ProCapture-T&ProRF-T User Manual V1.1 - 20160608
ProCapture-T&ProRF-T User Manual V1.1 - 20160608
Version: 1.1
Date: June, 2016
Contents 1
About This Manual
The pictures in this manual may not be exactly consistent with those of
Not all the devices have the function with , the real product prevails.
Contents
1 Guidance Notes ..................................................................................................................................................................... 1
2 Main Menu............................................................................................................................................................................... 5
3 Date/Time Settings............................................................................................................................................................... 6
5 User Role................................................................................................................................................................................ 12
Contents I
6.5.2 Wiegand Output ............................................................................................................................. 19
13 Autotest............................................................................................................................................................................... 46
15 Troubleshooting .............................................................................................................................................................. 48
16 Appendices ........................................................................................................................................................................ 49
Contents III
1 Guidance Notes
It is recommended to use the index finger, middle finger or ring finger; avoid using the thumb or
little finger.
Press the finger horizontally onto the fingerprint sensor; the center
Vertical Sides
Please use the correct method of pressing fingerprint for registration and
verification. Our company does not undertake the responsibility for the lowered
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
1
1.2 Verification Modes
Under the fingerprint verification method, a fingerprint collected by the sensor is verified with all
Please use the correct way to press fingerprint onto the fingerprint sensor (for detailed instruction, please
Remarks:
1. In the devices possessing Photo ID function and enabling [Display User Photo] at the same time,
figure 1 will be displayed on screen after successful verification. Disable the [Display User Photo]
option, figure 2 will be displayed after successful verification.
2.In the initial interface, press > System > Access Logs Setting > Display User Photo, and press
to enable or disable the [Display User Photo] option.
Only some products are equipped with Photo ID function. Products without Photo ID function will not
display user photo after successful verification.
Under the fingerprint verification method, a fingerprint collected by the sensor is verified with the
fingerprint corresponding to the entered user ID. Please use this method when difficulty is encountered
Remarks:
1. Input user ID in the initial interface and press button. If “Incorrect user ID!” is displayed, this means
the user ID does not exist.
2. When the device displays “please press your finger again”, press your finger again onto the
fingerprint sensor. If verification still fails after 2 attempts, it will exit to the initial interface.
Under this verification method, the entered password is verified with the password of the entered user ID.
Input the user ID and press Choose “Password” and press Input password
Remarks: If “Incorrect password” is displayed, please enter the password again. If verification still fails
after 2 attempts, it will exit to the initial interface.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
3
1.2.4 Card Verification
Remarks: Card function is optional, only products with a built-in card module are equipped with
card verification function. Please contact our technical support as required.
1. Swipe the card above the card reader (the card must be registered first)
2. Verification succeeds
3. Verification fails
When the device is turned on, the initial interface is shown as below:
Alarm Signal
Network
User Mgt.: Basic information of registered users, including user ID, user name, user role, fingerprint,
badge ★ (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), password, user photo★ (only products
possessing Photo ID function display this optional) and access control role.
User Role: To set user roles for accessing into the menu and changing settings.
Comm.: To set the related parameters of the communication between the device and PC, including
ethernet parameters such as IP address etc., serial Comm, PC connection,ADMS and Wiegand settings.
System: To set related parameters of the system and upgrade firmware, including setting date & time,
Data Mgt.: delete access records, delete all data, delete admin role, delete screen savers and backup,
restore data.
Access Control: To set the parameters of the control lock and access control devices, including
parameters of access control, time rules, holidays, combined unlocking, and anti-passback.
USB Manager: To transfer data such as user data and access records from the USB disk to the supporting
Attendance Search: To search for the records stored in the device after successful verification.
Autotest: To automatically test different module’s functions, including the LCD, voice, keyboard,
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
5
3 Date/Time Settings
In the initial interface, press > System > Date Time to enter the date/time setting interface. It
includes setting date, time, 24-hour clock, date format and daylight saving time.
When resetting to factory settings, the date format can be restored (YYYY-MM-DD).
Remarks: When resetting to factory settings, the device’s date/time will not be restored (if the
date/time is set to 18:30 on January 1, 2020, after settings are reset, the date/time will stay at 18:30 on
January 1, 2020.
DST, which is also called Daylight Saving Time, is a system adjusting local time in order to save energy.
The time adopted during the set dates is called "DST". Usually, the time will be one hour forward in
summer. This enables users to sleep or get up earlier, and also reduce device's lighting to save power. In
autumn, the time will resume the standard time. Regulations are different in different countries. At
To meet the demand of DST, a special option can be customized. Make the time one hour forward at XX
(hour) XX (day) XX (month), and make the time one hour backward at XX (hour) XX (day) XX (month)
Press > System > Date Time > Daylight Saving Time, then press to enable Daylight Saving Time.
selection.
Daylight Saving Setup: Set date/time or week/day of the Daylight Saving Time according to the
For example, adjust the clock forward one hour at 08: 00 on April 1 and backward one hour at 08: 00 on
By date/time mode:
By week/date mode:
Remarks:
1. If the month when DST starts is later than that when DST ends, DST spans two different years. For
example, the DST start time is 2014-9-1 4:00 and the DST end time is 2015-4-1 4:00.
2. Assume that the week /day mode is selected in [Daylight Saving Mode] and the DST starts from
Sunday of the sixth week of September in 2013. According to the calendar, September of 2014 does
not have six weeks but has five weeks. In this case, in 2014, DST starts at the corresponding time point
Assume that the DST starts from Monday of the first week of September in 2014. According to the
calendar, the first week of September in 2015 does not have Monday. In this case, the DST starts from the
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
7
4 User Management
In the initial interface, press > User Mgt. > New User to enter New User setting interface. Settings
include inputting User ID, choosing User Role (Normal User / Super Admin), registering Fingerprint and
Badge Number (ID and RFID S50/S70 IC Card (13.56 MHz) are optional), setting Password, taking User
Photo (only products possessing Photo ID function display this optional) and setting Access Control
Role.
