Honeywell VISTA Series, CA-FP-100F, CA-FP-100FS, CA-FP-100FID, CA-FP-100FIC Manual

Honeywell VISTA Series, CA-FP-100F, CA-FP-100FS, CA-FP-100FID, CA-FP-100FIC Manual

Also See for VISTA Series:

Advertisement

Honeywell VISTA Series, CA-FP-100F, CA-FP-100FS, CA-FP-100FID, CA-FP-100FIC Manual

Instruction for Use

Protect the FRT from exposure to direct sunlight or strong beam as strong beam greatly affects the fingerprint collection and leads to fingerprint verification failure.

Avoid using the FRT outdoors in summer. The working temperature of CA FP 100Fxx series ranges from 0–40 C. The heat dissipated during long term operation may easily lead to response slowdown and verification pass rate decrease. It is recommended to use sunshades and heat sink devices for protection of the FRTs outdoors. We recommend you to use the FRT properly so as to achieve the optimal recognition effect and verification speed.

  1. Install a CA FP 100Fxx FRT and then enroll your fingerprint for comparison
  2. Recommended fingers
    Recommended fingers: The index finger, middle finger or the ring finger; the thumb and little finger are not recommended (because they are usually clumsy on the fingerprint collection screen).
  3. Finger Placement
    1. Proper finger placement:

      The finger is flat to the surface and centered in fingered guide.
    2. Improper finger placement:

information Note:
Please enroll and verify your fingerprint by using the proper finger placement mode to avoid degradation of verification performance due to improper operations. We reserve all rights for the final interpretation and modification of these rules.

  1. LED Colors and Their Meanings
    CA FP 100Fxx FRT works normally: The green LED blinks once every other second.
    Verification fails: The red LED is solid on for 3 seconds.
    Verification succeeds: The green LED is solid on for 3 seconds.

information Note:
If the LED display is inconsistent with the above conditions, please contact our technical personnel.

  1. About This Manual
  • Our products are subject to update from time to time, so our company will neither make a commitment to guarantee the consistency between the actual products and this document, nor assume any responsibility for any dispute arising out of the discrepancy between the actual technical parameters and this manual. This document is subject to change without prior notice.
  • The functions marked withŒ in this manual are optional for some CA FP 100Fxx series FRTs. Please refer to the actual product for the specific function description.
  • Picture descriptions in this manual may vary slightly from actual product.Please refer to the actual product for exact descriptions.
  • FRT and FRTs in this manual that means fingerprint terminal. (or fingerprint device / machine)

Basic Concepts

This section introduces the definitions and descriptions of the following basic concepts:

  • User enrollment
  • User verification
  • Match threshold
  • User ID
  • Authority class

The most important two functions supported by CA FP 100Fxx series are user enrollment and verification.

User Enrollment
A user can enroll up to 10 different fingerprints using one ID number to have multiple verification selections. Theoretically all the fingers of a user need to be enrolled so that the user can still perform fingerprint matching even if one or more of his/her fingers get cut or damaged. Generally it is recommended that a user shall enroll at least two fingerprints, for example, the index fingers of both hands, so that the user can use any of the enrolled fingerprints for recognition even if he/she forgets which fingerprint has been enrolled.

User Verification
When a user enters a password after placing his/her finger on the fingerprint reader, or scans his/her fingerprint after entering an ID number, the CA FP 100Fxx FRT compares the newly scanned fingerprint with a fingerprint stored in template. The fingerprint template is used to check the user ID. If a user enrolls his/her fingerprints on an FRT, the user can keep attendance records on this FRT through fingerprint verification which takes about 2 seconds. Upon verification, the system displays a prompt about whether the verification succeeds or not and then stores the successful matching record in the CA FP 100Fxx FRT.

Match Threshold
The match threshold is set to achieve a trade off between the possibilities of false rejection and false acceptance. The false acceptance means the fingerprint recognition device mistakes the fingerprint of user A for that of user B, while the false rejection means the fingerprint recognition device refuses to recognize an enrolled fingerprint.

You can set a match threshold for all users. For fingerprints that fail to pass the verification, you can adopt the "ID + Fingerprint" verification mode (that is, 1:1 match) so that the system adopts the data set in 1:1 match threshold when matching the fingerprints.

If a user's fingers are severely worn out or damaged, lower the match threshold (see Table 3 1).

information Note: The false acceptance rate (FAR) and false rejection rate (FRR) mutually influence each other. Reducing the FAR will increase the FRR, and vice versa. The default match threshold is 35 and the default 1:1 match threshold is 15. Table 3 1 lists the settings of match thresholds in different scenarios.

Match Threshold

FRR FAR Match threshold
1:N 1:1
High Low 45 25
Medium Medium 35 15
Low High 25 10

User ID
When enrolling fingerprints, a user will be allocated with an unused ID. When the user starts to verify his/her identity, this ID is used to associate the fingerprint feature template or password.

You can enter the ID through the mini keyboard or other storage means, for example, the RF card (the fingerprint recognition device must be configured with the RF card reader).

Authority Classes
The CA FP 100Fxx series FRTs include four authority classes:

  • Users: refer to those who are required to verify their identity for a purpose, for example, opening the door through the CA FP 100Fxx FRT or keeping their entry/exit records.
  • Registrars: refer to the users who are granted the right to enroll or delete users.
  • Administrators: refer to the users who are granted the right to perform all operations except performing advanced settings and enrolling administrators and super administrators.
  • Super administrators: refer to users who have access to all system functions and modify all system settings.

information Note: When the super administrators are not enrolled, the registrars can enroll the administrators and super administrators. Similarly, the administrators can enroll super administrators in the absence of super administrators. Once super administrators are enrolled, administrators of lower class cannot enroll those of higher class.

Main Interface
The first interface displayed on the screen upon equipment power -on is referred to as the "Initial Interface", as shown in the following figure.

Enrollment and Verification

This chapter introduces how to enroll users on the CA FP 100Fxx series. Further, it describes how to verify the validity of enrolled fingerprints.

This chapter includes the following parts:

  • Enroll users
  • Check enrollment effects
  • Enroll spare fingerprints
  • Verify identity
  • Prompts for successful enrollment

information Note:
To enroll a new user, you must have the authority of a registrar, administrator or super administrator. For details, see Authority Classes.

Enroll a User
If no administrator has been enrolled, any user has the right to enroll a new user. If an administrator has already been enrolled, you can only enroll a new user after passing the administrator verification.

The RFT supports the following three enrollment modes that respectively apply to the general public with three different types of fingerprint quality:

  • Fingerprint enrollment: This enrollment mode applies to the majority of the general public with good quality fingerprints.
  • Fingerprint + Password enrollment: This enrollment mode applies to a small portion of the general public who can enroll their fingerprints successfully but have difficulty in fingerprint verification due to their poor fingerprint quality.
  • Password enrollment: This enrollment mode applies to about one percent (the actual number may vary slightly) of the general public who are unable to enroll their fingerprints successfully.

If an administrator has already been enrolled, you need to verify the administrator identity by pressing MENU.

The system then prompts you to swipe your finger or enter a password for administrator verification.

information Note: If no administrator has been enrolled, administrator verification is not required.

Enroll a Fingerprint

  1. Select Menu → Mange User →Enroll User to display the [Enroll User] interface. Select [Enroll FP] and press OK to display the [Enroll FP] interface.
  2. Input a number (from 1–65534) in the [User ID] field. Press OK for 3 seconds to display the fingerprint enrollment interface.
  3. Place the same finger for three consecutive times on the fingerprint reader according to system prompts. If the enrollment succeeds, the following information is displayed:
  4. Press OK to save the enrolled fingerprint. If the enrollment fails, the system will prompt you to re enter your user ID and restart the enrollment from Step 2.

information Notes:

①The FTP displays 5 digit numbers, and automatically adds 0 as prefix to the numbers less than 5 digits. For example, if you input "11", the FRT will display "00011".

