Face Recognition Access Controller User's Manual
Foreword General This manual introduces the functions and operations of the Face Recognition Access Controller (hereinafter referred to as the "Access Controller"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
might result in some differences appearing between the actual product and the manual. Please contact customer service for the latest program and supplementary documentation. ● There might be errors in the print or deviations in the description of the functions, operations ● ● ● ● and technical data. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Access Controller, hazard prevention, and prevention of property damage. Read carefully before using the Access Controller, and comply with the guidelines when using it. Transportation Requirement Transport, use and store the Access Controller under allowed humidity and temperature conditions. Storage Requirement Store the Access Controller under allowed humidity and temperature conditions.
on. ● Operate the Access Controller within the rated range of power input and output. ● Use the Access Controller under allowed humidity and temperature conditions. ● Do not drop or splash liquid onto the Access Controller, and make sure that there is no object filled with liquid on the Access Controller to prevent liquid from flowing into it. ● Do not disassemble the Access Controller without professional instruction. ● This product is professional equipment.
Table of Contents Foreword ........................................................................................................................................................................................................I Important Safeguards and Warnings............................................................................................................................................ III 1 Overview ..............................................................................................
2.10.7 Restart the Device ......................................................................................................................................................21 2.10.8 Configuring the Language .................................................................................................................................... 21 2.11 USB Management .................................................................................................................................................
3.8.1.1 Configuring Channel 1 .................................................................................................................................... 43 3.8.1.2 Configuring Channel 2 .................................................................................................................................... 47 3.8.2 Setting Volume ..............................................................................................................................................................
4.1 Installing and Logging In .....................................................................................................................................................69 4.2 Adding Devices .........................................................................................................................................................................69 4.2.1 Adding Individually .................................................................................................................
1 Overview 1.1 Introduction The access controller is an access control panel that supports unlock through faces, passwords, fingerprint, cards, QR code, and their combinations. Based on the deep-learning algorithm, it features faster recognition and higher accuracy. It can work with management platform which meets various needs of customers. 1.2 Features ● The housing is built of PC and ABS material, making it ideal for use indoors. ● 4.3 inch glass touch screen with a resolution of 480 × 272.
● Supports SDK. ● Connects to DSS Pro and SmartPSS Lite. 1.3 Application It is widely used in parks, communities, business centers and factories, and ideal for places such as office buildings, government buildings, schools and stadiums.
2 Local Operations 2.1 Basic Configuration Procedure Figure 2-1 Basic configuration procedure 2.2 Common Icons Table 2-1 Description of icons Icon Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. or or Turn to the previous page of the list. Turn to the next page of the list. Return to the previous menu. Turned on. Turned off. Delete Search 2.3 Standby Screen You can unlock the door through faces, passwords, and QR code.
● If there is no operation in 30 seconds, the Access Controller will go to the standby mode. ● This manual is for reference only. Slight differences might be found between the standby screen in this manual and the actual device. Figure 2-2 Homepage Table 2-2 Home screen description No. Name Description 1 Status display Displays status of Wi-Fi, network and USB, and more. 2 Date and time Displays the current date and time. 3 Verification methods Displays available verification methods.
● If you forget the administrator password, send a reset request to your registered e-mail address. ● The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). 2.5 Logging In Log in to the main menu to configure the Access Controller. Only admin account and administrator account can enter the main menu of the Access Controller.
Figure 2-3 IP address configuration Table 2-3 IP configuration parameters Parameter Description IP Address/Subnet Mask/Gateway Address The IP address, subnet mask, and gateway IP address must be on the same network segment. DHCP It stands for Dynamic Host Configuration Protocol. When DHCP is turned on, the Access Controller will automatically be assigned with IP address, subnet mask, and gateway.
Figure 2-4 Auto register Step 2 Turn on the automatic registration function and set the parameters. Table 2-4 Auto registration Parameter Description Server Address The IP address of the management platform. Port The port No. of the management platform. Enter the device ID (user defined). When you add the Access Controller to the management Device ID platform, the device ID on the management platform must conform to the defined device ID on the Access Controller.
● Select Reader when the Access Controller connects to a card reader. ● Select Controller when the Access Controller functions as a card reader, and the Access Controller will send data to the Access Controller to control access. Output Data type: ◇ Card: Outputs data based on card number when users swipe card to unlock door; ◇ outputs data based on user's first card number when they use other unlock methods. No.: Outputs data based on the user ID.