Add a Super Admin: Choose “Super Admin” in [User Role], who is allowed to operate all the functions
on the menu.
Add a Normal User: Choose “Normal User” in [User Role]. When the Super Admin is set, Normal Users
can only use fingerprint, password or card for verification; when the Super Admin is not yet set, Normal
Remarks:
1. The device automatically allocates user ID for users in sequence, but user can set it manually as well.
User access control option is to set open door access aimed at everybody, including access group setting,
Access group: To allocate users to different access control groups for management. New users belong to
Group 1 in default settings, who can be reallocated to other groups. A valid group number ranges from 1
to 99.
Time Period: Select time rules for the user. Time rules are set under the Access Control menu and a
maximum of 50 time rules are supported. The effective door opening time period of the user is the sum
Duress Fingerprint: User can choose one or more registered fingerprint(s) as Duress Fingerprint. When
Example: Among those registered fingerprints (6, 7, 8), choose the 8th fingerprint as the duress
fingerprint.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
9
In the initial interface, press > User Mgt. > All User to enter All User interface. Input “User ID” in ,
the corresponding user will be shown. As shown in the above figure, search for the user with the user ID
of “2”.
After a user is chosen through 4.3 Searching User, press and select [Edit] to enter user editing
interface.
Or in the initial interface press > User Mgt. > All User > Search a user > Press > Edit to enter user
editing interface.
The operation method of editing user is the same with that of adding user, but the user ID cannot be
edited.
After a user is chosen through 4.3 Searching User, press and select [Delete] to enter user deleting
Or in the initial interface press > User Mgt. > All User > Search a user > Press > Delete to enter
user deleting interface. Select user information to be deleted or delete the whole user.
Note:
1. Only when the user has registered fingerprint, password, badge★ and user photo★, will the
2. Photo ID function and card function are optional, not all products are equipped.
In the initial interface, press > User Mgt. > Display Style to enter Display Style setting interface.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
11
5 User Role
Setting user rights of operating the menu (a maximum of 3 roles can be set). When user role is enabled,
in [User Mgt.] > [New User] > [User Role], you can allocate suitable user role to each user.
Role: Super user needs to allocate different rights to new users. To avoid setting rights for each user one
by one, you can set user roles to categorize different permission levels in user management.
In the initial interface, press > User Role > User Defined Role 1 (2 / 3) > Enable Defined Role, Press
After enable defined roles, you can check the enabled user roles in [User Mgt.] > [New User] > [User
Role].
Remarks: At least one registered Administrator is required to enable user role, or, the device will
prompt “Please enroll super admin first”.
In the initial interface, press > User Role > User Defined Role 1 (2 / 3) > Define User Role to enter
User Defined Role 1 (2 /3) rights allocating interface. Press to select or cancel the operating right to
editing interface.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
13
6 Comm. Settings
In the initial interface, press > Comm. > Ethernet to enter the Ethernet setting interface.
The parameters below are the factory default values, please adjust them according to the actual network
situation.
IP Address: 192.168.1.201
Gateway: 0.0.0.0
DNS: 0.0.0.0
DHCP: Dynamic Host Configuration Protocol, which is to dynamically allocate IP addresses for clients via
Display in Status Bar: To set whether to display the network icon on the status bar.
to enter main menu, and select Comm and press to enter to enter
Comm.
Remarks:
When RS485 is used as the function of “master unit”, the device will act as “master unit”, and it can
6.3 PC Connection
To improve security of data, Comm Key for communication between the device and PC needs to be set.
If a Comm Key is set in the device, the correct connection password needs to be entered when the
device is connected to the PC software, so that the device and software can communicate.
In the initial interface, press > Comm. > PC Connection > Comm Key to enter the Comm Key
setting interface.
Comm Key: The default password is 0 (no password). Comm Key can be 1~6 digits and ranges between
0~999999.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
15
Device ID Settings
If the communication method is RS232/RS485, inputting this device ID in the software communication
interface is required.
In the initial interface, press > Comm. > PC Connection > Device ID to enter the Device ID setting
interface.
Device ID: Identity number of the device, which ranges between 1~254.
6.4 ADMS
Settings used for connecting with ADMS server, such as IP address and port settings, and whether to
In the initial interface, press > Comm. > ADMS to enter the ADMS server setting interface.
When the Webserver is connected successfully, the main interface will display the logo.
Server Address: Enter IP address of the ADMS server (namely, the IP address of server where the
software is installed).
Enable Proxy Server: Method of enabling proxy. To enable proxy, please set the IP address and port
number of the proxy server. Entering proxy IP and server address will be the same.
In the initial interface, press > Comm. > Wiegand Setup to enter the Wiegand Setup setting
interface.
Wiegand Input connector supports card reader, or connects the device as a master device to another
press to enter
Wiegand Format: User can choose among the following built-in Wiegand formats: Wiegand 26,
Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and
Wiegand 50.
Pulse Width (us): The width of pulse sent by Wiegand card reader. The default value is 100 microseconds,
Pulse Interval (us): The default value is 1000 microseconds, which can be adjusted within the range of 200
to 20000 microseconds.
ID Type: Input content included in Wiegand input signal. User ID or Badge Number can be chosen.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
17
Wiegand26 ECCCCCCCCCCCCCCCCCCCCCCCCO
Consists of 26 bits of binary code. The 1st bit is the even parity bit of the
2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th
Wiegand26a ESSSSSSSSCCCCCCCCCCCCCCCCO
Consists of 26 bits of binary code. The 1st bit is the even parity bit of the
2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th
bits. The 2nd to 9th bits are the site code, while the 10th to 25th bits are the
card number.