②Enrollment number could only be input in order before, but now for technology updating, you can freely enter the number with maximum to 65534.

③For non numeric key models, you can use the "▲" or "▼" key and the "OK" button to input the enrollment number. perations: on the fingerprint enrollment interface → press "▲" or "▼" key to select the digit you want to enter, such as the "hundreds place" → press "OK" button press "▲" or "▼" key to select the number you want to enter →press "OK" button, then move to the "ten place", as the operation above → press "OK" button for 3 seconds to confirm the enrollment.

Enroll a Password

  1. SelectMenu →Mange User →Enroll User to display the [Enroll User] interface. Select [Enroll Pwd] and press OK to display the [Enroll Pwd] interface.
  2. Press OK to confirm and proceed.
  3. Input a number (from 1–2147483646) in the [User ID] field. Press OK to display the password input interface.
  4. Input your password in the [Input Pwd] field and press OK to proceed.
  5. Re enter your password in the [Pwd Affirm] field and press OK to confirm your entry and proceed.
  6. Press OK to save the enrolled data and exit the password enrollment.

Enroll Both Fingerprint and Password

  1. Select Menu →Mange User →Enroll User to display the [Enroll User] interface. Select [FP&Pwd] and press OK to proceed.
  2. Press OK to confirm and proceed.
  3. Input a number (from 1–65534) in the [User ID] field. Press OK to display the fingerprint enrollment interface.
  4. Place the same finger for three consecutive times on the fingerprint reader according to system prompts. If the enrollment succeeds, the following information is displayed:
  5. Input your password in the [Input Pwd] field and press OK to proceed.
  6. Re enter your password in the [Pwd Affirm] field and press OK to confirm your entry and proceed.
  7. Press OK to save the enrolled data and complete the fingerprint and password enrollment.

Enroll an ID CardŒ

  1. Selec tMenu →Mange User →Enroll User to display the [Enroll User] interface. Select [Reg RFID] and press OK to proceed.
  2. Press OK to confirm and proceed.
  3. Input a number (from 1–65534) in the [User ID] field. Press OK to display the ID card enrollment interface.
  4. Swipe your card and the system reads your card number.
  5. Press OK to confirm and proceed.
  6. Press OK to save the enrolled data and complete the ID card enrollment.

information Note:
The ID card verification is an optional function. To customize an ID card capable FRT, please consult our commercial representatives or pre sale technical support engineers.

Check Enrollment Effect
After enrolling a fingerprint, you need to verify its validity by placing your corresponding finger properly on the initial interface of the FRT. If the FRT recognizes your fingerprint successfully, it proves that your fingerprint is clear and recognizable; otherwise, you need to re enroll your fingerprint or change another finger for enrollment. If it still does not work, it proves that your fingerprints are not suitable for recognition and you need to adopt the fingerprint and password verification mode.

Verification Modes
Fingerprint Verification
You can adopt 1:1 and 1:N matching modes for fingerprint identification.

  1. 1:1 fingerprint matching (ID + fingerprint)

In the 1:1 fingerprint matching mode, the FRT compares the current fingerprint collected through the fingerprint reader with that in relation to the user ID entered through keyboard.

Operation steps: Enter a user ID through keyboard on the initial interface.

information Note: The FRT displays 5 digit numbers, and automatically adds 0 as prefix to the numbers less than 5 digits. For example, if you input "11", the FRT will display "00011".

Press OK and then place your finger on the fingerprint reader, or directly place your finger on the fingerprint reader to display the following interface:

If the verification succeeds, following interface will be displayed:

If the verification fails, the system will display the following interface:

After the above interface is displayed 0.5 seconds, the system will return to the initial interface.

  1. 1:N fingerprint verification

In the 1:N fingerprint matching mode, the FRT compares the current fingerprint collected through the fingerprint reader with all the fingerprints stored in the FRT.

Operation steps:
Place your finger on the initial interface to display the following interface:

If the verification succeeds, the interface will be displayed:

If the verification fails, the system will display the following interface:

After the above interface is displayed 0.5 seconds, the system will return to the initial interface.

Password Verification
Input your ID on the initial interface.

Press OK and the following interface is displayed.

Input a correct password and press OK to confirm your entry.

If you enter a wrong password, the system displays "Wrong Pwd" as shown below and returns to the password input interface:

Verification Through Card ReadŒ
If you have your ID card number enrolled in the system, you can pass the verification by read your ID card at the corresponding area in a proper way.

Prompts for Successful Enrollment
A high fingerprint enrollment quality assures quick verification speed, while a poor fingerprint enrollment quality may easily lead to false rejection and slow verification.

To enhance the quality of enrolled fingerprints, refer to Table 4 1

Common Causes of Enrollment Failure or Poor Fingerprint Quality

Finger is too dry or dirty Rub your fingers against your palm because rubbing yields oil. Moisturize your finger by breathing on it.
Apply insufficient pressure Apply pressure lightly and evenly during the capturing process.
Select fingers for enrollment

Left and right index fingers or middle fingers are recommended.

Select the fingers without worn out or damaged fingerprints.

Users usually select their index fingers, but if their index fingers do not have high fingerprint quality, they can select their middle fingers or ring fingers.

For users with small fingers, they can opt for their thumbs. To enroll spare fingerprints, users can select fingers not prone to wear out or damage, for example, the ring fingers.

Finger placement Press your finger flatly on the fingerprint sensor and be sure that the pad (not the tip) covers as much of the sensor window as possible. Do not press your finger perpendicular to the fingerprint sensor; do not knock your finger on the sensor quickly; keep your finger still.
Impact of the fingerprint image change

The change of fingerprint image due to skin peeling off or injury will affect the verification performance.

If the fingerprint quality of a user is poor due to the skin peeling off and the user cannot pass the verification one week later, the user needs to re enroll his/her fingerprint or adopt the password verification mode.

Other causes There may be a small amount of people who cannot pass the verification no matter how hard they try due to very poor fingerprint quality. In that case, you can adopt the ID + fingerprint verification mode, duly lower the 1: 1 match threshold or adopt the password verification mode.

Administrator Enrollment
The CA FP 100Fxx FRT provides administrator settings to prevent unauthorized users changing system data and ensure system security. The operations on administrator settings are as follows:

  1. The brand new FRT does not assign any administrator, so you can press Menu to access the system directly and the following interface is displayed.
  2. Press OK to display the [Mange User] interface.
  3. Select Enroll Admin through the ▲/▼ key.
  4. Press OK to display the [Enroll Admin] interface.
  5. Select an enrollment mode and press OK to display the administrator enrollment interface. Administrator enrollment includes three modes: Enroll Recorder, Enroll Ordinary Admin, and Enroll Super Admin. For details, see Authority Class. The enrollment mode of administrator is consistent with that of a new enrolled user. For details, see Enroll a User.

Delete Enrollment Data
To delete an enrolled user from the system, perform as follows:

  1. Press Menu to access related menu item for verification, and the following interface is displayed:
  2. Press OK to display the [Mange User] interface.
  3. Select Delete through the ▲/▼ key.
  4. Press OK to display the [Delete] interface.
  5. Enter a number in the [User ID] field and press OK to confirm your entry. Then delete the user according to system prompt.

information Note:
About deleting the administrator Privilege and Clear all Data. There are such items in the "Advanced Settings" on some models of devices. for detail please refer to "Advanced Settings".

