Advertisement

Quick Links

MANUAL
AIFACE
ORCUS
www.esslsecurity.com | sales@esslsecurity.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AIFACE ORCUS and is the answer not in the manual?

Questions and answers

Summary of Contents for eSSL AIFACE ORCUS

  • Page 1 MANUAL AIFACE ORCUS www.esslsecurity.com | sales@esslsecurity.com...
  • Page 2: Table Of Contents

    Table of Contents INSTRUCTION FOR USE ................................4 Standing Position, Posture and Facial Expression ........................4 Face Template Registration ................................ 5 Finger Positioning ..................................5 Standby Interface ..................................6 Verification Mode ..................................8 1.5.1 Facial Verification ................................8 1.5.2 Fingerprint Verification ..............................9 1.5.3 Card Verification ................................
  • Page 3 COMMUNICATION ................................27 Ethernet ....................................27 PC Connection ..................................28 Wi-Fi Settings ..................................29 Cloud Server Settings ................................31 Network Diagnosis ................................... 32 SYSTEM SETTINGS ................................32 Date and Time ..................................33 Access Logs Settings / Attendance............................34 Face Parameters ..................................37 Fingerprint ....................................
  • Page 4: Instruction For Use

    Instruction for Use Before getting into the device features and functions, it is recommended to be familiar with the below fundamentals. Standing Position, Posture and Facial Expression The recommended distance  The distance between the device and a user whose height is in a range of 1.55m to 1.85m is recommended to be 0.3 to 2m.
  • Page 5: Face Template Registration

    Face Template Registration Try to keep the face in the centre of the screen during registration. Please face towards the camera and stay still during face template registration. The screen should look like this: Correct face registration and authentication method Recommendation for registering a face ...
  • Page 6: Standby Interface

    Too close to the edge Too low Vertical Note: Please use the correct method when pressing your fingers onto the fingerprint reader for registration and identification. Our company will assume no liability for recognition issues that may result from incorrect usage of the product. We reserve the right of final interpretation and modification concerning this point.
  • Page 7  After adding a Super Administrator on the device, it requires the Super Administrator’s verification before opening the menu functions. Note: For the security of the device, it is recommended to register a super administrator the first time you use the device. ...
  • Page 8: Verification Mode

    Verification Mode 1.5.1 Facial Verification 1: N Facial Verification In this verification mode, the device compares the collected facial images with all face data registered in the device. The following is the pop-up prompt of a successful comparison result. 1:1 Facial Verification In this verification mode, the device compares the face captured by the camera with the facial template related to the entered user ID.
  • Page 9: Fingerprint Verification

    After successful verification, the prompt box displays "Successfully verified", as shown below: 1.5.2 Fingerprint Verification  1: N Fingerprint Verification Mode The device compares the current fingerprint with the available fingerprint data stored in its database. Fingerprint authentication mode is activated when a user places their finger onto the fingerprint scanner. Please follow the recommended way to place your finger onto the sensor.
  • Page 10 The device compares the current fingerprint with the fingerprints linked to the entered User ID through the virtual keyboard. In case users are unable to gain access using the 1:N authentication method, they can attempt to verify their identity using the 1:1 verification mode. Enter the user ID and press M/OK to enter the 1:1 fingerprint verification mode.
  • Page 11: Card Verification

    1.5.3 Card Verification  1: N Card Verification Mode The 1: N Card Verification Mode compares the card number in the card induction area with all the card number data registered in the device. The following screen displays on the card verification screen. ...
  • Page 12: Password Verification

    1.5.4 Password Verification The device compares the entered password with the registered password and User ID. Enter the user ID and press M/OK to enter the 1:1 password verification mode. Then, input the user ID and press M/OK. If an employee registers a fingerprint, face and card in addition to the password, the following screen will appear.
  • Page 13: Combined Verification

    1.5.5 Combined Verification This device allows you to use different types of verification methods to increase security. There are a total of 21 different verification combinations that can be implemented, as listed below: Combined Verification Symbol Definition Symbol Definition Explanation This method compares the entered verification of a person with the related verification template previously stored to that Personnel ID in the Device.
  • Page 14: Overview

    Overview Appearance Description Microphone Flash Camera Near-infrared Flash 2.4-inch Color Screen Keypad Doorbell Button Fingerprint Sensor Card Reading Area Reset...
  • Page 15: Terminal And Wiring Description

    Speaker Tamper Switch Terminal and Wiring Description 2.2.1 Terminal Description Interface Description Lock Door Sensor & Exit Button 12V Power in Network Interface Wiring Description 2.3.1 Power Connection...
  • Page 16: Lock Relay Connection