Parameter Description Pulse Interval Output Data Type Select the type of output data. ● User ID: Outputs data based on user ID. ● Card No.: Outputs data based on user's first card number, and the data format is hexadecimal or decimal. 2.7 User Management You can add new users, view user/admin list and edit user information. The pictures in this manual are for reference only, and might differ from the actual product. 2.7.1 Adding New Users Step 1 On the Main Menu, select User > New User.
Table 2-6 Description of new user parameters Parameter Description User ID Enter user IDs. The IDs can be numbers, letters, and their combinations, and the maximum length of the ID is 32 characters. Each ID is unique. Name Enter name with at most 32 characters (including numbers, symbols, and letters). Register fingerprints. A user can register up to 3 fingerprints, and you can set a fingerprint to the duress fingerprint.
2.7.2 Viewing User Information You can view user/admin list and edit user information. Step 1 On the Main Menu, select User > User List, or select User > Admin List. Step 2 View all added users and admin accounts. Figure 2-8 Admin list ● ● ● ● : Unlock through password. : Unlock through swiping card. : Unlock through face recognition. : Unlock through fingerprint. Related Operations On the User screen, you can manage the added users. ● Search for users: Tap and then enter the username.
Figure 2-9 Set admin password Step 2 Tap Administrator PWD, and then enter the administrator password. Step 3 Tap Step 4 Turn on the administrator function. . 2.8 Access Management You can configure door access parameters, such as unlocking modes, alarm linkage, door schedules. 2.8.1 Configuring Unlock Combinations Use card, fingerprint, face or password or their combinations to unlock the door. Unlock modes might differ depending on the actual product.
Figure 2-10 Element (multiple choice) Step 4 Tap to save changes. 2.8.2 Configuring Alarm An alarm will be triggered when abnormal access events occur. Step 1 Select Access > Alarm. Step 2 Enable the alarm type.
Table 2-7 Description of alarm parameters Parameter Description Anti-passback Users need to verify their identities both for entry and exit; otherwise an alarm will be triggered. It helps prevents a card holder from passing an access card back to another person so they gain entry. When antipassback is enabled, the card holder must leave the secured area through an exit reader before system will grant another entry.
the Access Controller at the same time when they unlock the door. Prerequisites On the main menu screen, tap Attendance, and then turn on the time & attendance function. Procedure Step 1 On the main menu screen, select Attendance > Mode Set. Figure 2-12 Attendance mode Table 2-8 Attendance mode Parameter Description Auto/Manual Mode After you punch in/out, you can manfully select the attendance status or the screen displays the time attendance status automatically.
Figure 2-13 Auto Mode/manual mode Figure 2-14 Fixed mode Table 2-9 Attendance mode parameters Parameters Description Check In Punch in when your normal workday starts. Break Out Punch out when your leave of absence ends. Break In Punch in when your leave of absence starts. Check Out Punch out when your normal workday starts. OT-In Punch-in when your overtime working hours starts. OT-Out Punch out when your overtime working hours ends.
2.10 System 2.10.1 Configuring Time Configure system time, such as date, time, and NTP. Step 1 On the Main Menu, select System > Time. Step 2 Configure system time. Figure 2-15 Time Table 2-10 Description of time parameters Parameter Description 24-hour System The time is displayed in 24-hour format. Date Setting Set up the date. Time Set up the time. Date Format Select a date format. 1. Tap DST Setting DST Setting 2. Enable DST. 3. Select Date or Week from the DST Type list. 4.
Parameter NTP Check Description A network time protocol (NTP) server is a machine dedicated as the time sync server for all client computers. If your computer is set to sync with a time server on the network, your clock will show the same time as the server. When the administrator changes the time (for daylight savings), all client machines on the network will also update. 1. Tap NTP Check. 2. Turn on the NTP check function and configure parameters.
Figure 2-17 Face parameter (02) Table 2-11 Description of face parameters Name Description Face Threshold Adjust the face recognition accuracy. Higher threshold means higher accuracy. Max. Angle of Face Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear.
Name Description ● Mask mode: ◇ No detect: Mask is not detected during face recognition. ◇ Mask reminder: Mask is detected during face recognition. If ◇ Mask intercept: Mask is detected during face recognition. If a Mask Parameters the person is not wearing a mask, the system will remind them to wear masks, and access is allowed. person is not wearing a mask, the system will remind them to wear masks, and access is denied.
and logs. 2.10.7 Restart the Device On the Main Menu, select System > Reboot, and the Access Controller will be restarted. 2.10.8 Configuring the Language Change the language on the Access Controller. On the Main Menu, select System > Language, select the language for the Access Controller. 2.11 USB Management You can use a USB to update the Access Controller, and export or import user information through USB.