Wiegand34 ECCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO
Consists of 34 bits of binary code. The 1st bit is the even parity bit of the
2nd to 17th bits, while the 34th bit is the odd parity bit of the 18th to 33rd
Wiegand34a ESSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCO
Consists of 34 bits of binary code. The 1st bit is the even parity bit of the
2nd to 17th bits, while the 34th bit is the odd parity bit of the 18th to 33rd
bits. The 2nd to 9th bits are the site code, while the 10th to 25th bits are the
card number.
Wiegand36 OFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCMME
Consists of 36 bits of binary code. The 1st bit is the odd parity bit of the
2nd to 18th bits, while the 36th bit is the even parity bit of the 19th to 35th
bits. The 2nd to 17th bits are the device code, the 18th to 33rd bits are the
card number, and the 34th to 35th bits are the manufacturer code.
Wiegand36a EFFFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCO
Consists of 36 bits of binary code. The 1st bit is the even parity bit of the
2nd to 18th bits, while the 36th bit is the odd parity bit of the 19th to 35th
bits. The 2nd to 19th bits are the device code, and the 20th to 35th bits are
Wiegand37 OMMMMSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCE
2nd to 18th bits, while the 37th bit is the even parity bit of the 19th to 36th
bits. The 2nd to 4th bits are the manufacturer code, the 5th to 16th bits are
the site code, and the 21st to 36th bits are the card number.
Wiegand37a EMMMFFFFFFFFFFSSSSSSCCCCCCCCCCCCCCCCO
Consists of 37 bits of binary code. The 1st bit is the even parity bit of the
2nd to 18th bits, while the 37th bit is the odd parity bit of the 19th to 35th
bits. The 2nd to 4th bits are the manufacturer code, 5th to 14th bits are the
device code, 15th to 20th bits are the site code, and the 21st to 36th bits
Wiegand50 ESSSSSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO
Consists of 50 bits of binary code. The 1st bit is the even parity bit of the
2nd to 25th bits, while the 50th bit is the odd parity bit of the 26th to 49th
bits. The 2nd to 17th bits are the site code, and 18th to 49th bits are the
card number.
Note: C denotes card number, E denotes even parity bit, O denotes odd parity bit, F denotes facility
code, M denotes manufacturer code, P denotes parity position, and S denotes site code.
Wiegand Output connector supports SRB, or connects the device as a slave device to another device
press to enter
SRB: Select [ON] to turn the SRB function on, while choosing [OFF] can disable the function.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
19
Wiegand Format: User can choose among the following built-in Wiegand formats: Wiegand 26,
Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and
Wiegand 50. Multiple selections are available, but the actual Wiegand format will depend on the option
For Example: If the 26-bit Wiegand26, 34-bit Wiegand34a, 36-bit Wiegand36, 37-bit Wiegand37a and
50-bit Wiegand50 are chosen in [Wiegand Format], but 36 bits is selected in [Wiegand output bits],
then the actual Wiegand format for use will be 36-bit Wiegand36.
Wiegand output bits: Number of bits of Wiegand data. After choosing [Wiegand output bits], the
device will use the set number of bits to find the suitable Wiegand format in [Wiegand Format].
For Example: If the 26-bit Wiegand26, 34-bit Wiegand34a, 36-bit Wiegand36, 37-bit Wiegand37a and
50-bit Wiegand50 are chosen in [Wiegand Format], but 36 bits is selected in [Wiegand output bits],
then the actual Wiegand format for use will be 36-bit Wiegand36.
Failed ID: It is defined as the output value of failed user verification. The output format depends on the
Site Code: It is similar to device ID except that it can be set manually and repeatable with different
Pulse Width (us): The width of pulse sent by Wiegand card reader. The default value is 100 microseconds,
Pulse Interval (us): The default value is 1000 microseconds, which can be adjusted within the range of 200
to 20000 microseconds.
ID Type: Output content after successful verification. User ID or Badge Number can be chosen.
[Card Format Detect Automatically] aims at assisting user with quickly detecting the card type and its
corresponding format. Various card formats are preset in the device. After card swiping, the system will
detect it as different card numbers according to every format; user only requires to choose the item
equivalent to the actual card number, and set the format as the Wiegand format for the device. This
function is also applicable to card reading function and auxiliary Wiegand reader.
Operating Procedure:
1. After entering the [Card Format Detect Automatically] interface of an ID device, swipe the ID card
above the card reader (on the local device or auxiliary card reader), the interface will show the
2. Choose the item corresponding to the actual card number as the device’s [Wiegand format],
Remarks: In the [Card format detect automatically] interface of an IC device, the device cannot
detect the card number or Wiegand format only by swiping an IC card. For detecting the Wiegand format
of an IC card, it is needed to connect an IC card reader with the device and swipe an IC card above the
auxiliary card reader, so that the device will show the card number and the Wiegand format.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
21
7 System Settings
In the initial interface, press > System > Access Logs Setting to enter Access Logs Setting interface.
Camera Mode: To set whether to take and save photos in verification; applicable to all users. The
Display User Photo: To set user photo to be displayed when a user passes verification. Turn it [ON] to
display user photo and [OFF] to disable it (only products possessing Photo ID function display this
optional).
Access Logs Warning: When the residual access record capacity is smaller than the preset value, the
device automatically generates a message indicating residual record capacity. You can set it to Disabled
Circulation Delete Access Records: Set the number of log entries that can be deleted at a time when
existing records reach the allowed maximum log capacity. The default value is Disabled. You can set it to
Cyclic Delete ATT Photo: The number of attendance photos allowed to be deleted in one time when
the maximum storage is attained. It can be disabled or set to a value ranged from 1 to 99.
the maximum storage is attained. It can be disabled or set to a value ranged from 1 to 99.