Such deletions can also be executed by " Access Control Management Software ". Steps as below: Open the " Access Control Management Software", Click "Basic settings" "Device management" "others" "read options" at bottom (can read all data of connection machine) "Clear Admin' Privilege".

Deleting "All Users" can also be executed through the "Equipment Management" menu. Therefore, all depends on users' need and their actual models of Products

Options

Press Menu on the initial interface. After verifying your administrative rights, the system displays the following interface.

Select Options and press OK to proceed.

System option
Enter system option menu, and the following information will appear:

Time Settings
Set the current date and time displayed on the FRT screen. Select Time Opt and press OK to display the following interface.

To modify date and time, place the cursor to the desired field through the ▲/▼ key, input correct date and time, and press OK to save the changes.

information Note: For some type of devices, you need to press Menu key about 3seconds for confirm.

Date Format
You can set the date format displayed on the FRT screen. Select Fmt and press OK to display the format setting interface. Select a desired date format through the ▲/▼ key. The FRT supports 10 date formats: YY MM DD, YY/MM/DD, YY.MM.DD, MM DD YY, MM/DD/YY, MM.DD.YY, DD MM YY, DD/MM/YY, DD.MM.YY and YYYYMMDD. Select desired date format and press OK to confirm your selection. Then press ESC to exit the system settings. When prompted to save the settings, press OK and the date format of the system is modified.

For example, the date formats MM/DD/YY and YY MM DD are displayed in the above figures on the left and right respectively.

Advanced Settings
Through the advanced settings, you can perform such operations as restoring factory defaults, deleting management rights, deleting attendance records, deleting all data and setting match thresholds, as shown below:

information Note:
The menu options above contain some optional functions. If the actual product does not have one or several of the options above, then this product does not support the related function(s).

Select a desired option through the ▲/▼ key, and perform settings as required.

  1. Default
    This option is used to restore all the settings to factory defaults.
  2. Del AttLogs
    This option is used to delete all verification records in the chip.
  3. Del All Data
    This option is used to delete all the enrolled fingerprints and records.
  4. Del Adm Perm
    This option is used to set all the administrators to ordinary users.
  5. Show Score
    This option is used to set whether to display the fingerprint quality value on the top right corner of the screen. (Note: The setting of this option affects the image capture speed of the FRT.)
  6. MatchLvl
    This option is used to set the extent of matching between an input fingerprint and that stored in templates. For details, see Match Threshold.
  1. 1:1 Lvl
    This option is used to set the extent of matching between an input ID/fingerprint and that stored in templates in the ID and fingerprint identification mode. For details, see Match Threshold.
  1. Ext FP DevŒ
    If you select "Y", you can install an external fingerprint sensor through the USB interface and use this external sensor together with the fingerprint reader accompanied with the FRT. If you select "N", you cannot install any external fingerprint sensor. For details, see External Connection with the Fingerprint Reader.
  2. Firmware Upd
    You can select "Firmware Upd " to upgrade the firmware of an FRT through the upgrade files in the USB pen drive.
    information Note: If you need firmware upgrade files, please contact our technical support engineers. Generally it is not recommended to upgrade the firmware.
  3. Buzzer
    This parameter is used to set whether to play voice prompts during the operation of the terminal. Select "ON" to enable the voice prompt, and select "OFF" to mute.
  4. Anti PassbackŒ
    This option has four values: None, Exit, Entry and Entry and Exit. For details, see Appendix Anti Passback.
  5. Alg Ver
    This option is used to set the version number of the fingerprint algorithm. Select 9 to adopt algorithm version 9.0 and 10 to adopt algorithm version 10.0. Please select the algorithm version with caution because the fingerprint templates of these two algorithm versions are incompatible.

information Note: some of the device will be prompted to remove the user information and attendance data when change the algorithm. So we proposed to back up user information and attendance data before change the algorithm.

information Note:

  1. The options Two Sensor and Upd Firmware are available only on the USB capable FRTs.
  2. The option Card Only is available only on the Mifare card capable or ID card capable FRTs.
  3. The options R.card Only and FPC ard Key are available only on the Mifare card capable FRTs.
  4. The options Remote Verify and Server IP are available only on the RIS capable FRTs.
  5. The options Keypad Tone and Adj VOL are available only on the FRTs that adopt the URU sensor.
  6. The option Work Code is available only on the FRTs that support the work code feature.
  7. The option Imdt Prt is available only on the print capable FRTs.
  8. The option Anti Passback is available only on the anti passback capable FRTs.

Power ManagementŒ
Through power management, you can set the timing power on/shutdown, power on/shutdown time, lock power key, and timing state switching.

Power Settings
Press Menu to access system menu. Select Options → Power Mgt to display the following interface.

The CA FP 100Fxx FRT adopts an intelligent power management system and supports such functions as timing power on/shutdown and sleep timing.

  1. Power On This option is used to automatically power on the FRT at specified time. The settings of timing power on are similar to those of timing power off.
  2. Sleep This option is used to set the FRT to automatically enter sleep mode at specified time. You can wake up the FRT from sleep mode by pressing any key. The setting steps of this parameter are similar with those of timing shutdown.
  1. Idle& Idle Time These two options are closely associated. When Idle min is 0, the Idle function is disabled. When Idle min is a non zero number (unit: minute), for example, 1, the system will enter a specified state if there is no operation in 1 minute.

Communication related Settings
Select Comm. Opt and the information displayed on the screen is shown in the following figure:

  1. BaudRate
    This option is used to set the baud rate for the communication between the FRT and the PC. It includes five options: 9600, 19200, 38400, 57600, and 115200. The high baud rate is recommended for the RS232 communication to achieve high communication speed, while the low baud rate is recommended for the RS485 communication to achieve stable low speed communication.
  2. Dev No.
    This option refers to the device ID numbered from 1 to 255.
  3. Net SpeedŒ
    This parameter refers to the network rate, including five options: ATUO, 10M F, 10M H, 100M F and 100M H. "10M F" is recommended for the ZEM100 product series and "AUTO" is recommended for the ZEM200 product series.
  4. IP AddrŒ
    The default IP address is 192.168.1.201. You can modify the IP address as required.
  5. NetMaskŒ
    The default subnet mask is 255.255.255.0. You can modify the subnet address as required.
  6. GatewayŒ
    The default gateway is 0.0.0.0. You can modify the gateway as required.
  7. EthernetŒ
    This parameter is used to set whether to adopt the Ethernet for communications. To adopt the Ethernet, set this parameter to Y; otherwise set it to N.
  8. RS232
    This parameter is used to set whether to adopt the RS232 for communications. To adopt the RS232, set this parameter to Y; otherwise set it to N.
  9. RS485
    This parameter is used to set whether to adopt the RS485 for communications. To adopt the RS485, set this parameter to Y; otherwise set it to N.
  10. COMM Key
    When the password is set to 0, no password is required for communication; when the password is set to a non zero value, this value is required for communication connection.

Log Settings
Select Log Opt and the information displayed on the screen is shown in the following figure:

  1. Alm AttLog
    When the available space for storage of attendance logs reaches the specified value, the FRT automatically generates an alarm.
  2. Recheck Min
    If a user's attendance record already exists and the user checks in again within the specified period (unit: minute), his/her second attendance record will not be stored.

Access OptionsŒ
The access control settings are valid for the FRTs with professional access control functions. The menu item "Access Options" is inexistent in the fingerprint time attendance machines and the devices with simple access control functions.