Figure 2-18 USB export 2.11.2 Importing From USB You can import data from USB to the Access Controller. Step 1 On the Main Menu, select USB > USB Import. Step 2 Select the data type that you want to export, and then tap OK. Figure 2-19 USB import 2.11.3 Updating System Use a USB to update the system of the Access Controller. Step 1 Rename the update file to "update.bin", put it in the root directory of the USB, and then insert the USB to the Access Controller.
2.12 Configuring Features On the Main Menu screen, select Features. Figure 2-20 Features Table 2-12 Description of features Parameter Description ● PWD Reset Enable: You can enable this function to reset password. The PWD Reset function is enabled by default. ● HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used.
Parameter Description Card No. Reverse When the Access Terminal connects to a third-party device through Wiegand input, and the card number read by the Access Terminal is in the reserve order from the actual card number, you need to turn on the Card No. Reverse function. Door Sensor NC: When the door opens, the circuit of the door sensor circuit is closed. NO: When the door opens, the circuit of the door sensor circuit is open.
2.13.1 Unlocking by Cards Place the card at the swiping area to unlock the door. 2.13.2 Unlocking by Face Verify the identity of an individual by detecting their faces. Make sure that the face is centered on the face detection frame. 2.13.3 Unlocking by User Password Enter the user ID and password to unlock the door. Step 1 Step 2 Tap on the standby screen. tap PWD Unlock, and then enter the user ID and password. Step 3 Tap Yes. 2.13.
that supports fingerprint unlocking. 2.14 Viewing Unlock Logs View or search door unlocking logs. On the main menu, tap Record. 2.15 System Information You can view data capacity and device version. 2.15.1 Viewing Data Capacity On the Main Menu, select System Info > Data Capacity, you can view storage capacity of each data type. 2.15.2 Viewing Device Version On the Main Menu, select System Info > Data Capacity, you can view the device version, such as serial No., software version and more.
3 Web Operations On the webpage, you can also configure and update the Access Controller. Web configurations differ depending on models of the Access Controller. 3.1 Initialization Initialize the Access Controller when you log in to the webpage for the first time or after the Access Controller is restored to the factory defaults. Prerequisites Make sure that the computer used to log in to the webpage is on the same LAN as the Access Controller.
Figure 3-1 Login Step 2 Enter the user name and password. ● The default administrator name is admin, and the password is the one you set up during initialization. We recommend you change the administrator password regularly to increase security. ● If you forget the administrator login password, you can click Forget password? For details, see "3.3 Resetting the Password". Step 3 Click Login. 3.3 Resetting the Password Reset the password through the linked e-mail when you forget the admin password.
Figure 3-2 Reset password ● Up to two security codes will be generated when the same QR code is scanned. If the security code becomes invalid, refresh the QR code and scan again. ● After you scan the QR code, you will receive a security code in your linked e-mail Step 4 address. Use the security code within 24 hours after you receive it. Otherwise, it will become invalid. ● If the wrong security code is entered in a row, the administrator account will be frozen for 5 minutes. Enter the security code.
Figure 3-3 Door parameter Table 3-1 Description of door parameters Parameter Description Name Enter a name of the door. Set the door status. ● NO: The door remains unlocked all the time. State ● NC: The door remains locked all the time. ● Normal: If Normal is selected, the door will be unlocked and locked according to your settings. Opening Method ● Unlock by Period: Set different unlock methods for different periods.
Parameter Description Duress Alarm An alarm will be triggered when a duress card or duress password is used to unlock the door. Door Sensor Intrusion and overtime alarms can be triggered only after Door Sensor is enabled. Intrusion Alarm When Door Sensor is enabled, an intrusion alarm will be triggered if the door is opened abnormally. Overtime Alarm A timeout alarm will be triggered if the door remains unlocked for longer time than the Timeout (Sec).
Figure 3-5 Group Combination 4. In the User List area, click Add User, enter the user ID of existing users. VIP, patrol, and blocklist users cannot be added. Valid users in all groups must verify their identities to grant access in the group order. 5. Click OK. ◇ ◇ ● Unlock mode 1. In the Opening Method list, select Group Combination, and then click . 2. In the Combination list, select Or or And. ◇ ◇ And means you must use all the selected methods to open the door.