Confirm Screen Delay(s): Set the duration to display messages of verification results. The valid value
In the initial interface, press > System > Fingerprint to enter the Fingerprint setting interface.
1:1 Match Threshold: Under 1:1 Verification Method, only when the similarity between the verifying
fingerprint and the user’s registered fingerprint is greater than this value can the verification succeed.
1:N Match Threshold: Under 1:N Verification Method, only when the similarity between the verifying
fingerprint and all registered fingerprints is greater than this value can the verification succeed.
Match Threshold
High Low 45 25
Medium Medium 35 15
Low High 25 10
FP Sensor Sensitivity: To set the sensibility of fingerprint collection. It is recommended to use the
default level “Medium”. When the environment is dry, resulting in slow fingerprint detection, you can set
the level to “High” to raise the sensibility; when the environment is humid, making it hard to identify the
Live Detection: To set whether to detect the false fingerprint. Enable [Live Detection], the device will
detect the false fingerprint during registration and verification, so that it cannot be registered or verified
successfully.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
23
1:1 Retry Times: In 1:1 Verification or Password Verification, users might forget the registered fingerprint
or password, or press the finger improperly. To reduce the process of re-entering user ID, retry is allowed;
Fingerprint Image: To set whether to display the fingerprint image on the screen in registration or
verification. Four choices are available: Show for enroll, Show for match, Always show, None.
Reset data such as communication settings and system settings to factory settings.
In the initial interface, press > System > Reset > OK to finish the reset setting.
Reset parameters include Access Control Options, Anti-passback Setup, communication setting (namely,
the setting of Ethernet, Serial Comm., PC Connection and Wiegand Setup), Personalize (such as Voice
Use as master: In
Gateway: 0.0.0.0
Comm Key: 0
PC Connection
Device ID: 1
Keyboard Prompt ON
Voice Prompt ON
Remarks: When resetting to factory settings, the date and time will not be affected. For example, if
the device date and time are set to 18:30 on January 1, 2020, the date and time will remain unchanged
Insert the U disk with upgrade file into the device’s USB port, and in the initial interface, press >
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
25
8 Personalize Settings
In the initial interface, press > Personalize > User Interface to set User Interface.
Wallpaper: Select the wallpaper of main screen as required, you can find wallpapers of various styles in
the device.
Menu Screen Timeout (s): When there is no operation in the menu interface and the time exceeds the
set value, the device will automatically exit to the initial interface. You can disable it or set the value to
60~99999 seconds.
Remarks: If [Disabled] is chosen, the system will not exit the menu interface even when there is no
operation. Disabling this function is not recommended due to great power used and insecurity.
Idle Time to Slide Show (s): When there is no operation in the initial interface and the time exceeds the
set value, a slide show will be shown. It can be disabled (set to “None”) or set to 3~999 seconds.
Slide Show Interval (s): This refers to the interval between displaying different slide show pictures. It can
Idle Time to Sleep (m): When there is no operation in the device and the set Sleep Time is attained, the
device will enter standby mode. Press any key or finger to cancel standby mode. You can disable this
function, or set the value to 1~999 minutes. If this function is turned to [Disabled], the device will not
Remarks: Disabling this function is not recommended due to great power used.
Main Screen Style: Choosing the position and ways of the clock and status key.
In the initial interface, press > Personalize > Voice to enter the Voice settings interface.
Voice Prompt: Select whether to enable voice prompts during operating. The default value is [ON],
indicating that voice prompt is enabled. You may press to switch between [ON] and [OFF]. The icon
Keyboard Prompt: Select whether to enable voice while touch the keyboard. The default value is [ON],
indicating that keyboard prompt is enabled. You may press to switch between [ON] and [OFF]. The
Volume: Set the prompt volume of device. The default value is 70. Press key to increase the volume,
Many companies choose to use bell to signify on-duty and off-duty time. When reaching the scheduled
time for bell, the device will play the selected ringtone automatically until the ringing duration is passed.
In the initial interface, press > Personalize > Bell Schedules > New Bell Schedule to enter the New
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
27
Bell Status: [ON] is to enable the bell, while [OFF] is to disable it.
Bell Time: The bell rings automatically when reaching the specified time.
Interval bell delay (s): To set the ringing length. The value ranges from 1 to 999 seconds.
Press to select “Bell Schedules” Press to select “All Bell Select a bell to be edited and
To manage data in the device, which includes delete access records, delete all data, delete admin role
In the initial interface, press > Data Mgt. > Delete Data to enter the Delete Data settings interface.
Delete access records: To delete all access records saved in the device or delete access records in
Delete Attendance Photo: To delete all attendance photos saved in the device or delete attendance
Remarks:
1. Only if [Camera Mode] is selected as “Take photo and save” or “Save on successful verification” will
2. In the initial interface, press > System > Access Logs Setting > Camera Mode to select it as
Delete Blacklist Photo: To delete all blacklist photos saved in the device or delete blacklist photos in
specified time range, which means the photos taken after failed verifications.
Remarks:
1. Only if [Camera Mode] is selected as “Take photo and save” or “Save on failed verification” will
2. In the initial interface, press > System > Access Logs Setting > Camera Mode to select it as
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
29
Delete All Data: To delete all user information, fingerprints and access records etc.
Delete User Photo: To delete all user photos in the device (only products possessing Photo ID
function display this optional). For details of uploading user photo, please refer to 16.3 Image Uploading
Rule.)
Operating Procedure:
2. Press or to switch displayed wallpaper, select “Delete Selected Picture” and press to
delete the selected picture, or select “Delete All Pictures” and press to delete all pictures.
