. 4.6.2 Configuring Shifts Configure shifts to define time attendance rules. Employees need to work at the time scheduled for their shift to start, and leave at the end time, except when they choose to work overtime.
Page 166
Figure 4-12 Shift list Click the shift to configure the shift parameters, and then click Save. Step 3...
Page 167
Figure 4-13 Configure the shift Table 4-3 Shift parameters description Parameter Description Shift Name Enter the name of the shift. Period 1 Specify a time range when people can clock in and clock out for the workday. If you only set one attendance period, employees need to clock in and out by the designated times to avoid an anomaly appearing on their attendance record.
Page 168
When the time interval between 2 periods is an even number, you can divide the time ● interval by 2, and assign the first half of the interval to the first period, which will be the clock out time. The second half of the interval should be assigned to the second period as the clock in time.
4.6.3 Configuring Holiday Configure holiday plans to set periods for attendance to not be tracked. Procedure Step 1 Log in to the webpage. Step 2 Select More > Attendance Config > Shift Config > Holiday. Click + to add holiday plans. Step 3 Configure the parameters, and then click Save.
Page 170
Figure 4-17 Configure work schedules Procedure Step 1 Log in to the webpage. Select More > Attendance Config > Schedule Config. Step 2 Step 3 Set work schedules for individuals. 1. Click Personal Schedule. 2. Select a person in the person list. After you configure the Schedule Mode as the Personal Schedule when you add the person, the person is displayed in the person list.
Figure 4-18 Department schedule 0 indicates rest. ● 1 to 24 indicates the number of the pre-defined shifts. ● 25 indicates business trip. ● 26 indicates leave of absence. ● The defined work schedule is in a week cycle and will be applied to all employees in the department.
Page 172
Figure 4-19 Attendance configuration Table 4-5 Description of attendance parameters Parameter Description The screen displays the attendance status automatically after you clock in or out, but you can also manually change your attendance status. Check In: Clock in when your normal workday starts. ●...
Parameter Description Manual Mode Manually select your attendance status when you clock in or out. When you clock in or out, the screen will display the pre-defined Fixed Mode attendance status all the time. Step 4 Click Apply. 4.7 Configuring Access Control 4.7.1 Configuring Unlock Methods You can use multiple unlock methods to unlock the door, such as fingerprint, card, and password.
Page 174
Click Face Parameters on the main menu, or select More > Access Control > Face Step 2 Parameters. Configure the parameters, and then click Apply. Step 3 Figure 4-21 Configure the face parameters (1)
Figure 4-22 Configure the face parameters (2) 4.7.3 Configuring Access Control Parameters Procedure Step 1 Log in to the webpage. Step 2 Click Access Control Parameters on the main menu, or select More > Access Control > Access Control Parameters. Step 3 Configure basic parameters for the access control, and then click Apply.
Page 176
Figure 4-23 Access control parameters (1)
Page 177
Figure 4-24 Access control parameters (2) Table 4-7 Description of access control parameters Parameter Description Name The name of the door. Set the door status. Normal: The door will be unlocked and locked ● according to your settings. Basic Settings Door Status Always Open: The door remains unlocked all the ●...
Page 178
Parameter Description Displays the notification on the screen when a person verifying their identity on the Device. High Speed Mode: The system prompts ● Successfully verified or Not authorized on the screen. Simple Mode: Displays user ID, name and ● verification time after access granted;...
Parameter Description Normally Open General Plan/ When you select Normal, you can select a time Period Holiday Plan template from the drop-down list. The door remains open or closed during the defined time. For details on how to configure general plans and holiday plans, see "3.6.8 Configuring Schedules".
Page 180
Step 4 Configure alarm parameters, and then click Apply. Figure 4-25 Alarm settings Table 4-8 Description of alarm parameters Parameter Description An alarm will be triggered when a duress card, duress Duress Alarm password or duress fingerprint is used to unlock the door.
Page 181
Parameter Description Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person to gain entry. When anti-passback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
4.7.5 Configuring Alarm Linkages (Optional) You can configure alarm linkages. Procedure Step 1 Log in to the webpage. Select More > Access Control > Alarm Linkage Setting. Step 2 Step 3 Select the zone to configure alarm. Figure 4-26 Alarm linkage Step 4 Create a name for the alarm zone.
This function takes effect only after Link Fire Safety Control is enabled. Step 7 Select a linkage mode. Strong Execution: When the fire alarm signal disappears, the door remains the current ● status. Please manually changes to its previous door status settings if you want to. Weak Execution: When the fire alarm signal disappears, the door automatically returns ●...