Select Access Options and the information displayed on the screen is shown in the following figure:

The Access Options includes the following options:

  1. Def TP Define the unlocking time segments every day of a week.
  2. User Acc Opts Set the unlocking time, the group that the user belongs to, and the unlocking combination.
  3. GRP Time Def Define the available time segments for users of a certain group to unlock.
  4. Access CombDefine diverse unlocking combinations. Each combination is composed of different groups.
  5. Lock TimeSet the duration from successful fingerprint matching to unlocking.
  6. DSen. Delay Set the door sensor delay. An alarm will be generated if the door is left open for a period of time, and this period is called door sensor delay.
  7. DSen. Mode DSen. Mode includes NONE, NC and NO. NONE means no door sensor, NO means the door and the lock are both open, or alarm will be given off. NC means both door and lock are closed, or alarm will be given off.
  8. DSen. Alarm DSen. Alarm means the time between alarm and alarmer ring.
  9. Duress Options Œ Set the automatic alarm function to prevent enrollment under duress. In times of duress, the system will silently send a duress signal after a period of time when a fingerprint passes the match.
  10. ALARM CNT ŒALARM CNT means auto alarm will happen when verification is not passed, namely the failed press times reaches the set numerical value.
  11. Group VerType ŒSet the verification type adopted by the user in a group.

information Note: The "Group VerType" option is available only for the devices supporting 14 verification modes. To customize this function, please consult our commercial representatives or pre sales technical support engineers.

Access Control Function Description
The access control setting items include the user's access time segments and access combinations.

The setting items for each user include: The group that the user belongs to, and the available access time segments for group and user. User grouping means the allocation of a user to a certain group, for example, Group 1 or Group 2. A group or user can be set with three preset access time segments at most, and these time segments have an "OR" relation with one another (that is, unlocking is available for a group/user at any one of these time segments). For details on the relationship between the use of group TSs and the user TPs, see User Access Control Settings.

In a simple word, the unlocking conditions for an enrolled user are as follows:

  1. The group to which the user belongs must lie in an access combination (or it can share the same access combination with other groups and unlock together with them).
  2. The current unlocking time must remain within any one of valid access time segments.

Newly enrolled users are classified into Group 1 by default. The default group time segment is "1". When Group 1 and time segment 1 both adopt factory defaults, the newly enrolled users are in Open state. (If a user modifies the access control settings, the system will also change these settings accordingly.) If the group to which a user belongs is inexistent in access combination settings, the user can only mark his/her attendance but cannot unlock.

Access Control Verification Flow
Access Control Verification Flow

Function Introduction
Define Time Segments

Time segment is the minimum time unit for access control setting. The entire system can be defined with a maximum of 50 time segments. Each time segment is divided into 7 time buckets, that is, one week. Each time bucket is the valid time segment within 24 hours every day. Every user can be set with up to 3 time segments which have an "OR" relation with one another. The verification time is deemed valid only if it remains within one of these time segments. The time bucket format is HH:MM HH:MM using a 24 hour clock. If the end time is earlier than the start time (23:57–23:56), unlock is prohibited for a whole day. If end time is later than the start time (00:00–23:59), unlock is valid within this time bucket.

Valid time segments for unlock: whole day (00:00–23:59), or the period from start to end time.

Tip: The default time segment 1 indicates the whole day access (that is, the newly enrolled users are allowed to unlock).

Select Def Time to display the following information:

Press OK to display the Def TP1 interface as follows:

The TP1 above is defined as whole day access, that is, the factory default.

Time segment can be reset. Take TP1 as an example:

Inaccessible on Saturday and Sunday;

Accessible during the work time from Monday to Friday.

Work time: 08:30–18:00

The specific settings are as follows:

Multiple time segments can be defined as required and the entire system can be defined with 50 time segments at most.

Define Grouping Functions
By using the grouping functions, you can divide users into different groups and combine diverse groups to form different access combinations, so as to facilitate access control management. The system defines 5 groups: Group 1, Group 2, Group 3, Group 4 and Group 5. Newly enrolled users belong to Group 1 by default, but they can also be reassigned to other groups.

Group TS: This parameter is used to set the unlocking time of groups. In Group TS, select a set TP No. The newly enrolled user adopts the time segment of Group 1 by default, but after resetting the group that he/she belongs to, the user will use the related time segment of the new group. Therefore, the default time segment of every group shall be defined in advance.

For details on how to Use Grp TPs, see User Access Control Settings.

Tip: The time segment of Group 1 is numbered "1" by default. (That is, the newly enrolled users are allowed to unlock by default.)

  1. Select GRP TP Define and then select "1" as Group No.:

Press OK to display the Group1 Default TS interface.

There are three default time segments which have an "OR" relation with one another.

Group 1 is allowed to unlock within the time segments 1, 8 and 40. You can also select other defined time segments.

  1. Select GRP TP Define and then select "2" as Group No.
    Press OK to display the Group2 Default TS interface.

Group 2 is allowed to unlock within the time segments 2, 10 and 36. You can also select other defined time segments.

The time segments of every group can be defined as required and the entire system can be defined with the time segments of 5 groups at most.

User Access Control Settings
The user access control settings can be performed based on user requirements.

You can access the User Acc Opts menu to query the access control setting state of a user.

The User Acc Opts menu includes the options: Belong to GRP, Group TS, User TS, Group VerType, and Individual VerType.

  • Belong to GRP: Divide the enrolled users into several groups to facilitate management.
  • Group TS: Set whether the user adopts the default time segments of the group that he/she belongs to.
  • User TS: Set the user's unlocking time and select a set time segment number.
  • Group VerType: Set whether the user adopts the verification types of the group that he/she belongs to. †Individual VerType: Select a verification type for an individual user without using group verification types or affecting other group members' verification types.

information Note:

  1. Relationship between group time segments and user time segments.
    The value of the option Use Grp TPs only works for the following user time segments:
    1. If "Use Grp TPs" is set to Y, the user time segment will be automatically assigned the time segment No. of the group that the user belongs to. (Group time segments must be set in advance.)
    2. If the user time segment changes, "Use Grp TPs" will be automatically set toN.
  2. Relationship between group verification types and individual verification types.
    1. If the option Group VerType is set to Y, the user will use the group verification type.
    2. If the option Group VerType is set to N, the user will use the individual verification type.

Examples:

  1. Users 00001 and 00002 are classified into Groups 1 and 2 respectively.

Select User Acc Opts and set the UserID to 00001.

Press OK to display the setting interface of user 00001. Press ▲/▼ to select Y for the option Use Grp TPs. As mentioned above, Group 1 has been allowed to unlock within the time segments 1, 8 and 40. Select Y for the option Use Grp VS. Here we assume that the verification type of Group 1 is password verification (which can be set through the option Group VerType under the menu "Access Options"). The following information is displayed on the screen:

User 00001:

  1. User 00001 belongs to Group 1 and adopts the time segment of Group 1 (The user time segment No. is the group time segment No). User 00001 is allowed to unlock within the time segments 1, 8 and 40.
  2. If user 00001 adopts a group verification type (password verification), this type shall prevail even if user 00001 selects another individual verification type.
  1. Select User Acc Opts and set the UserID to 00002.

Press OK to display the setting interface of user 00002.

If the user time segments are numbered 1 and 20, the system will automatically set the option Use Grp TPs to N.

To set "Group VerType" to N, set the option VERType (individual verification type) to FP as shown in the following figure:

User 00002:

  1. User 00002 belongs to Group 2 and adopts the user time segment instead of group time segment (which means user 00002 is allowed to unlock within the time segments 1 and 20). If user 00002 wants to adopt the group time segments, he/she can selectY, and then the user time segment No. will be automatically assigned the group time segment No. If user 00002 wants to adopt the user time segments, he/she can directly modify the user time segment No. and the system will automatically set the option Use Grp TPs to N.
  2. The individual verification type adopted by user 00002 is fingerprint verification.