Delete Screen Savers: To delete selected or all screen savers in the device. (For details of uploading
Backup to USB Disk (Before backing up data to a USB disk, please insert a USB disk into the USB port of
the device):
and press to enter Disk” and press to enter and tick backup
contents
Remarks: The operations of Backup to Device are the same as that of Backup to USB Disk.
9.3 Data Restoration
Restore from USB disk (Before restoring data from a USB disk, insert the USB disk carrying backup data
Press to select “Restore Data” Press to select “Restore from Select “Content” , press to
and press USB disk” and press enter and tick contents to be
restored
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
31
Press to select “Start Restore” Press to select “Yes” and press After restoration, press to restart
Remarks: The operations of Restore from Device are the same as that of Restore from USB Disk.
parameters for the device to control the lock and other devices.
In the initial interface, press > Access Control to enter Access Control setting interface.
To gain access, the registered user must meet the following conditions:
1. User’s access time falls within either user’s personal time zone or group time zone.
2. User’s group must be in the access combo (when there are other groups in the same access combo,
verification of members of those groups are also required to unlock the door).
In default settings, new users are allocated into the first access group with the default group time rule [1]
In the initial interface, press > Access Control > Access Control Options to enter the Access
Door Lock Delay (s): The period of time of unlocking (from door opening to closing automatically) after
the electronic lock receives an open signal sent from the device (value ranges from 1 to 10 seconds).
Door Sensor Delay (s): When the door is opened, the door sensor will be checked after a time period; if
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
33
the state of the door sensor is inconsistent with that of the door sensor mode, alarm will be triggered.
The time period is the Door Sensor Delay (value ranges from 1 to 255 seconds).
Door Sensor Type: It includes None, Normal Open (NO) and Normal Close (NC). None means door
sensor is not in use; Normal Open means the door is opened when electricity is on; Normal Close
Verification Mode: Select verification mode to open door, including password / fingerprint / badge,
fingerprint only, user ID only, password, badge only, fingerprint / password, fingerprint / badge, password
/ badge, user ID & fingerprint, fingerprint & password, fingerprint & badge, fingerprint & password &
badge, password & badge, user ID & fingerprint & password, fingerprint & badge & user ID.
Remarks:
1. “/” means “or”. “&” means “and”.
first. For example: When User A registers fingerprint only, and the [Verification Mode] is set as
Door Available Time Period: Set periods to open the door for users.
NO Time Period: To set time period for Normally Open, so that the door is always unlocked during this
period.
Use as master: While configuring the master and slave devices, you may set the state of the master as
Out or In.
Auxiliary Input Configuration: To set the Aux output/lock open time and Aux Output type for the
device with auxiliary connector. Aux Output type includes None, trigger door open, trigger Alarm,
Verify Mode by RS485: To turn on RS485 reader function; it is the verification method used by the
Speaker Alarm: When the [Speaker Alarm] is enabled, the speaker will raise an alarm when the device
is being dismantled.
Reset Access Setting: To reset parameters of door lock delay, door sensor delay, door sensor type,
verification mode, door available time period, NO time period, auxiliary input configuration, speaker alarm,
anti-passback direction,. However, the content of the Access Data deletion in [Data Mgt.] will not be
affected.
Time Rule is the minimum time unit of access control settings; at most 50 Time Rules can be set for the
system. Each Time Rule consists of 7 time schedules (a week) and 3 holiday time schedules, and each
You may set a maximum of 3 time periods for every time schedule. The relationship among these time
periods is "or". When the verification time falls in any one of these time periods, the verification is valid.
The time period format is HH:MM-HH:MM in the 24-hour system with precision to minute.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
35
In the initial interface, press > Access Control > Time Rule Setting to enter the Time Rule Setting
interface. The default Time Rule No. is 1 (whole-day valid), which can be edited.
A super administrator may edit time rules as needed. The detailed operation is as follows:
End Time
Start Time
Input time rule number (such as Select “Time Period 1/2/3” and Set “Start Time” and “End Time”
“2”), the time rule (2) will be press to enter time period as required, after setting, press
Prompt: You can set the “Start Time” and “End Time” by press / or input digital directly, press / to
You can set other time schedules as required after setting time schedule for Monday, and then press to
eixt.
Notes:
(1) When the end time is earlier than the start time (for example, 23:57-23:56), this means closing all day
long. When the end time is later than the start time (for example, 00:00-23:59), this means that this time
period is valid.
example, 08:00-23:59).
Add access control holidays for the device and set time periods on holidays as needed. The device
In the initial interface, press > Access Control > Holidays to enter Holidays setting interface.
Select “Add Holiday” and press Select “Date” and press to Set date for the added holiday,
No.: The device automatically assigns a number to a holiday. You can also select [No.] and press to
enter the No. interface. Enter a holiday No. as needed and press to save the settings and return to the
Holidays interface.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
37
Date: Set the date of a holiday. Press / or input digital directly to set the date, press / to switch
editing box. Then, press to save the settings and return to the Holidays interface.
Holiday Type: Select access time schedule for holiday. Time period for holiday type 1/2/3 can be edited
in time rule. For details about editing methods, please refer to 10.2 Time Rule Settings.
Looping or not: The default value of Looping or not is [ON]. You can press to switch between [ON]
and [OFF].
For fixed holidays every year, for example, the New Year's Day is January 1, Looping or not can be set to
[ON] for them. For unfixed holidays every year, for example, the Mother's Day is the second Sunday of
May, the specific dates are uncertain and Looping or not can be set to [OFF] for them.
For example, when the date of a holiday is set to January 1, 2010 and holiday type is set to holiday type 1,
the access control on January 1 is conducted according to the time period settings of holiday type 1
Press to select “All Holidays” Select a holiday and press to Edit or delete the holiday
Remarks: The methods of editing or deleting a holiday are the same as those of editing or deleting
a user and are not described here. For details, see 4.4 Editing User and 4.5 Deleting a User.