Turn on SIP Server and keep other parameters as default. Figure 3-6 Use the Access Controller as the SIP server ● Use another VTO as the SIP server: 1. Do not enable SIP server. Select VTO from the Server Type. 2. Configure the parameters, and then click Save. Figure 3-7 Use VTO as the SIP server Table 3-2 SIP server configuration Parameter Description IP Address IP address of the platform. Port ● 5060 by default when VTO work as SIP server. ● 5080 by default when the platform works as SIP server.
Parameter Description SIP Domain VDP. SIP Server Username SIP Server Password The login username and password of the SIP server. ● Use the DSS Express or DSS pro as the SIP server. Do not enable SIP server. Select Express/DSS from the Server Type. Figure 3-8 Use DSS Express or DSS pro as the SIP server Table 3-3 SIP server configuration Parameter Description IP Address IP address of the platform. Port ● 5060 by default when VTO work as SIP server.
Parameter Description Alternate VTS IP Addr. Enter the IP address of the alternate VTS. When the management platform does not respond, the alternate VTS will be activated to make sure VTO, VTH and VTS can still realize video intercom function. Step 3 Click OK. 3.5.2 Configuring Basic Parameters Configure the basic information of VTO, such as device type and device number. Step 1 Select Talkback > Local. Step 2 Configure the parameters. ● Use the Access Controller as the SIP server.
Parameter Description The number of the VTO. VTO No. ● The number must have four digits. The first two digits are 80, and the last two digits start from 01. Take 8001 for example. ● If multiple VTOs exist in the one unit, the VTO No. cannot be repeated. Centre Call No. The default phone number for the management center is 888888. Keep it as default. Transmission Mode Mode 1 is selected by default. ● Use the Platform (DSS Express or DSS Pro) as the SIP Server.
3.5.3 Adding the VTO When the Access Controller functions as the SIP Server and you have other VTOs, you need to add other VTOs to the SIP server to make sure they can call each other. Step 1 On the webpage of the Access Controller, select Talkback setting > VTO No. Management. Step 2 Click Add, and then configure the VTO. Figure 3-12 Add VTO Table 3-7 Add VTO configuration Parameter Description Rec No. The number of the added VTO.
SIP server to make sure they can call each other. Background Information ● When there are main VTH and extension, you need to turn on the group call function first and then add main VTH and extension on the VTH Management page. For how to turn on the group call function, refer to "3.5.2 Configuring Basic Parameters". ● Extension cannot be added when the main VTHs are not added. Step 1 On the home page, select Talkback setting > Room No. Management. Step 2 Add the VTH. ● Add individually 1. Click Add. 2.
Table 3-8 Room information Parameter Description Enter the room number of the VTH. ● The room number consists of 1-5 digits, and must conform to the configured room number on the VTH. ● When there are main VTH and extensions, the room number of main VTH ends with -0 and the room number Room No. of extension ends with -1, -2 or -3. For example, the main VTH is 101-0, and the room number of the extension is 101-1, 101-2...
Step 2 Click Add and set parameters. Figure 3-15 VTS management Step 3 Click OK. 3.5.6 Viewing Device Status When the Access Controller works as the SIP Server, you can view the status of devices that are connected the SIP server. On the Homepage, select Talkback setting > Status. 3.5.7 Viewing Call Logs View all the record of outgoing calls and incoming calls. On the Homepage, select Talkback setting > Call. 3.
Figure 3-16 Time section parameters Step 4 Enter No. and name for the time section. ● No.: Enter a section number It ranges from 0 through 127. ● Name: Enter a name for each time section. You can enter a maximum of 32 characters Step 5 (contain number, special characters and English characters). Configure time sections for each day. Step 6 You can configure up to four time sections for a single day. Step 7 (Optional) Click Apply to the whole week to copy the configuration to the rest of days.
section. You can enter a maximum of 32 characters (contain numbers, special characters and English characters). ● Time Section: Select the start time and end time of the holiday. Step 5 Click OK. You can add multiple holidays in a holiday group. Step 6 Click OK. 3.6.3 Configuring Holiday Plans Assign the configured holiday groups to the holiday plan. Users can only unlock the door in the defined time in the holiday plan. Step 1 Log in to the webpage. Step 2 Select Time Section > Holiday Plan Config.