Definition of Unlock Combinations
The unlock combinations are defined to control the unlocking. For example, to make all enrolled users unable to unlock, leave all the ten unlock combinations BLANK.

The unlock combinations are user defined combinations to unlock the door, and each combination consists of different groups. The unlock combinations specify the group number(s) permitted to unlock the door, leaving the user verification sequence out of account. For example,

  • "123" means the door unlocks only after at least three users respectively from Group 1, Group 2 and Group 3 pass the verification within the specified time segment.
  • "4" means the door unlocks after one user of Group 4 passes the verification.

You can define a maximum of 10 unlock combinations for the FRT and the door unlocks as long as one of them passes the verification.

Tip: The default unlock combination is "1" (that is, new enrolled users can unlock the FRT by default). On the initial interface, press Menu → Options → Access Options → Access Comb, as shown in the following figure:

Thedefault unlock combination is "1" and other unlock combinations are left blank.

To make all users unable to unlock, leave all these ten unlock combinations BLANK.

To enable unlocking for some of the groups, you need to define the unlock combinations, as shown below:
Example 1:

As shown in the figure above, five unlock combinations are set in total:

Unlock combination 1: 123.

Unlock combination 2: 4.

Unlock combination 3: 24.

Unlock combination 4: 45.

Unlock combination 5: 15.

Unlock combination 1: The door unlocks only after at least three users respectively from Group 1, Group 2 and Group 3 pass the verification within the specified period.

Unlock combination 2: The door unlocks as long as one user from Group 4 passes the verification.

Unlock combination 3: The door unlocks only after at least two users respectively from Group 2 and Group 4 pass the verification within the specified period.

Unlock combination 4: The door unlocks only after at least two users respectively from Group 4 and Group 5 pass the verification within the specified period.

Unlock combination 5: The door unlocks only after at least two users respectively from Group 1 and Group 5 pass the verification within the specified period.

To sum up, the door unlocks only when users of each group in an unlock combination pass the verification within the specified period.

information Note:

  1. The verification will fail in any of the following cases:
  • The user time segment number is not selected.
  • The default group time segment number is not selected (when the group time segment is used).
  • †The verification does not remain within any of the user defined time segments.
  • The time segment is defined as "Disabled".
  1. Users set a time segment within which the verification fails:
    1. If the conditions of unlock combination 2 are met, users of "Invalid Group" cannot unlock but are allowed to register attendance. (If there are other users meeting the unlocking condition in Group 4, then the unlock combination 2 is allowed to unlock)
    2. If the conditions of unlock combinations 1, 3, 4 and 5 are met, users of "Invalid Group" cannot unlock but are allowed to register attendance.

2) Example 2:
To set the vault of a bank to unlock only in the presence of three people, proceed as follows:

These three people respectively belong to Group 2, Group 4 and Group 5 and are granted the right to unlock within the same time segment. Select "Comb 1" and press OK. Then enter "245" through the numeric pad and press ESC to exit and save the setting.

Tip: Once the "245" combination is set, combinations such as 24, 25 and 45 are not allowed.

Lock Driver Duration
The lock driver duration refers to the duration within which the electric lock is opened upon the fingerprint verification. To set this duration, proceed as follows: Select Lock, and press OK. Then enter a desired number through the numeric pad, and press ESC to exit and save the setting.

The unit of quantity for this duration is 20 ms and you can set it to 254 at most, that is, 5.08s.

To disable this function, set the duration to "0".

Door Sensor Delay
DSen. Delay (Door Sensor Delay)
: indicates the delay in checking the door sensor after the door is open. If door sensor state is inconsistent with the normal state set by the door sensor switch, an alarm will be generated, and this period of time is regarded as the "door sensor delay".

To set DSen. Delay, press Menu → Options → Access Options, and then select DSen. Delay through the ▲/▼ key, as shown in the following figure:

Press OK and modify the value of DSen. Delay through the ▲/▼ key.

Door Sensor Switch
The door sensor switch includes three modes:

  • NONE: The door sensor switch is not used.
  • NO: The lock is open as long as the door is open.
  • NC: The lock is closed after the door is closed.

To set DSen. Mode, press Menu → Options → Access Options, and then select DSen. Mode through the ▲/▼ key, as shown in the following figure:

Press OK and then switch among the door sensor switch modes through the ▲/▼ key. The door sensor switch includes three modes: NONE, NO and NC.

Door Sensor Alarm Delay
The door sensor alarm delay refers to the delay in generating the alarm signal after a door sensor alarm is triggered. You can set the alarm delay between 0 and 999s.

To set DSen. Alarm, press Menu → Options → Access Options, and then select DSen. Alarm through the ▲/▼ key, as shown in the following figure:

Press OK and modify the value of DSen. Alarm through the ▲/▼ key.

Duress Alarm
To set Duress Options, press Menu → Options → Access Options, and then select Duress Options through the ▲/▼ key, as shown in the following figure:

The Duress Options include such options as the Duress FP Mng, Help Key, 1:1 Trig, 1:n Trig, Pwd Trig and Alarm Delay.

Duress Fingerprint Management
Users may specially enroll a new or specify an existing fingerprint as the "Duress Fingerprint". Under any circumstances, a duress alarm is generated once this fingerprint passes the match.

Access Duress Options and select Duress FP Mng through the ▲/▼ key. Press OK to display the interface as shown in the following figure:

  1. New Duress FP This option is used to enroll a new fingerprint as the duress fingerprint.
  2. Duress FP Def This option is used to change an enrolled fingerprint as the duress fingerprint.
  3. Del Duress FP This option is used to cancel a single duress fingerprint.
  4. Clear All This option is used to cancel all duress fingerprints.

Help Key
Select Duress Options, and press ▲/▼ key to selectHelp Key, as shown in the following figure:

If the option Help Key is set to Y, press and hold ▼ (over 3 seconds) to signal for help; if you press and hold ▼ (less than 3 seconds) and then input your fingerprint or ID card number, a duress alarm will be generated at the same time when you pass the verification successfully.

If the option Help Key is set to N, the system will not send signals seeking for help even if you press and hold ▼.

Verification Alarms
Our FRT supports three fingerprint verification modes: 1:1 verification, 1:N verification, and password verification. Press ▲/▼ in the following interface to select one or more verification modes as the duress alarm mode. When you perform verification by using a verification mode which is set to Y, the system will generate an alarm signal.

Alarm Delay
Define automatic alarm time: You can define an alarm delay to enable the system to automatically send a duress alarm signal after a period of time (0–255 seconds).

Under the menu Duress Options, press ▲/▼ to select Alarm Delay.

Verification Failure Alarm
Define the number of verification failures: The system automatically generates an alarm when the number of consecutive verification failures exceeds the upper limit.

Under the menu Access Options, press ▲/▼ to select ALARM CNT.

Press OK. Then select a number from 0–9 through the ▲/▼ key. Here, 0 denotes the deactivation of verification failure alarm, and other numbers denote the specific number of verification failures.

Group Verification TypeŒ
There are 14 group verification types available. For details, see Appendix Multiple Verification Modes.

Under the menu Access Options, press ▲/▼ to selectGroup VerType and press OK as shown below:

First select a group through the ▲/▼ key and press OK. Then press ▲/▼ to select a verification type for this group and press OK to confirm your selection. Finally press ESC to exit current interface, and when the system prompts you to save your changes, press OK

information Note:
The "Group VerType" option is available only for the devices supporting multiple verification modes.