Combine two or more access groups to achieve multi-verification and improve security.
In combined verification, the range of a user number is: 0 ≤ N ≤ 5; the users can all belong to a single
Remarks: Access groups are set when adding user (in the initial interface, press > User Mgt. >
New User > Access Control Role > Access Group, to set the access group number to which the added
In the initial interface, press > Access Control > Combined Verification to enter the Combined
For Example:
As the above figure, Combined Verification 1 is made up of five members coming from five different
As the above figure, Combined Verification 2 is made up of five members coming from three different
groups: two members from Access Group 2, two from Access Group 4, and one from Access Group 7.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
39
As the above figure, Combined Verification 3 is made up of five members, and all of them come from
Access Group 9.
As the above figure, Combined Verification 4 is made up of three members coming from three different
For example, to delete Combined Verification 3, please see the figures below:
If all access group numbers in Combined Verification 3 are set to 0, it will be deleted.
To avoid some persons following users to enter the door without verification, resulting in security
problem, users can enable anti-passback function. The check-in record must match with check- out
This function requires two devices to work together: one is installed inside the door (master device), the
The Wiegand format and Output type (User ID / Badge Number) adopted by the master device and slave
In
Master Device
Door
Slave Device
User
Out
In the initial interface, press > Access Control > Anti-passback Setup to enter the Anti-passback
Anti-Passback Direction
No Anti-passback: Anti-Passback function is disabled, which means passing verification of either master
device or slave device can unlock the door. Access records are not reserved.
Out Anti-passback: After a user checks out, only if the last record is a check-in record can the user check
out again; otherwise, the alarm will be triggered. However, the user can check in freely.
In Anti-passback: After a user checks in, only if the last record is a check-out record can the user check in
again; otherwise, the alarm will be triggered. However, the user can check out freely.
In/Out Anti-passsback: After a user checks in/out, only if the last record is a check-out record can the
user check in again, or a check-in record can the user check out again; otherwise, the alarm will be
triggered.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
41
11 USB Manager
User data, user portrait, access records and other data can be exported to relevant software for
processing through a USB disk, or import user data to the device by using a USB disk.
Remarks: Before uploading/downloading data from/to the USB disk, insert the USB disk into the
USB slot first.
In the initial interface, press > USB Manager > Download to enter the USB Download interface.
Download access records: To download access records in specified time period into USB disk.
User Data: To download all user information and fingerprints from the device into USB disk.
User Portrait: To download all user photos from the device into a USB disk (only products possessing
Attendance Photo: To download attendance photos in specified time period from the device into USB
disk.
Blacklist Photo: To download blacklisted photos (photos taken after failed verifications) in specified time
In the initial interface, press > USB Manager > Upload to enter the USB Upload interface.
User Data: To upload all the user information and fingerprints from USB disk into the device.
User Portrait: To upload user photos from USB disk into the device (only products possessing Photo ID
function display this optional). Select [Upload selected picture] or [Upload all
pictures] when uploading user portraits, for details of uploading user portraits, please
Screen Saver: To upload screen savers from USB disk into the device. You can choose [Upload selected
picture] or [Upload all pictures]. The images will be displayed on the device’s main
interface after upload (for the specifications of screen savers, please refer to 16.3 Image
Uploading Rule).
Wallpaper: To upload wallpapers from USB disk into the device. You can choose [Upload selected
picture] or [Upload all pictures]. The images will be displayed on the screen after upload (for the
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
43
12 Records Search
When users verify successfully, records are saved in the device. This function enables users to check
In the initial interface, press to Select “Access records” and Input user ID (query all data
enter main menu, press to press to enter without input), and press to
press
Select time range to be searched Total access records in the time Detail access records of each
and press to enter range will display on the user will display
Press to select “Attendance Input user ID (query all data Select time range and press
enter
Press to select “Blacklist ATT Select time range and press to The corresponding blacklist ATT
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
45
13 Autotest
To automatically test whether all modules in the device function properly, which include the LCD, voice,
In the initial interface, press > Autotest to enter the Autotest interface.
Test All: To test LCD, voice, keyboard, fingerprint sensor, camera and RTC. During the test, press to
Test LCD: To test the display effect of LCD screen by displaying full color, pure white, and pure black to
check whether the screen displays colors properly. During the test, press to continue to the next test,
Test Voice: The device automatically tests whether the voice files stored in the device are complete and
the voice quality is good. During the test, press to continue to the next test, while press to exit the
test.
Test Keyboard: To test all keys to see if every key functions properly. Press any key in the Keyboard
testing interface; if the pressed key is consistent with the key sign shown on the screen, then the key
Test Fingerprint Sensor: To test the fingerprint sensor by pressing fingerprint to check if the collected
fingerprint image is clear. When pressing fingerprint on the sensor, the image will be displayed on the
Cam testing: To test if the camera functions properly by checking the photos taken are clear for use.
Press or to exit the test.
Test Clock RTC: To test the Real-Time Clock. The device tests whether the clock works properly and
accurately by checking the stopwatch. Press to start counting time, and press again to stop counting,
to see if the stopwatch counts time accurately. Press to exit the test.
In the initial interface, press > System Info to enter the System Info interface.
Device Capacity: To display the number of registered users, administrators, passwords, fingerprints,
badges, records, attendance photos, blacklist photos and user photos, also to check the total storage
of users, fingerprints, badges, records, attendance photos, blacklist photos and user photos.
Device Info: To display the device name, serial number, MAC address, fingerprint algorithm, platform
Firmware Info: To display the firmware version, Bio service, Push service and Dev service.