    Recommended power supply Rating of 12V and 1.5A.  To share the device’s power with other devices, use a power supply with higher current ratings.  2.3.2 Door Sensor & Exit Button Connection 2.3.3 Lock Relay Connection The system supports both Normally Opened Lock and Normally Closed Lock. The NO Lock (normally opened when powered) is connected with ‘NO1’...
  • Page 17: Ethernet Connection

    2.3.4 Ethernet Connection Connect the device to the computer software using an Ethernet cable. An example is shown below: Enter [COMM.] > [Ethernet] to set the relevant parameters of network. Note: In a LAN, the IP addresses of the server (PC) and the device must be in the same network segment when connecting to the software.
  • Page 18: Installation

    Installation Installation Environment Please refer to the following recommendations for installation. Device Installation Stick the mounting template sticker to the wall and drill holes according to the mounting template sticker. Fix the back plate on the wall using wall mounting screws. Attach the device to the back plate.
  • Page 19: Main Menu

    4 Main Menu Press M/OK on the initial interface to enter the main menu, as shown below: Function Description Menu Description User Mgt. To Add, Edit, View, and Delete information of a User. User Role To set the permission scope of the custom role and enroller for the users, for example the system's operating rights.
  • Page 20: User Management

    5 User Management New User Registration When the device is on the initial interface, press M/OK and enter [User Mgt.] > [New User]. 5.1.1 Register a User ID and Name Enter the User ID and Name. Note: 1. A name can be taken up to 36 characters long. 2.
  • Page 21: User Role

    5.1.2 User Role On the New User interface, select User Role to set the user’s role as either Normal User or Super Admin.  Super Admin: The Super Administrator owns all management privileges in the Device.  Normal User: If the Super Admin is registered already in the device, then the Normal Users will not have the privilege to manage the system and can only access authentic verifications.
  • Page 22: Card

     A progress bar shows up while registering the face and then "Enrolled Successfully" message is displayed as the progress bar completes.  If the face is registered already then, the "Duplicated Face" message shows up. The registration interface is as follows: 5.1.5 Card Select Card in the New User interface to enter the card registration page.
  • Page 23: Profile Photo

    5.1.7 Profile Photo Select Profile Photo in the New User interface to go to the Profile Photo registration page. Tap Profile Photo, the device’s camera will open, then press M/OK to take a photo. The captured  photo is displayed on the top left corner of the screen. Note: While registering a face template, the system automatically captures a photo as the user profile photo.
  • Page 24: All Users

    All Users When the device is on the initial interface, press M/OK and enter [User Mgt.] >[ All Users].  On the All Users interface, tap on the search bar on the user’s list to enter the required retrieval keyword (where the keyword may be the user ID, surname, or full name) and the system will search for the related user information.
  • Page 25: Delete User

    5.2.2 Delete User On the All Users interface, tap on the required user from the list and tap Delete to delete the user or specific user information from the device. On the Delete interface, tap on the required operation, and then press M/OK to confirm the deletion.
  • Page 26: User Role

    All the Display Styles are shown as below: Multiple Line: Mixed Line: 6 User Role User Role allows you to assign specific permissions to certain users based on their requirements.  When the device is on the initial interface, press M/OK and enter [User Role] > [User Defined Role] to set the user defined permissions.
  • Page 27: Communication

     Then, by selecting on Define User Role, select the required privileges for the new role, and then press the M/OK key.  First tap on the required Main Menu function name, then press M/OK and select its required sub- menus from the list.
  • Page 28: Pc Connection

    Function Description: Function Name Description Toggle to set whether to display the network icon on the status bar. Display in Status Bar The default IP address is 192.168.1.201. It can be modified according to the IP Address network availability. The default Subnet Mask is 255.255.255.0. It can be modified according to the Subnet Mask network availability.
  • Page 29: Wi-Fi Settings

    It is the identification number of the device, which ranges between 1 and 254. Device ID The factory default value is 4370. Please set the value as per the requirements. TCP COMM. Port HTTPS To increase the security of software access, users can enable the HTTPS protocol to create a secure and encrypted network transmission and assure the security of sent data through identity authentication and encrypted communication.
  • Page 30 WIFI Enabled: Tap on the required Tap on the password field to enter the network from the searched network list. password and press M/OK.  When the Wi-Fi is connected successfully, the initial interface will display the Wi-Fi logo.  Adding Wi-Fi Network Manually The Wi-Fi can also be added manually if the required Wi-Fi does not show on the list.
  • Page 31: Cloud Server Settings

    Function Description Function Name Description Dynamic Host Configuration Protocol (DHCP) dynamically allocates IP address DHCP to network clients. If the DHCP is enabled, then the IP cannot be set manually. IP Address The IP address for the Wi-Fi network, the default is 0.0.0.0. It can be modified according to the network availability.
  • Page 32: Network Diagnosis