Automatic Test
Select Auto Det and the information displayed on the screen is shown in the following figure:

Through this menu, you can test the system components. The auto test function helps troubleshoot the FRT quickly and facilitates the FRT maintenance.

LCD Test: The FRT automatically tests the display effect of its LCD and check whether its LCD displays integral images.

Fingerprint Reader Test: The FRT automatically tests whether the fingerprint reader works properly by checking. After select it, press "OK" to test, and check it whether normal. Press" ESC "to exit the test.

Keyboard Test: The FRT tests whether every key on the keyboard works normally. Press any key on the [Keyboard Test] interface to check whether the pressed key matches the key displayed on screen. Press "ESC " to exit the test.

Realtime Clock (RTC) Test: The FRT tests whether its clock works properly by checking the stopwatch of the clock. After select it, press "OK" to test, Press " ESC " to exit the test.

USB Pen Drive

Select USB Mng and the information displayed on the screen is shown in the following figure:

You can download the attendance data, employee data and short messages and upload employee data and short messages with a USB pen drive.

Download Attendance Data

  1. Insert a USB pen drive into the USB interface on the FRT.
  2. Select USB Mngt and select the desired attendance data to be downloaded through the "▲/▼" key. The interface displayed is shown as follows:
  3. Press OK to confirm your selection and start the download. The interface displayed upon successful download is shown as follows:
  4. Press ESC to return to the initial interface and then remove the USB pen drive. Three files X_attlog.dat (attendance records),X_oplog.dat (management records) and X_user (where "X" refers to the device ID) are stored in the USB pen drive.

Tip: If the download succeeds, a prompt "Copy Data Suc" will pop up. If the system displays the prompt "Plug Pen Drive?", please check whether the USB pen drive is plugged in properly.

Download Employee Data
Employee data downloading is similar to the downloading of attendance records. Press ▲/▼ to select "DwnLoad User" from the "USB Mngt" menu. The files user.dat (user profile) and Template.dat (fingerprint template) will be concurrently downloaded to the USB pen drive.

Upload Employee Data
Press ▲/▼ to select "UpLoad User" from the "USB Mngt" menu and then press OK. The files user.dat (user profile) and Template.dat (fingerprint template) stored in the USB pen drive will be concurrently uploaded to the FRT.

Download Short Messages
Short message downloading is similar to the downloading of attendance records. Press ▲/▼ to select "Download SMS" from the "USB Mngt" menu. Press OK to start download. The system will prompt whether the download is successful or not.

Upload Short Messages
Edit a short message by selecting External ProgramSMS Mng of the attendance software. Select External Program→ PenDrive Mng→ Export → Export to PenDrive to export the edited short message to the USB pen drive. Insert the USB pen drive into the USB interface on the FRT upon successful export, and select Menu →USB Mngt → Upload SMS to upload the short message from the USB pen drive.

information Notes:

  1. The option PenDrive Mng is available only on the FRTs configured with USB slots. The options Upload SMS and Download SMS are available only on the SMS capable FRTs. If you need FRTs that support these functions, please consult our commercial representatives or pre sales technical support engineers.
  2. About others "Update firmware function" in advanced settings menu.

System Information

Through the Sys Info menu, you can check all information of the FRT, including the enrolled fingerprint count, enrolled users, attendance records, administration records and equipment information. On the Menu interface, select Sys Info and press OK to display the interface as shown in the following figure:

On the screen as shown in the figure above, you can check the User Cnt (Number of enrolled users), FP Cnt (Number of enrolled fingerprints), Att Log (Piece of attendance records), Admin Cnt (Number of enrolled administrators), User Pwd (Number of pass words) and Alm Log (Number of enrolled super administrators). Through Free Cap, you can check the free space in the storage device. Through Dev Info, you can check such information as the storage capacity, date of manufacture, serial number, manufacturer, algorithm version number and firmware version number.

Turn Off (Clear) Alarm Œ

The option Turn Off Alarm is available only after the FRT generates an alarm and is used to clear an alarm.

information Note:
The option Turn Off Alarm is available only after an alarm signal is generated.

Maintenance

  1. Cleaning

Sometimes the optical lens, keyboards and display screens need to be cleaned. Although the specific cleaning cycle is dependent upon the ambient environment where the FRT operates, the following maintenance guide might be of some help to you:

Table 8 -1 Maintenance Description

Item Cleaning
Keyboards and display screens Clean the keyboards or display screens when the surface of them is dirty or the screens look blurry. Please refer to the following descriptions.
Optical lens Do not clean the optical lens frequently. The optical lens work better with oil or grease.
Clean the optical lens if they get blurry and the verification performance is affected. Please refer to the following descriptions.
  1. Clean keyboards and LCD screens
    Before cleaning keyboards and LCD screens, power off the FRT, clean them with a piece of wet cloth or a neutral detergent and then wipe them with a piece of dry cloth.
  2. Clean optical lens
    Follow the suggestions below to clean the optical lens after powering off the FRT:
    1. Blow off the dust or dirt on the surface of the optical lens.
    2. Clean the display screens with adhesive tape.


Do not clean the optical lens with water or non neutral detergents; otherwise the optical lens may be damaged.

  1. Wipe the optical lens with a fine micro fiber cloth. Be careful not to scratch the lens. If there are micro fibers left on the lens, try to blast them off after the lens get dry.

FAQs

Question: How do I address the problem that some employees fail to pass the fingerprint verification more often than not?
Answer:
The following factors will make fingerprint verification hard or even impossible for some employees:

  1. The fingerprints of some fingers wear out.
  2. The fingers have too many wrinkles which change frequently.
  3. The skin on the fingers peels off badly.

For users whose fingerprints are beyond recognition, they can delete these fingerprints and enroll them again or enroll a fingerprint of another finger.

It is recommended to select fingers with good fingerprint quality (few wrinkles, no peeling off and distinct fingerprint) for fingerprint enrollment. Press the finger flatly on the fingerprint sensor and be sure that the pad (not the tip) covers as much of the sensor window as possible. Perform fingerprint match test after finishing enrollment. It is recommended to enroll the fingerprints of several fingers as backup.

Furthermore, the FRT provides the 1:1 matching and password verification functions especially for users who have difficulty in or cannot pass fingerprint verification.

Question: What are the possible causes of FRT communication failure?
Answer:
The possible causes are listed as follows:

  1. The setting of communication port is incorrect. The port set for communication is not the COM port actually used.
  2. The setting of the communication port baud rate of the PC is not consistent with that of the FRT.
  3. The FRT is not connected with the power supply or the PC.
  4. The FRT is connected with the PC but not powered on.
  5. The No. of the connected terminal is incorrect.
  6. The data cable or converter is faulty.
  7. The COM port of the PC is faulty.

Question: What are the possible causes of incomplete display (sometimes half screen display) or blurred screen after the FRT is powered on? How to fix it?
Answer:
The possible causes are listed as follows:

  1. The main board is faulty.
  2. The LCD display is faulty.

In either of the above cases, you need to contact the supplier and return the FRT for repair.

Question: How can I delete a FRT administrator?
Answer:
Connect the FRT with a PC and establish communication between them. Select the FRT management tab, and click Delete Administrator to delete the FRT administrator. You can access the FRT menu after disconnecting the FRT with the PC.

Question: Why is there a beep sound during the communication between FRT and PC?
Answer:

  1. If the beep sound occurs in RS 232 communication mode, the baud rate settings of the PC and FRT are inconsistent.
  2. If the beep sound occurs in RS 485 communication mode, it is possible that the two communication cables of the converter are inversely connected or stuck together.