Remarks: The display of Device Capacity, Device Info and Firmware Info on the system information
interface of different products may vary; the actual product shall prevail.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
47
15 Troubleshooting
Fingerprint sensor is not able to read and verify the fingerprint effectively.
Check whether the finger is wet, or the fingerprint sensor is wet or dusty.
Clean the finger and the fingerprint sensor and try again.
If the finger is too dry, blow air onto it and try again.
Contact Administrator to check if the user has the privilege to gain access within that time
Schedule.
Check whether the device and the back plate is fixed together; if not, the tamper switch on the
back of the device will be triggered and raises an alarm, will be shown on the top right
corner on the interface. Only when [Speaker Alarm] (Access Control > Access Control Options >
[Operating Procedure]
If the user photo taken by the device is used, the photo will be displayed right after user verification.
If the user photo in a USB disk is used, the operating procedure is as below:
(1) Create a file named as “photo” in the USB disk, and save the user photo in the file.
(2) The photo format must be JPG, and the file must be named as the user ID. For example: the photo
(3) Insert the USB disk into the USB port of the device, and enter USB Manager > Upload > User Portrait
to upload users’ photos. The photo will then be shown after user verification.
Note:
(1) The photo name must be within 9 digits.
(3) The newly uploaded photo will replace the original photo of the user.
(4) When downloading user photo, enter USB Manager > Download > User Portrait, a file named as
“photo” will be created in the USB disk automatically, in which all downloaded user photos will be saved.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
49
16.2 Wiegand Introduction
Wiegand26 Protocol is a standard protocol on access control developed by the Access Control Standard
Subcommittee affiliated to the Security Industry Association (SIA). It is a protocol used for contactless IC
The protocol defines the port between the card reader and controller which are widely used in access
control, security and other related industries. This has standardized the work of card reader designers and
controller manufacturers. The access control devices produced by our company also apply this protocol.
Digital Signal
Figure 1 shows the sequence diagram of the card reader sending digital signal in bits to the access
controller. The Wiegand in this diagram follows the SIA access control standard protocol, which targets at
26-bit Wiegand card reader (with a pulse time within 20us to 100us and pulse hopping time within 200
us and 20 ms). Data1 and Data0 signals are high level (greater than Voh) until the card reader is ready to
send a data stream. The card reader send out asynchronous low level pulse (less than vol), transmitting
data stream via Data1 or Data0 wire to access control box (as the sawtooth wave in figure 1). Data1 and
Data0 pulses do not overlap or synchronize. Figure 1 shows the maximum and minimum pulse width
(successive pulses) and pulse hopping time (the time between two pulses) allowed by the F series
Composition of the Wiegand 26-bit format: 2-bit parity check bits and 24-bit output content (user ID or
card number). The 24-bit binary code can indicate 16 777 216 (0-16 777 215) different values.
1 2 25 26
Even parity check bit User ID/Card number Odd parity check bit
Field Description
The even parity check bit is determined by bits 2-13. If there is an even
Even parity check
number of 1's, the even parity check bit is 0. If there is an odd number of 1's,
bit
the even parity check bit is 1.
User ID/Card
User ID/Card number (card code, 0-16777215) and bit 2 indicates the most
number (bit 2
significant bit (MSB).
through bit 25)
The odd parity check bit is determined by bits 14-25. If there is an even
Odd parity check
number of 1's, the odd parity check bit is 1. If there is an odd number of 1's,
bit
the odd parity check bit is 0.
For example: A user with the user ID of 12345 has the card number of 0013378512 and the failure ID is
set to 1.
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
51
1. When the output content is set to user ID, the Wiegand output of the system is as follows after the user
00000000000110000001110011
Even parity check bit User ID = 12345 in binary system Odd parity check bit
2. When the output content is set to card number, the Wiegand output of the system is as follows after
11100110000100011110100000
Even parity check bit User ID = 0013378512 in binary system Odd parity check bit
3. When the verification fails, the Wiegand output of the system is as follows:
00000000000000000000000010
Even parity check bit Failure ID = 1 in binary system Odd parity check bit
Note: When output content is beyond the preset range of the Wiegand format, the low-order bits
are reserved and high-order bits are discarded. For example, if a user ID is 888 888 888, which is 110 100
111 110 110 101 111 000 111 000 in binary system, the last 24 bits, that is, 111 110 110 101 111 000 111
000 are outputted and the first 6 bits 110 100 are discarded because the Wiegand26 format supports 24
Composition of the Wiegand 34-bit format: 2-bit parity check bits and 32-bit output content (user ID or
card number). The 32-bit binary code can indicate 4 294 967 296 (0-4 294 967 295) different values.
Field Description
Even parity check bit even number of 1's, the even parity check bit is 0. If there is an
User ID/Card number User ID/Card number (card code, 0-4 294 967 295) and bit 2
Odd parity check bit even number of 1's, the odd parity check bit is 1. If there is an odd
For example: A user with the user ID of 123456789 has the card number of 0013378512 and the failure
ID is set to 1.
1. When the output content is set to user ID, the Wiegand output of the system is as follows after the user
0000001110101101111001101000101011
Even parity check bit User ID = 123456789 in binary system Odd parity check bit
2. When the output content is set to card number, the Wiegand output of the system is as follows after
0000000001100110000100011110100001
Even parity check bit User ID = 0013378512 in binary system Odd parity check bit
3. When the verification fails, the Wiegand output of the system is as follows:
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
53
0000000000000000000000000000000010
Even parity check bit Failure ID = 1 in binary system Odd parity check bit
1. User photo: It is required to create a file named as “photo” under the USB disk file, and put user
photos into the file. The capacity is 3000 images, with each of them not exceeding 15k. The image
name is x.jpg (x is the actual user ID, max. 9 digits). The photo format must be JPG.
