HIKVISION DS-K1T642EW User Manual

HIKVISION DS-K1T642EW User Manual

Face recognition terminal
Hide thumbs Also See for DS-K1T642EW:
Table of Contents

Advertisement

Face Recognition Terminal
User Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DS-K1T642EW and is the answer not in the manual?

Questions and answers

Summarization of Contents

Legal Information
About this Manual
Provides instructions for using and managing the product, including information on trademarks and disclaimers.
Trademarks
States that Hikvision logos are its properties and mentions other trademarks belong to their respective owners.
Disclaimer
Outlines Hikvision's warranty limitations, liability exclusions, and user responsibilities regarding product use and laws.
Regulatory Information
FCC Information
Details FCC compliance for Class B digital devices, including rules for preventing harmful interference and recommended measures.
EU Conformity Statement
Confirms product compliance with EU directives like EMC, RE, RoHS, WEEE, and battery directives, with recycling information.
Safety Instruction
Dangers
Highlights critical safeguards to prevent serious injury or death, including electrical safety and battery handling.
Cautions
Lists precautions to prevent potential injury or material damage, covering shock, environment, and device handling.
Chapter 1 Overview
1.1 Overview
Introduces the face recognition terminal as an access control device for various security applications.
1.2 Features
Lists the key features of the face recognition terminal, including screen, camera, capacity, and connectivity options.
Chapter 2 Appearance
Table 2-1 Description of Face Recognition Terminal
Provides a numbered description of the components of the face recognition terminal, detailing parts like loudspeaker and microUSB.
Chapter 3 Installation
3.1 Installation Environment
Details optimal installation environment conditions, avoiding backlight, sunlight, and reflective objects for better recognition.
3.2 Wall Mounting
Provides step-by-step instructions for securely mounting the device on a wall using a template and mounting plate.
3.3 Base Mounting (Optional)
Explains the optional base mounting procedure for the device, aligning the bracket and securing it.
Chapter 4 Wiring
4.1 Terminal Description
Describes the terminal connections including power input, RS-485, Wiegand output, and door lock terminals.
4.2 Wire Normal Device
Illustrates the wiring diagram for connecting the terminal with normal peripherals.
4.3 Wire Secure Door Control Unit
Shows the wiring diagram for connecting the terminal with a secure door control unit.
4.4 Wire Fire Module
Details wiring diagrams for fire module scenarios, including door open/locked when powering off.
Chapter 5 Activation
5.1 Activate via Device
Explains the process of activating the device directly through its interface by creating a password.
5.2 Activate via Web Browser
Guides users on activating the device by accessing its IP address through a web browser.
5.3 Activate via SADP
Describes using the SADP tool to detect, activate, and modify the IP address of the device over the LAN.
5.4 Activate Device via Client Software
Details activating the device through the client software, requiring password creation before adding.
Chapter 6 Quick Operation
6.1 Select Language
Explains how to select the system language for the device after activation.
6.2 Set Password Change Type
Guides on setting password recovery options via email address or security questions.
6.3 Set Application Mode
Describes selecting the application mode (Indoor or Others) for optimal device performance.
6.4 Set Network Parameters
Explains how to configure network settings, including wired and Wi-Fi connections.
6.5 Access to Platform
Details enabling communication via Hik-Connect and adding the device to the mobile client.
6.6 Privacy Settings
Guides on configuring privacy parameters for picture uploading and storage.
6.7 Set Administrator
Explains how to add an administrator for managing device parameters after activation.
Chapter 7 Basic Operation
7.1 Login
Covers logging into the device using administrator credentials or the activation password.
7.2 Communication Settings
Details configuring network, Wi-Fi, RS-485, and Wiegand parameters.
7.3 User Management
Explains adding, editing, deleting, and searching users, including administrators and normal users.
7.4 Data Management
Covers importing and exporting user data, including face pictures and other identification information.
7.5 Identity Authentication
Describes single and multiple credential authentication methods like face, fingerprint, card, and QR code.
7.6 Basic Settings
Details configuring shortcut keys, voice, time, language, community, building, and unit numbers.
7.7 Set Biometric Parameters
Explains customizing face parameters for performance, including liveness, distance, and security levels.
7.8 Set Access Control Parameters
Covers setting access control permissions like authentication mode, NFC card, door contact, and open duration.
7.9 Time and Attendance Status Settings
Details configuring attendance modes (disable, manual, auto, manual/auto) and status requirements.
7.10 System Maintenance
Covers system information, capacity, device upgrade, app account unlinking, and factory/default settings.
7.11 Video Intercom
Explains how to use video intercom features, including calling client software, center, and mobile clients.
Chapter 8 Operation via Web Browser
8.1 Login
Describes logging into the device via web browser or remote client configuration.
8.2 Live View
Explains how to view live video, capture images, and perform other operations on the live view page.
8.3 Person Management
Details adding person information, including basic info, cards, authentication mode, and pictures.
8.4 Search Event
Guides on searching for events using various criteria like employee ID, name, or time range.
8.5 Configuration
Covers local parameter settings for live view, record paths, device information, time, DST, and software licenses.
Chapter 9 Client Software Configuration
9.1 Configuration Flow of Client Software
Presents a flow diagram illustrating the steps for configuring the client software.
9.2 Device Management
Explains how the client supports managing access control and video intercom devices.
9.3 Group Management
Details managing added resources by grouping them according to locations for organized control.
9.4 Person Management
Covers adding and managing person information, including organizations, basic info, and credentials.
9.5 Configure Schedule and Template
Explains configuring holidays and templates for access authorization schedules.
9.6 Set Access Group to Assign Access Authorization to Persons
Guides on creating access groups to define person access rights to doors and applying them to devices.
9.7 Configure Advanced Functions
Details advanced access control functions like device parameters, remain open/closed, multi-factor authentication.
9.8 Configure Linkage Actions for Access Control
Explains setting linkage actions for events, including client and device actions like warnings or door operations.
9.9 Control Door Status
Describes how to control door status: unlock, lock, remain open/locked, and capture images manually.
9.10 Event Center
Covers viewing real-time and historical events, handling them, and searching for specific events.
9.11 Time and Attendance
Details configuring attendance parameters, holidays, leave types, and synchronizing data to databases.
9.12 System Configuration
Explains setting general parameters, alarm sounds, saving paths, and email settings for the client.
9.13 Operation and Maintenance
Covers client maintenance operations like opening log files, import/export, backup, skin changes, and time sync.

Table of Contents