    Network Diagnosis It helps to set the network diagnosis parameters. Select Network Diagnosis on the COMM. Settings interface. Enter the IP address that needs to be diagnosed and tap Start the Diagnostic Test to check whether the network can connect to the device. 8 System Settings It helps to set related system parameters to optimize the accessibility of the device.
  • Page 33: Date And Time

    Date and Time Select Date Time on the System interface to set the date and time.  Tap NTP Server to enable automatic time synchronization based on the service address you enter.  Tap Manual Date and Time to manually set the date and time and then tap Confirm and save. ...
  • Page 34: Access Logs Settings / Attendance

    Access Logs Settings / Attendance Select Access Logs Settings / Attendance on the System interface. Access Control Terminal: Time Attendance Terminal: Function Description of Access Control Terminal: Function Name Description Camera Mode This function is disabled by default. When enabled, a security prompt will pop-up and the sound of shutter in the camera will turn on mandatorily.
  • Page 35 Save on failed verification: Photo is taken and saved only for each failed verification. Display User Photo Whether to display the user photo when the user passes the verification. Alphanumeric User ID Enable/Disable the alphanumeric as User ID. Access Log Alert When the record space of the attendance access reaches the maximum threshold value, the device automatically displays the memory space warning.
  • Page 36 mandatorily. There are 5 modes: No photo: No photo is taken during user verification. Take photo, no save: Photo is taken but not saved during verification. Take photo and save: All the photos taken during verification is saved. Save on successful verification: Photo is taken and saved for each successful verification.
  • Page 37: Face Parameters

    continuous identifying, 1 to 9 means identifying at intervals. Face Parameters Select Face on the System interface to go to the face template parameter settings. Function Description Function Name Description 1:N Threshold Value Under 1:N verification mode, the verification will only be successful when the similarity between the acquired facial image and all registered facial templates is greater than the set value.
  • Page 38: Fingerprint

    the user has already registered before. When the similarity between the acquired facial image and all registered facial templates is greater than the set threshold, it indicates that the face has already been registered. Image Quality It is the image quality for facial registration and comparison. The higher the value, the clearer image is required.
  • Page 39: Device Type Settings

    Function Description Function Name Description 1:1 Threshold Under 1:1 verification method, the verification will only be successful when the similarity between the acquired fingerprint data and the fingerprint template associated with the entered user ID enrolled in the device is greater than the set value. 1:N Threshold Under 1:N verification method, the verification will only be successful when the similarity between the acquired fingerprint data and the...
  • Page 40: Security Settings

    Function Description Function Name Description Communication Protocol Set the device communication protocol. Device Type Set the device as an access control terminal or attendance terminal. Note: After changing the device type, the device will delete all the data and restart, and some functions will be adjusted accordingly.
  • Page 41: Usb Upgrade

    interface. Save Photo as Template After disable this function, face re-registration is required after an algorithm upgrade. USB Upgrade The device's firmware program can be upgraded with the upgrade file in a USB drive. Before conducting this operation, please ensure that the USB drive contains the correct upgrade file and is properly inserted into the device.
  • Page 42: Factory Reset

    The Firmware Update Online function is enabled by default. Tap Check for Updates it may have the following 3 scenarios:  If the query fails, the interface will prompt "Query failed".  If the firmware version of the device is latest, it will prompt that the current firmware version is already the latest.
  • Page 43: User Interface

    User Interface Select User Interface on the Personalize interface to customize the display style of the main interface. Function Description Function Name Description Wallpaper It helps to select the main screen wallpaper according to the user preference. Language It helps to select the language of the device. Menu Timeout (s) When there is no operation, and the time exceeds the set value, the device automatically goes back to the initial interface.
  • Page 44: Bell Schedules

    Function Description Function Name Description Voice Prompt Toggle to enable or disable the voice prompts during function operations. Keyboard Prompt Toggle to enable or disable the keypad sounds. Volume Adjust the volume of the device which can be set between 0 to 100. Bell Schedules Select Bell Schedules on the Personalize interface to configure the Bell settings.
  • Page 45: Punch States Options

    Function Name Description Bell Status Toggle to enable or disable the bell status. Bell Time Once the required time is set, the device automatically triggers to ring the bell during that time. Repeat Set the required number of counts to repeat the scheduled bell. Ring Tone Select a ringtone.
  • Page 46: Shortcut Key Mappings

    Manual Mode: Switch the punch state key manually, and the punch state key will disappear after Punch State Timeout. Auto Mode: The punch state key will automatically switch to a specific punch status according to the predefined time schedule which can be set in the Shortcut Key Mappings.
  • Page 47 the shortcut key either as punch state key or function key. If the Shortcut key is defined as a function key (such as New user, All users, etc.), the configuration is  completed as shown in the image below. If the Shortcut key is set as a punch state key (such as check in, check out, etc.), then it is required to ...
  • Page 48: Data Management