2. Advertising image: It is required to create a file named as “advertise” under the USB disk file, and
put advertising images into the file. The capacity is 20 images with each of them not exceeding 30k.
3. Wallpaper: It is required to create a file named as “wallpaper” under the USB disk file, and put
wallpapers into the file. The capacity is 20 images with each of them not exceeding 30k. Image name
Note: When each user photo and attendance photo does not exceed 10k, the device can save a
total number of 10000 user and attendance photos (considering the actual capacity of the device, it is
To avoid some persons following users to enter the door without verification, resulting in security
problem, users can enable anti-passback function. The check-in record must match with check-out
This function requires two devices to work together: one is installed inside the door (master device) and
the other one is installed outside the door (slave device). The two devices communicate via Wiegand
signal. The Wiegand format and Output type (User ID / Badge Number) adopted by the master device
Master Device
Door
Slave Device
User
Out
[Working principle]
The master device supports the Wiegand In function and the slave device supports the Wiegand Out
function. After the Wigand output port of the slave device is connected to the Wiegand input port of the
master device, Wiegand signals outputted by the slave device cannot contain the device ID and the
numbers sent from the slave device to the master device must exist on the master device. That is, the
user information on the slave device supporting the anti-passback function must map to the user
[Function description]
The device detects anti-passback based on the last check-in/check-out record of users. The check-in
record must match the check-out record. The device supports out anti-passback, in anti-passback, and
in/out anti-passback.
When Out Anti-passback is set for a user on the master device, the last record of the user must be a
check-in record if the user needs to check in/out freely. Otherwise, the user cannot check out and the
check-out request of the user is rejected because of anti-passback. For example, if the recent first record
of a user is a check-in record, the second record of the user can be either a check-in or check-out record
but the third record must be based on the second record, ensuring that the check-in record matches the
check-out record. Note: If a user has no record, the user can only check in.
When In Anti-passback is set for a user on the master device, the last record of the user must be a
check-out record if the user needs to check in/out freely. Otherwise, the user cannot check in and the
check-in request of the user is rejected because of anti-passback. Note: If a user has no record, the user
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
55
When In/Out Anti-passback is set for a user on the master device, if the last record of the user is a
check-out or check-in record, the next record of the user must be a check-in or check-out record for the
user to check in/out freely. That is, the check-in record must match the check-out record.
[Operation description]
Master device: devices supporting the Wiegand In function, except the F10 reader
Anti-Passback Direction
Out Anti-passback: After a user checks out, only if the last record is a check-in record can the user check
out again.
In Anti-passback: After a user checks in, only if the last record is a check-out record can the user check in
again.
When two devices communicate with each other, only Wiegand signals that do not contain the device ID
are acceptable. You can choose Comm. > Wiegand Setup from the main menu or access the software
and choose Basic Setting > Device Management > Wiegand and set Defined Format to
User IDs must exist on both the master and slave devices and the user IDs must be consistent. Therefore,
The master and slave devices communicate with each other over Wiegand and the wiring is as follows:
Dear Customers:
Thank you for choosing the hybrid biometric products designed and manufactured by us. As a
world-renowned provider of biometric technologies and services, we pay much attention to the
compliance with the laws related to human rights and privacy in every country while constantly
1. All of our fingerprint recognition devices for civil use only collect the characteristic points of
fingerprints instead of the fingerprint images, and therefore no privacy issues are involved.
2. The characteristic points of fingerprints collected by our products cannot be used to restore the
3. We, as the equipment provider, shall not be held legally accountable, directly or indirectly, for any
4. For any dispute involving the human rights or privacy when using our products, please contact your
employer directly.
Our fingerprint products for police use, or development tools support the collection of the original
fingerprint images. As for whether such a type of fingerprint collection constitutes an infringement of
your privacy, please contact the government or the final equipment provider. We, as the original
equipment manufacturer, shall not be held legally accountable for any infringement arising thereof.
The law of the People’s Republic of China has the following regulations regarding the personal
freedom:
1. Unlawful arrest, detention or search of citizens of the People's Republic of China is prohibited;
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
57
3. The home of citizens of the People's Republic of China is inviolable.
4. The freedom and privacy of correspondence of citizens of the People's Republic of China are
protected by law.
At last we stress once again that biometrics, as an advanced recognition technology, will be applied in a
lot of sectors including e-commerce, banking, insurance and legal affairs. Every year people around the
globe suffer from great loss due to the insecurity of passwords. The biometric products actually provide
The Environment Friendly Use Period (EFUP) marked on this product refers to the safety
period of time in which the product is used under the conditions specified in the
The EFUP of this product does not cover the consumable parts that need to be replaced
on a regular basis such as batteries and so on. The EFUP of batteries is 5 years.
Chip resistor × ○ ○ ○ ○ ○
Chip × ○ ○ ○ ○ ○
capacitor
Chip inductor × ○ ○ ○ ○ ○
Chip diode × ○ ○ ○ ○ ○
ESD × ○ ○ ○ ○ ○
components
Buzzer × ○ ○ ○ ○ ○
Adapter × ○ ○ ○ ○ ○
Screws ○ ○ ○ × ○ ○
○: Indicates that this toxic or hazardous substance contained in all of the homogeneous materials for this
×: Indicates that this toxic or hazardous substance contained in at least one of the homogeneous
Note: 80% of the parts in this product are manufactured with non-hazardous environment-friendly
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
59
ZK Building, Wuhe Road, Gangtou, Bantian, Buji Town,
Longgang District, Shenzhen China 518129
Tel: +86 755-89602345
Fax: +86 755-89602394
www.zkteco.com
Error! Use the Home tab to apply 标题 1 to the text that you want to appear here.
© Copyright 2014. ZKTeco Inc. ZKTeco Logo is a registered trademark of ZKTeco or a related company. All other product and
1
company names mentioned are used for.