eSSL K31 User Manual

eSSL K31 User Manual

Security at fingertips

Advertisement

Security at Fingertips
User Manual
K20,21,30
www.esslsecurity.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the K31 and is the answer not in the manual?

Questions and answers

Summarization of Contents

Before Start and Safety Guidelines
Operator Panel LED Indicators
Explains the meaning of different LED light patterns on the operator panel for status indication.
Basic Fingerprint System Concepts
User Enrollment Process
Details the procedure for creating a user ID and capturing fingerprint templates for identification.
User Identification and Verification
Explains how user fingerprints are compared against stored templates for authentication.
Understanding Threshold Settings
Defines threshold as a match criterion and discusses its impact on False Acceptance/Rejection Rates.
User ID Number Management
Explains the assignment and use of unique User ID numbers for verification.
User Privilege Levels
Outlines the different privilege levels assigned to users for system access and tasks.
Start-up Window Overview
Describes the initial display and information presented upon device startup.
Getting Started with Fingerprint System
Enrolling New Users
Guides on how to add new users to the system, including initial enrollment procedures.
Fingerprint Enrollment Procedure
Step-by-step instructions for enrolling a user's fingerprint into the device.
Password Enrollment Procedure
Instructions for enrolling users using a password, useful when fingerprint quality is poor.
Combined Fingerprint and Password Enrollment
Details the process for enrolling users with both fingerprint and password for enhanced security.
Enroll ID Card (RFID)
Guides on enrolling users using RFID or ID cards for identification.
Enroll HID Card
Instructions for enrolling HID contactless smart cards for user identification.
Enroll Mifare Card
Details the process of enrolling Mifare contactless smart cards for user authentication.
Testing User Enrollment
How to perform a test to verify the success of a user's enrollment.
Enrolling Auxiliary Fingerprints
Guidance on enrolling a second fingerprint for a user to improve verification reliability.
Authentication Methods
Overview of the different methods available for user authentication.
Fingerprint Authentication
Explains how fingerprint-based authentication works, including 1:1 and 1:N modes.
1:N Identification (Many-to-Many)
Describes the 1:N identification process where a fingerprint is compared against all enrolled fingerprints.
Group and Hybrid Authentication
Details group-based and hybrid (1:G, 1:H) authentication methods.
Password Authentication
Instructions on performing authentication using a password, useful for damaged fingerprints.
RF/MIFARE Card Authentication
Explains how RF and MIFARE cards are used for user authentication.
MIFARE Card Specifics
Provides details on MIFARE card memory structure and its interaction with the reader.
Tips for Successful Fingerprint Enrollment
Offers advice and solutions for common issues encountered during fingerprint enrollment.
Enrolling Administrators
Guides on setting up administrator accounts to manage device settings and users.
Deleting User Data
Instructions on how to remove user data and enrollments from the system.
System Options and Configuration
System Option Configuration
Accesses and configures fundamental system settings like date, time, and language.
Setting Current Date and Time
Details the procedure for setting and updating the device's current date and time.
Date and Time Format Customization
Allows users to select their preferred format for displaying date and time.
Changing Device Language
Guides on selecting and changing the language displayed on the device interface.
Lock Duration Settings
Configures the duration for which the electronic lock remains active after verification.
Unlock Settings
Sets the number of users who can unlock the device after successful verification.
Daylight Saving Time Configuration
Explains and configures settings related to daylight saving time adjustments.
Advanced System Options
Accesses and modifies various advanced system settings and parameters.
Power Management Settings
Manages power-related features such as shutdown, power-on schedules, and idle states.
Power Option Settings
Configures specific power options like shutdown schedules, power-on, and sleep modes.
Time State Selection Configuration
Allows setting different operational states (e.g., check-in, check-out) based on time periods.
Communication Settings
Configures network communication parameters like Baud Rate, IP address, and protocols.
Log Management Options
Configures settings for system logs, including alarm thresholds and recheck intervals.
Access Control Configuration
Manages access permissions, time zones, groups, and unlocking combinations.
Access Options Introduction
Provides an overview of access control settings, including user grouping and time periods.
Access Control Verification Flowchart
Illustrates the step-by-step process for access verification within the system.
Function Description
Detailed explanations of various access control functions and their parameters.
Definition of Time Period
How to define specific time windows for granting access to users.
Definition of Grouping Function
Steps to create and manage user groups for simplified access privilege assignment.
User Acc Opts
Configures individual user access settings, linking them to groups and time periods.
Access Comb
Defines combinations of groups and time periods required for unlocking doors.
Lock
Configures the duration for which the lock remains engaged after access is granted.
DSen. Delay
Sets a delay time before an alarm is triggered after an event.
DSen. Mode
Configures the behavior of the door sensor and its interaction with the lock.
Dress Options
Manages duress fingerprint and alarm functions for emergency situations.
The duress fingerprint management
Enrolling or defining fingerprints that trigger an alarm when used.
Seeking help by key
Configures a dedicated key or button to trigger assistance or alarm signals.
The mode of validation alarm
Sets the validation modes (e.g., 1:1, 1:N) that can trigger an alarm.
Alarmdelay
Configures the delay before an alarm signal is sent after a duress event.
How to set the number of failure to verify
Configures the number of failed verification attempts before an alarm is triggered.
Group Verification
Enables and configures multi-combination verification using user groups.
System Auto Test Functions
Performs automated tests on various hardware components of the device.
USB Flash Disk Management
Downloading Attendance Data via USB
Instructions for downloading attendance logs from the device to a USB flash drive.
Downloading Staff Data via USB
How to download user and fingerprint template data from the device to USB.
Uploading Staff Data via USB
Instructions for uploading user and template data from USB to the device.
Downloading SMS via USB
Guides on downloading SMS messages from the device to a USB flash drive.
Uploading SMS via USB
Instructions for uploading customized SMS messages from USB to the device.

Table of Contents

Save PDF