Log in to the webpage and select Data Capacity. 3.8 Configuring Video and Image Configure video and image parameters, such as stream and brightness. We recommend you use the default parameters in this section. 3.8.1 Configuring Video On the home page, select Video Setting, and then configure the video stream, status, image and exposure. ● Video Standard: Select NTSC. ● Channel Id: Channel 1 is for configurations of visible light image. Channel 2 is for configurations of infrared light image.
Table 3-11 Date rate description Parameter Description When the Access Controller functions as the a VTO and connects the VTH, the Video Format acquired stream limit of VTH is 720p.When resolution is changed to 1080p, the call and monitor function might be affected. Main Format Sub Stream Step 4 Frame Rate The number of frames (or images) per second. The frame rate range is 1–25 fps. Bitrate It indicates the amount of data transmitted over an internet connection in a given amount of time.
Table 3-12 Image description Parameter Description Contrast Contrast is the difference in the luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the color contrast will be. Hue Refers to the strength or saturation of a color. It describes the color intensity, or how pure it is. Saturation Color saturation indicates the intensity of color in an image. As the saturation increases, the appear stronger, for example being more red or more blue.
Figure 3-21 Exposure Table 3-13 Exposure parameter description Parameter Description Set anti-flicker to reduce flicker and decrease or reduce uneven colors or exposure. ● 50Hz: When the mains power supply is 50 Hz, the exposure is Anti-flicker automatically adjusted to prevent the appearance of horizontal lines. ● 60Hz: When the mains power supply is 60 Hz, the exposure is automatically adjusted to reduce the appearance of horizontal lines.
Parameter Description Shutter Shutter is a component that allows light to pass for a determined period. The higher the shutter speed, the shorter the exposure time, and the darker the image. Gain When the gain value range is set, video quality will be improved. Exposure Compensation You can make a photo brighter or darker by adjusting exposure compensation value. 3D NR When 3D Noise Reduction (RD) is turned on, video noise can be reduced to ensure high definition videos.
Parameter Description ● Close: Back-light compensation is turned off. ● Backlight: Black-light compensation automatically brings more light to darker areas of an image when bright light shining from behind obscures it. ● Wide dynamic: The system dims bright areas and Backlight Mode compensates for dark areas to ensure to create a balance to improve the overall image quality.
Parameter Description You can set the exposure to adjust image brightness. ● Auto: The Access Controller automatically adjusts the brightness of images. ● Shutter Priority: The Access Terminal will adjust image brightness according to shutter exposure range. If the image brightness is not enough and the shutter value has reached its upper or lower limit, the Access Controller will adjust the gain Exposure Mode value automatically for ideal brightness level.
Figure 3-24 Face detect Step 3 Configure the parameters. Table 3-16 Description of face detection parameters Parameter Description Face Threshold Adjust the face recognition accuracy. Higher threshold means higher accuracy. Max. Angle of Face Set the maximum face pose angle for face detection. Larger value means larger face angle range. If the face pose angle is out of the defined range, the face detection box will not appear.
Parameter Description Invalid Face Prompt Interval (S) If a person without access permission attempts to unlock the door for several times in the defined interval, the Access Controller will prompt face recognition failure. You can enter the prompt interval time. Pupillary Distance Face images require desired pixels between the eyes (called pupillary distance) for successful recognition. The default pixel is 45. The pixel changes according to the face size and the distance between faces and the lens.
Only when the size of the face is larger than the defined size, the face can be detected Step 6 by the Access Controller. Click OK. 3.10 Configuring Network 3.10.1 Configuring TCP/IP You need to configure IP address of Access Controller to make sure that it can communicate with other devices. Step 1 Select Network Setting > TCP/IP. Step 2 Configure parameters. Figure 3-25 TCP/IP Table 3-17 Description of TCP/IP Parameter Description IP Version IPv4 MAC Address MAC address of the Access Controller.
Parameter Description Default Gateway IP address and gateway must be on the same network segment. Preferred DNS Set IP address of the preferred DNS server. Alternate DNS Set IP address of the alternate DNS server. Step 3 Click OK. 3.10.2 Configuring Port You can limit access to the Access Controller at the same through web, desktop client and phone. Step 1 Select Network Setting > Port. Step 2 Configure port numbers.