    Note: When the function is set to Undefined, the device will not enable the punch state key. 10 Data Management When the device is on the initial interface, press M/OK and select Data Mgt. to manage the relevant data in the device. Select Delete Data on the Data Mgt.
  • Page 49: Access Control

    Delete User Photo Templates To delete user photo templates in the device. When deleting template photos, there is a risk reminder: “Face re-registration is required after an algorithm upgrade.” Delete Profile Photo To delete all the profile photos on the device. Delete Wallpaper To delete all the wallpapers in the device.
  • Page 50: Access Control Options

    To get access, the registered user must meet the following conditions: The relevant door’s current unlock time should be within any valid time zone of the user’s time period. The corresponding user’s group must be already set in the door unlock combination (and if there are other groups, being set in the same access combo, then the verification of those group’s members is also required to unlock the door).
  • Page 51 Function Description of Access Control Terminal: Function Name Description It toggles between ON or OFF switch to get into gate control mode Gate Control Mode or not. When set to ON, the interface removes the Door Lock Delay, Door Sensor Delay, and Door Sensor Type options. Door Lock Delay (s) The length of time that the device controls the electric lock to be in unlock state.
  • Page 52: Time Rule Settings

    Reset Access Setting The access control reset parameters include door lock delay, door sensor delay, door sensor type, verification mode, door available time period, normal open time period, and alarm. However, erased access control data in Data Mgt. is excluded. Function Description of Time Attendance Terminal: Function Name Description...
  • Page 53: Holidays

    according to the 24-hour clock. Tap the grey box to search the required Time Rule and specify the required Time Rule number (maximum up to 50 rules). On the selected Time Rule number interface, tap on the required day (that is Monday, Tuesday, etc.) to set the time.
  • Page 54: Combined Verification

     Add a New Holiday: Tap Add Holiday on the Holidays interface and set the holiday parameters.  Edit a Holiday: On the Holidays interface, select a holiday item to be modified. Tap Edit to modify holiday parameters.  Delete a Holiday: On the Holidays interface, select a holiday item to be deleted and tap Delete.
  • Page 55: Duress Options Settings

    On the combined verification interface, tap the Door-unlock combination to be set, and press the up and down keys to input the combination number, and then press M/OK. For Example: If the Door-unlock combination 1 is set as (01 03 05 06 08). It indicates that the unlock combination ...
  • Page 56: Usb Manager

    Function Description: Function Name Description Alarm on Password When a user uses the password verification method, an alarm signal will be generated, otherwise there will be no alarm signal. Alarm on 1:1 Match When a user uses the 1:1 verification method, an alarm signal will be generated, otherwise there will be no alarm signal.
  • Page 57: Usb Upload

    Menu Description Download Access Records To download access record in specified time period into USB disk. User Data To download all user information from the device into USB disk. User Portrait To download all user portraits from the device into a USB disk. Attendance Photo To download all attendance photos from the device into USB disk.
  • Page 58: Attendance Search

    Wallpaper To upload all wallpapers from USB disk into the device. You can choose Upload selected photo or Upload all photos. The images will be displayed on the screen after upload. User Data To upload all the user information from USB disk into the device. User Portrait To upload all user portraits from USB disk into the device.
  • Page 59: Autotest

    The figure shows the details of the Once the record search completes. selected record. Tap the record highlighted in green to view its details. 14 Autotest When the device is on the initial interface, press M/OK and select Autotest, it enables the system to automatically test whether the functions of various modules are working normally, including the LCD, Voice, Microphone, Keyboard, Fingerprint, Camera and Real-Time Clock (RTC).
  • Page 60: System Information

    complete and the voice quality is good. Microphone test To test if the microphone is working properly by speaking into the microphone. Test Keyboard The terminal tests whether every key on the keyboard works normally. Press any key on the Test Keyboard interface to check whether the pressed key matches the key displayed on the screen.
  • Page 61: Appendix

    device. Privacy Policy Display the device's privacy policy. Appendix Requirements of Live Collection and Registration of Visible Light Face Templates It is recommended to perform registration in an indoor environment with an appropriate light source without underexposure or overexposure. Do not place the device towards outdoor light sources like door or window or other harsh light sources.
  • Page 62: Requirements For Visible Light Digital Face Template Data

    Requirements for Visible Light Digital Face Template Data The digital photo should be straight-edged, colored, half-portrayed with only one person, and the person should be uncharted and in casuals. Persons who wear eyeglasses should remain to put on eyeglasses for getting photo captured.
  • Page 63 24bit true color mode. JPG format compressed template with not more than 20kb size. Resolution should be between 358 x 441 to 1080 x 1920. The vertical scale of head and body should be in a ratio of 2:1. The photo should include the captured person’s shoulders at the same horizontal level. The captured person’s eyes should be open and with clearly seen iris.

Table of Contents