Question: Why does the FRT constantly display "Please press (remove) your finger again"? How to fix it?
Answer:
The possible causes are as follows:

There is dirt, grease or scratch on the surface of the fingerprint sensor, which may lead the fingerprint sensor to mistakenly think there is a finger pressing on the surface. Remove the dirt or grease on the surface of the fingerprint sensor with an adhesive tape.

  1. The connection cable of fingerprint sensor comes loose or disconnected.
  2. The chip of the main board is faulty.
  3. For the last two cases, contact the supplier and return the FRT for maintenance.

Question: Why does a failure or error occurs when I read the attendance data while I can download fingerprint and password data properly? How to fix it?
Answer:
This problem may relate to the data cable, converter or the COM port setting of the PC. You may try decreasing the baud rate of the PC and FRT, for example, set it to 19200 or 9600 before reading the attendance data again.

USB

USB Host
The FRT is used as the USB Host to externally connect with a USB pen drive for data exchange.

The conventional fingerprint readers transfer data only through the RS232, RS485 or Ethernet. Bulk data transfer may take a long time due to the restriction of physical conditions. The USB far outperforms any other previous transfer modes in terms of data transfer rate. Insert the USB pen drive to the USB slot on the FRT, download data to the USB pen drive, and then connect the USB pen drive to a computer to import the data to the computer. Further, the FRT also supports the exchange of user information and fingerprint data between two devices, which helps dispense with the hassle of conventional cable connection for data transfer between the FRT and computers.

For the operations of the FRT used as the USB host, see USB Pen Drive

Short Message

FRTs of some models support the transfer of public and private short messages at the specified time and for a specified individual. You can edit public or short messages through the background software and then upload them to the FRT. The public short messages are displayed on the screen all the time once the FRT is started, while private short messages are displayed upon the fingerprint verification. This function helps reduce the workload for the HR department and greatly enhance working efficiency.

A short message for an individual: For example, if an employee's birthday is October 20 th , then you can edit a short message "Happy birthday to you!" through the background software, upload the short message to the FRT, and set it to be displayed on October 20 th . This message will be displayed on the screen once this employee verifies his/her fingerprint.

A short message for a group of employees: for example, for a plenary meeting scheduled to be held on June 19th , you can edit a short message "Please attend the plenary meeting at ×× in the ×× meeting room" (you can edit it as required) through the background software and upload it to the FRT. Then on June 19 th , this short message will be displayed all the time on the screen once the FRT is started.

Setting of short messages: After setting the short message in the attendance software, upload it to the FRT.

The FRT supports the import of short messages in two modes:

  • Direct import by connecting the software to the FRT.
  • Import from a USB pen drive.

Operation Description:

  1. Edit a short message by selecting the External Program→ SMS Mng menu item of the attendance software, connect the attendance software to the FRT and upload it to the FRT.
  2. Edit a short message by selecting the External Program→ SMS Mng menu item of the attendance software. Select External Program→ PenDrive Mng→ Export → Export to PenDrive to export the edited short message to the USB pen drive. Insert the USB pen drive into the slot on the FRT upon successful export, and select Menu → PenDrive Mng → Upload SMS to upload the short message from the USB pen drive. Display of short messages: Public short messages are displayed all the time on the screen once the FRT is started. Private short messages are displayed upon fingerprint verification.

information Note: You can upload a maximum of 1024 public or private short messages to the FRT.

EM Read only Card, MiFare Card

To accommodate the market demand for the currently popular RF cards, we have developed the FRT with built in non contact RF EM card reader module. By integrating the EM read only card, this FRT can be conveniently consolidated into the existing telephone, canteen POS and access control system. This FRT supports multiple verification modes including the fingerprint verification, password verification, card verification, card + fingerprint verification and card + password verification to meet the diversified customer needs.

EM Read- only Card
The EM Read only Card supports thick (1.88 mm), thin (0.88 mm) and medium thickness (1.05 mm) ID/EM cards with working frequency of 125 kHz and card reading distance of 5m.

Mifare Card
To accommodate the market demand for the currently popular RF cards, we have developed the FRT with non contact RF Mifare card reader module. By integrating the Mifare card, the FRT can be conveniently consolidated into the existing telephone, canteen POS and access control system. This FRT supports multiple verification modes including the fingerprint verification, password verification, card verification, card + fingerprint verification and card + password verification to meet the diversified customer needs.

The FRT supports MIFARE non contact smart cards with working frequency of 13.56 MHz and card reading distance of 3m to 5m.

For the operations of the Mifare cards, see Mifare Card User Guide.

Master slave function Œ


Two devices, a master and a slave, both controlling the same lock, are connected by RS232/RS485/Wiegand.

  1. The Applications of the Master and the Slave
    1. Record storage: By default, the master status is exit and the slave status is entry. The records of entry and exit are both saved on the master.
    2. Anti Passback function:

Whether to perform the anti passback function is determined by the latest record of the user's entry and exit.

With this function, the exit record must match the entry record. The function supports "Out", "In", "In Out", "None and save " or "None". anti passback. By default, the identification status of the master is exit and that of the slave is entry, so if " out anti passback " has been set and when the last record of the user's entry is not "entry", the system will prompt anti passback refusal" and refuse to open the door if the user wants to exit. The logic is the same with "out anti passback" and " in out anti passback".

For example, now A wants to exit.

① If the last record for A is not entry, the device will prompt anti passback refusal and refuse to open the door.

② If the last record for A is entry, after the fingerprint identification is passed, the device will open the door.

  1. Alarm function
    If the slave is equipped with alarm function, when an alarm incident occurs, the slave will forward it for the master to process. There is no such function on device that is not equipped with alarm function.
  1. The Connection of the Master and the Slave
    Currently, three modes RS232, Wiegand and RS485 are applicable for the connection of the master and the slave. Of the three, RS232 is less often used due to its deficiency that its connection distance is short. For example, it can be used when the master and the slave are just installed respectively inside and outside a door. Its connection principle is similar to that of RS485, which is omitted here. The Wiegand connection is widely used, most of whose devices on the market are applicable to the master and the slave. RS485, whose transmission distance is great (however it is recommended that the distance should not be over 600 meters), applies to most occasions, but the slave must be equipped with the inBIO reader (which is used for collecting fingerprint or swiping card).

If Wiegand connection is to be used, the connection and setting for anti passback are as follows:

  1. Select model:
    Master machine: Machine with Wiegand in function.
    Slave machine: Machine with Wiegand Out function.
  2. Master slave menu setting:
    This machine supports out, in, out in, No, No and saved anti pass back (enter Menu > setting > system setting > advanced setting > anti passback).
  3. Modify device's Wiegand output format:
    If the two devices are communicating, only Wiegand signals without device ID can be received. Enter device Menu > Comm. Opt > Wiegand option or enter software: Basic setting > device management > Wiegand, to modify "defined format" as "wiegand26 without device ID".
  4. Enroll user:
    The user must be on master machine and slave machine at the same time, and user PIN must be the same. Therefore, it is necessary to enroll user on master machine and slave machine at the same time.
  5. Connection instruction:
    Wiegand communication is adopted for master machine and slave machine. Refer to the following for connection:

If RS485 connection is to be used, the connection and setting for anti passback are as follows: The mode of RS485 is a new application in the connection of the master and the slave. In this mode, user information, fingerprint verification, card verification and authority verification are all processed on the master and the slave is only used as a collector. Therefore, the software only needs to manage user information and record information on the master.