Step 3 Click OK. 3.10.3 Configuring Automatic Registration The Access Controller reports its address to the designated server so that you can get access to the Access Controller through the management platform. Step 1 On the home page, select Network Setting > Register. Step 2 Enable the automatic registration function and configure the parameters. Figure 3-27 Register Table 3-19 Automatic registration description Parameter Description Host IP The IP address or the domain name of the server.
Figure 3-28 Cloud service Step 3 Click OK. Related Operations Download DMSS and sign up, you can scan the QR code through DMSS to add the Access Controller to it. 3.10.5 Configuring Serial Port Step 1 On the home page, select Network Setting > Wiegand serial port setting. Step 2 Select a port type. Figure 3-29 Serial port ● Select Reader when the Access Controller connects to a card reader.
Controller will send data to the Access Controller to control access. Output Data type: ◇ Card: Outputs data based on card number when users swipe card to unlock door; ◇ outputs data based on user's first card number when they use other unlock methods. No.: Outputs data based on the user ID. ● Select Reader (OSDP) when the Access Controller is connected to a card reader based on OSDP protocol. ● Security Module: When a security module is connected, the exit button, lock will be not effective. 3.10.
3.11 Safety Management 3.11.1 Configuring IP Authority Step 1 Log in to the webpage. Step 2 Click Safety Mgmt. > IP Authority. Step 3 Select a cybersecurity mode from the Type list. ● Network Access: Set allowlist and blocklist to control access to the access controller. ● Prohibit PING: Enable PING prohibited function, and the access controller will not respond to the Ping request.
Figure 3-32 Add IP Step 5 Configure parameters. Table 3-21 Description of adding IP parameters Parameter Description Type Select the address type from the Type list. IP Version IPv4 by default. All Ports Select All Ports check box, and your settings will apply to all ports. Device Start Port If you clear All Ports check box, set the device start port and device end port. Device End Port Step 6 Click Save, and the IP Authority interface is displayed. Step 7 Click OK.
Figure 3-33 Prohibit PING Step 3 Click OK. 3.11.1.3 Anti Half Connection Step 1 Select the Anti Half Connection from the Type list. Step 2 Select the Enable check box. Step 3 Click OK. 3.11.2 Configuring System Step 1 Step 2 Log in to the web interface. Select Safety Mgmt. > System Service. Step 3 Enable or disable the system services as needed.
Table 3-22 Description of system service Parameter Description SSH Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. When SSH is enabled, SSH provides cryptographic service for the data transmission. PWD Reset Enable If enabled, you can reset the password. This function is enabled by default.
Figure 3-35 Create Server Certificate 3.11.2.2 Downloading Root Certificate Step 1 On the System Service page, click Download Root Certificate. Step 2 Double-click the file that you have downloaded, and then click Open. Figure 3-36 File download Step 3 Click Install Certificate.
Figure 3-37 Certificate information Step 4 Select Current User or Local Machine, and then click Next. Figure 3-38 Certificate import wizard (1) Step 5 Select the appropriate storage location. 1) Select Place all certificates in the following store.
2) Click Browse to import the certificate to the Trusted Root Certification Authorities store, and then click Next. Figure 3-39 Certificate Import Wizard (2) Step 6 Click Finish.
3.12 User Management You can add or delete users, change users' passwords, and enter an email address for resetting the password when you forget your password. 3.12.1 Adding Users You can add new users and then they can log in to the webpage of the Access Controller. Procedure Step 1 On the home page, select User Mgmt. > User Mgmt.. Step 2 Click Add, and enter the user information. ● The username cannot be the same with existing account.
identities verified through ONVIF protocol. The default ONVIF user is admin. Procedure Step 1 On the home page, select User Mgmt. > Onvif User. Step 2 Click Add and then configure parameters. Figure 3-42 Add ONVIF user Step 3 Click OK. 3.12.3 Viewing Online Users You can view online users who currently log in to the webpage. On the home page, select Online User. 3.13 Configuring Voice Prompts Set voice prompts during identity verification. Step 1 On the home page, select Audio Custom.
Figure 3-43 Maintenance Step 3 Set the time, and then click OK. Step 4 (Optional) Click Reboot Device, the Access Controller will restart immediately. 3.15 Configuration Management When more than one Access Controller need the same configurations, you can configure parameters for them by importing or exporting configuration files. 3.15.1 Exporting/Importing Configuration Files You can import or export the configuration file of the Access Controller.