Table 4-9 Alarm event linkage Parameter Description If the door is opened abnormally, an intrusion alarm will be triggered. Buzzer: The buzzer sounds when an intrusion alarm is triggered. You ● can configure the alarm duration. Intrusion Alarm Linkage Link Alarm Output: The external alarm device generates alarms ●...
Page 185
Figure 4-28 Card settings (1) Figure 4-29 Card settings (2) Table 4-10 Card parameters description Item Parameter Description The IC card can be read when this function is enabled. IC Card This function is only available on select models. Card Settings Only the encrypted IC card can be read when this function is enabled.
Item Parameter Description Prevent unlocking through duplicated NFC card after this function is enabled. This function is only available on models ● Block NFC Cards that support IC cards. Make sure IC Card is enabled. ● NFC function is only available on select ●...
Face images will be captured automatically when people unlock the door. Figure 4-30 Enable snapshot Step 4 Click Apply. 4.8 Communication Settings 4.8.1 Configuring TCP/IP You need to configure IP address of Device to make sure that it can communicate with other devices.
Page 188
Figure 4-31 TCP/IP Table 4-11 Description of TCP/IP Parameter Description Static: Manually enter IP address, subnet mask, and gateway. ● DHCP: It stands for Dynamic Host Configuration Protocol. ● Mode When DHCP is turned on, the Device will automatically be assigned with IP address, subnet mask, and gateway.
Parameter Description Preferred DNS Set IP address of the preferred DNS server. Alternate DNS Set IP address of the alternate DNS server. MTU (Maximum Transmission Unit) refers to the maximum size of data that can be transmitted in a single network packet in computer networks.
Figure 4-32 Wi-Fi AP 4.8.4 Configuring Cloud Service Procedure Step 1 Log in to the webpage. Step 2 Select More > Communication Settings > Cloud Service. Step 3 Turn on the cloud service function. The cloud service goes online if the P2P and PaaS are online. Click Apply.
Figure 4-33 Auto registration Table 4-12 Automatic registration description Parameter Description Status Displays the connection status of auto registration. Server Address The IP address or the domain name of the server. Port The port of the server that is used for automatic registration. The registration ID (user defined) of the device.
Page 192
Figure 4-34 Wiegand input Select Wiegand Output when the Device functions as a card reader, and you need to ● connect it to another access controller. Figure 4-35 Wiegand output Table 4-13 Description of Wiegand output Parameter Description Select a Wiegand format to read card numbers or ID numbers. Wiegand26 : Reads 3 bytes or 6 digits.
Parameter Description Select the type of output data. No. : Outputs data based on user ID. The data format is Output Data Type hexadecimal or decimal. Card Number : Outputs data based on user's first card number. 4.8.7 Configuring RS-485 Configure the RS-485 parameters if you connect an external device to the RS-485 port.
Table 4-14 Configure the RS-485 parameters Parameter Description Access Controller ● Select Access Controller when the Device functions as a card reader, and sends data to other external access controllers to control access. Output Data type: Card Number: Outputs data based on card number when users swipe card to unlock door;...
Figure 4-37 Configure the audio parameters Table 4-15 Parameters description Parameters Description Speaker Set the volume of the speaker. Microphone Volume Set the volume of the microphone. When this function is enabled, touch screen devices will produce Screen Tap Sound tap sound and non-touch screen devices will produce mouse click sound.
Figure 4-38 Logs 4.10.2 Unlock Records Search for unlock records. Procedure Step 1 Log in to the webpage. Select More > Log > Unlock Records. Step 2 Step 3 Click a record to view the details. 4.10.3 Alarm Logs View alarm logs. Procedure Step 1 Log in to the webpage.
5 Smart PSS Lite Configuration This section introduces how to manage and configure the device through Smart PSS Lite. For details, see the user's manual of Smart PSS Lite. 5.1 Installing and Logging In Install and log in to Smart PSS Lite. For details, see the user manual of Smart PSS Lite. Procedure Step 1 Get the software package of the Smart PSS Lite from the technical support, and then...
Figure 5-1 Add devices Table 5-1 Parameters of IP adding Parameter Description We recommend you name devices with the monitoring area for easy Device Name identification. Select IP/Domain. Method to add IP/Domain: Enter the IP address or domain name of the device. ●...
Page 199
Procedure On the Device Manager page, click Auto Search. Step 1 Step 2 Select a search method. Auto Search: Enter the username and the password of the device. The system will ● automatically search for devices that are on the same network to your computer. Device Segment Search: Enter the username and the password of the device, and then ●...