  1. Choosing devices:
    The master: It must have the 485 communication function (upgrade firmware required).
    The slave: It must use the inBIO readers.
  2. Setting the menu on the master:
    Setting the master:
    ①Access Menu>Settings>System Settings>Advanced Settings>Anti passback. The setting can be "Out", "In", "In Out", "None and save " or "None".
    ②Access Menu>Settings> Access Options>485 reader. If "Yes" is chosen, the master and slave function of 485 mode is started and at the same time the communication function with PC is forbidden. If "No" is chosen, the machine runs normally the communication function of PC.
    Setting the slave:
    Set the device number, identical to the master.
  3. Connecting the master and the slave
    The master and the slave are for RS485 communication, whose connection is shown as in the figure:

The Use of the Master and the Slave
After the devices are started, the master works the same as common access control. The slave cannot verify. When a fingerprint is pressed or a card is swiped on the slave, the indicator will blink and "click, click" will sound to prompt and the verification result will be displayed on the master.

Wiegand Protocol

Wiegand26 is an access control standard protocol established by the Access Control Standard Subcommittee affiliated to the Security Industry Association (SIA). It is a non contact IC card reader interface and output protocol.

Wiegand26 defines the interface between the card reader and controller used in the access control, security and other related industrial fields. Wiegand26 helps standardize the work of the card reader designers and controller manufacturers. The FRT is also designed in compliance with Wiegand26.

Digital Signals
Figure 1 is a sequence diagram in which the card reader sends digital signals in bit format to the access controller. In this sequence diagram, Wiegand follows the SIA's access control standard protocol for the 26 bit Wiegand card reader (one pulse time ranges between 20us and 100us, and the pulse jump time ranges between 200us and 20ms). Data1 and Data0 are high level (larger than Voh) signals till the card reader prepares to send a data stream. The asynchronous low level pulse (smaller than Vol) generated by the card reader is sent to the access control panel (The saw tooth wave as shown in Figure 1) through Data1 or Data0. Data1 and Data0 pulses will neither overlap nor be generated synchronously. Table 1 lists the maximum and minimum pulse widths (a consecutive pulse) and pulse jump time (time between pulses) allowed by the F series fingerprint access control terminal.

Table 1 Pulse Time

Symbol Definition Typical Value of Reader
Tpw Pulse Width 100 µs
Tpi Pulse Interval 1 ms

Sequence Diagram
Figure 1 Sequence Diagram

Wiegand Format
The Wiegand format adopted by the FRT is the universal access control protocol.

26 Bit Wiegand Format
The composition of the open de facto 26 Bit Weigand industry standard contains 8 bits for the facility code and 16 bits for the ID number field. Mathematically, these 8 facility codes allows for a total of just 256 (0 to 255) facility codes, while the 16 ID number bits allow for a total of only 65,536 (0 to 65,536) individual ID's within each facility code.

26 Bit Wiegand format is of 26 bits in length, including 2 bits for parity bits.

Table 2 Definition of Fields

Field Purpose
EP Even Parity bit (EP) is judged based on field 1 to 13 bit. EP is 1 if the number of "1" is even; otherwise, EP is 0.
FC(bit2 bit 9) Facility Code (0 255)
Bit 2 is the Most Significant Bit (MSB).
CC (bit10 bit 25) Card Code (0 65 535). Bit10 is the MSB.
OP The value of Odd Parity bit is determined by 14–26 bit. OP is 1 if the number of "1" is even; otherwise, OP is 0.

Pyramid Wiegand format
Several alternatives exist for customers who require more codes. The first is to switch to Keri's standard 39 bit Pyramid format. This 39 bit Wiegand format contains 17 bits for the facility code field and 20 bits for the ID number field. Mathematically these 17 facility code bits allow for a total of 131,072 (0 to 131,071) facility codes, while the 20 ID number bits allow for a total of 1,048,576 (0 to 1,048,575) individual ID's within each facility code. Since there are so many facility codes in the Pyramid format, a new facility code may be selected for each project. Additionally the large number of ID's per facility code makes the Pyramid format ideal for very large projects. For added security, Keri Systems tracks credential coding to ensure that no duplication occurs. Table 3 provides a summary of the Pyramid Wiegand format.

Table 3 Pyramid Wiegand Format

Bit Number Meaning
Bit 1 Even parity over bits 2 to 9
Bits 2 to 18 Facility code (0 to 131,071); Bit 2 is MSB
Bits 19 to 38 ID Number (0 to 1,048,575); Bit 19 is MSB
Bit 39 Odd parity over bits 20 to 38

Custom Wiegand Formats
The second alternative is to create a custom Wiegand format. Typically, up to 64 bits are available for creating a custom Wiegand format. With certain limitations, formats with greater than 64 bits may be created. If a customer currently has a custom Wiegand format from Wiegand or from other proximity manufacturers, Keri can normally match that format. Although the customer is primarily responsible for custom format card coding, as an added benefit Keri Systems tracks card coding for additional security. Table 4 provides an example of one possible custom Wiegand format.

Table 4 Example of a Custom Wiegand Format

Bit Number Purpose
Bit 1 Even parity over bits 2 to 22
Bits 2 to 9 OEM code (0 to 255); Bit 2 is MSB
Bits 10 to 21 Facility code (0 to 4,096); Bit 10 is MSB
Bits 22 to 43 ID Number (0 to 524,287); Bit 22 is MSB
Bit 44 Even parity over bits 23 to 43

Daylight Saving Time (Time Zone Settings)

The Daylight Saving Time (DLST) is a widely used system of adjusting the official local time forward to save energy. The uniform time adopted during the implementation of this system is known as the DLST. Typically clocks are adjusted forward one hour in the summer to make people early to bed and early to rise so as to make full use of illumination resources and save electricity. Clocks are adjusted backward in autumn. The specific DLST regulations vary with countries. At present, the DLST system is adopted every year by about 110 countries in the world.

To meet the DLST requirement, the FRT supports the DLST function to adjust forward one hour at ×× (Hour):
×× (Minute) ×× (Day) ×× (Month) and backward one hour at ×× (Hour): ×× (Minute) ×× (Day) ×× (Month).

For the operations of the FRT menu settings, see Daylight Saving Time.

Environment Friendly Use Description


The Environment Friendly Use Period (EFUP) marked on this product refers to the safety period of time in which the product is used under the conditions specified in the product instructions without leakage of noxious and harmful substances.

The EFUP of this product does not cover the consumable parts that need to be replaced on a regular basis such as batteries and so on. The EFUP of batteries is 5 years.

Names and Concentration of Toxic and Hazardous Substances or Elements
Parts Name Toxic and Hazardous Substances or Elements
Pb Hg Cd Cr6+ PBB PBDE
Chip resistor
Chip capacitor
Chip inductor
Chip diode
ESD components
Buzzer
Adapter
Screws

: Indicates that this toxic or hazardous substance contained in all of the homogeneous materials for this part is below the limit requirement in SJ/T11363 2006.

: Indicates that this toxic or hazardous substance contained in at least one of the homogeneous materials for this part is above the limit requirement in SJ/T11363 2006.

information Note: 80% of the parts in this product are manufactured with non hazardous environment friendly materials. The hazardous substances or elements contained cannot be replaced with environment friendly materials at present due to technical or economical constraints.

Documents / Resources

Download manual

Here you can download full pdf version of manual, it may contain additional safety instructions, warranty information, FCC rules, etc.

Download Honeywell VISTA Series, CA-FP-100F, CA-FP-100FS, CA-FP-100FID, CA-FP-100FIC Manual

Advertisement

Need help?

Need help?

Do you have a question about the VISTA Series and is the answer not in the manual?

Questions and answers

Table of Contents