5.3 User Management Add users, assign cards to them, and configure their access permissions. 5.3.1 Configuring Card Type Set the card type before you assign cards to users. For example, if the assigned card is an ID card, set card type to ID card. Procedure Step 1 Log in to Smart PSS Lite.
Page 201
Only 8-digit card number in hexadecimal mode can display the QR code of the card. Configure the fingerprints. ● to select Device or Fingerprint Scanner as the fingerprint collector. a. Click b. Add fingerprints. Select Add > Add Fingerprint, and then place one of your fingers on the scanner for 3 times continuously.
Page 202
Click the More Info tab to add more information of the personnel. Step 3 Figure 5-5 Add more information Step 4 Click Complete. Related Operations Click to modify information or add more details in the list of personnel. ● Click to delete all information of the personnel.
Click OK. Step 7 Figure 5-6 Add personnel in batches 5.3.3 Assigning Access Permission Create a permission group that is a collection of door access permissions, and then link users with the group so that users can unlock doors associated with the permission group. Procedure Step 1 Click Access Solution >...
Page 204
Figure 5-7 Create a permission group Step 6 Click of the permission group. Step 7 Select users to associate them with the permission group. Figure 5-8 Add users to a permission group Step 8 Click OK. Users can unlock the door in this permission group after valid identity verification.
5.3.4 Assigning Attendance Permissions Create a permission group that is a collection of time attendance permissions, and then associate employees with the group so that they can punch in/out through defined verification methods. Procedure Step 1 Log in to the Smart PSS Lite. Click Access Solution >...
Page 206
Figure 5-9 Create a permission group The Time & Attendance supports punch-in/out through password, face attendance, ● card and fingerprint attendance. Card and fingerprint attendance are available on select models. ● Step 7 Click of the permission group you added. Step 8 Select users to associate them with the permission group.
Figure 5-10 Add users to a permission group Step 9 Click OK. 5.4 Access Management 5.4.1 Remotely Opening and Closing Door You can remotely monitor and control door through the platform. For example, you can remotely open or close the door. Procedure Step 1 Click Access Solution >...
Related Operations Event filtering: Select the event type in the Event Info, and the event list displays the selected ● event type, such as alarm events and abnormal events. Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click ●...
Page 209
Figure 5-13 Monitor door status Related Operations Show All Door: Displays all doors controlled by the Device. ● Reboot: Restart the Device. ● Details: View the device details, such as IP address, model, and status. ●...
Appendix 1 Important Points of Face Registration Before Registration Glasses, hats, and beards might influence face recognition performance. ● Do not cover your eyebrows when wearing hats. ● Do not change your beard style greatly if you use the Device; otherwise face recognition might ●...
Page 211
Appendix Figure 1-1 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. ● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image ● recording.
Page 212
Appendix Figure 1-3 Face distance When importing face images through the management platform, make sure that image ● resolution is within the range from 150 × 300 pixels to 600 × 1200 pixels. It is recommended that the resolution be greater than 500 × 500 pixels, the image size be less than 100 KB, and the image name and person ID be the same.
Appendix 2 Important Points of Intercom Operation The Device can function as VTO to realize intercom function. Prerequisites The intercom function is configured on the Device. Procedure Step 1 On the standby screen, tap Step 2 Enter the room No., and then tap...
Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points: Make sure that your fingers and the scanner surface are clean and dry. ● Press your finger on the center of the fingerprint scanner. ●...
Page 215
How to Press Your Fingerprint on the Scanner Appendix Figure 3-2 Correct placement Appendix Figure 3-3 Wrong placement...
Appendix 4 Important Points of QR Code Scanning Place the QR code on your phone at a distance of 30 mm–50 mm away from the QR code scanning lens. It supports QR code that is larger than 30 mm × 30 mm and less than 128 bytes in size. QR code detection distance differs depending on the bytes and size of QR code.
Appendix 5 Security Recommendation Account Management 1. Use complex passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters; ● Include at least two types of characters: upper and lower case letters, numbers and symbols; ●...
Page 218
Network Configuration 1. Enable Allowlist It is recommended that you turn on the allowlist function, and only allow IP in the allowlist to access the device. Therefore, please be sure to add your computer IP address and supporting device IP address to the allowlist. 2.
Page 219
and key management in place to prevent unauthorized personnel from damaging hardware and other peripheral equipment (e.g. USB flash disk, serial port).
Need help?
Do you have a question about the ASI6213S-PW and is the answer not in the manual?
Questions and answers