Configuration file can only be imported to the device with the same model. 3.15.2 Restoring Factory Defaults Restoring the Access Controller to default configurations will cause data loss. Please be advised. Step 1 Select Config Mgmt. > Default Step 2 Restore factory defaults if necessary. ● Restore Factory: Resets configurations of the Access Controller and delete all data.
3.17 Viewing Version Information On the home page, select Version Info, and you can view version information, such as device model, serial number, hardware version, legal information and more. 3.18 Viewing Logs View logs such as system logs, admin logs, and unlock records. 3.18.1 System Logs View and search for system logs. Step 1 Log in to the webpage. Step 2 Select System Log > System Log. Step 3 Select the time range and the log type, and then click Query. Click Backup to download the system log.
4 Smart PSS Lite Configuration This section introduces how to manage and configure the Access Controller through Smart PSS Lite. You can also configure time attendance rules on the platform, such as shifts, modes, schedules and more. For details, see the user's manual of Smart PSS Lite. 4.1 Installing and Logging In Install and log in to Smart PSS Lite. For details, see the user manual of Smart PSS Lite.
Figure 4-1 Device information Table 4-1 Device parameters Description Parameter Description Device Name Enter a name of the Access Controller. We recommend you name it after its installation area. Method to add Select IP to add the Access Terminal by entering its IP Address. IP Enter IP address of the Access Controller. Port The port number is 37777 by default. User Name/Password Enter the username and password of the Access Terminal. Step 4 Click Add.
Figure 4-2 Auto search A device list will be displayed. Select a device, and then click Modify IP to modify its IP address. Step 3 Select the Access Controller that you want to add to Smart PSS Lite, and then click Add. Step 4 Enter the username and the password of the Access Controller. You can view the added Access Controller on the Devices page. The Access Controller automatically logs in to Smart PSS Lite after being added. Online is displayed after successful login. 4.
4.3.2 Adding Users 4.3.2.1 Adding Individually You can add users individually. Step 1 Log in to Smart PSS Lite. Step 2 Click Access Solution > Personnel Manger > User > Add. Step 3 Click Basic Info tab, and enter the basic information of the user, and then import the face image. Figure 4-3 Add basic information Step 4 Click the Certification tab to add certification information of the user. ● Configure password: The password must consist of 6–8 digits.
● Configure fingerprint. 1. On the Fingerprint area, click and select Fingerprint Scanner, and then click OK. 2. Click Add Fingerprint, press your finger on the scanner three times in a row. Figure 4-4 Add password, card, and fingerprint Step 5 Configure permissions for the user. For details, see "4.3.3 Assigning Access Permission". Step 6 Click Finish. 4.3.2.2 Adding in Batches You can add users in batches. Step 1 Log in to Smart PSS Lite. Step 2 Click Personnel Manger > User > Batch Add.
Figure 4-5 Add users in batches Table 4-2 Add users in batches parameters Parameter Description Start No. The user ID starts with the number you defined. Quantity The number of users you want to add. Department Select the department that the user belongs to. Effective Time/Expired Time The users can unlock the door within the defined period. Step 4 Click Issue. Step 5 The card number will be read automatically. Click OK. Step 6 On the User page, click to complete user information. 4.3.
Step 2 Click Access Solution > Personnel Manger > Permission configuration. Step 3 Step 4 Step 5 Click . Enter the group name, remarks (optional), and select a time template. Select the access control device. Step 6 Click OK. Figure 4-6 Create a permission group Step 7 Step 8 Click of the permission group you added. Select users to associate them with the permission group.
Figure 4-7 Add users to a permission group Step 9 Click OK. Users in the permission group can unlock the door after valid identity verification. 4.4 Access Management 4.4.1 Remotely Opening and Closing Door You can remotely monitor and control door through Smart PSS Lite. For example, you can remotely open or close the door. Procedure Step 1 Click Access Solution > Access Manager on the Home page. Step 2 Remotely control the door. ● Select the door, right click and select Open or Close.
Figure 4-8 Open door ● Click or to open or close the door. Related Operations ● Event filtering: Select the event type in the Event Info, and the event list displays the selected event type, such as alarm events and abnormal events. ● Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click to unlock. ● Event deleting: Click to clear all events in the event list. 4.4.
Click Stop Monitor, real-time access control events will not display. Figure 4-10 Monitor door status ● Show All Door: Displays all doors controlled by the Access Controller. ● Reboot: Restart the Access Controller. ● Details: View the device details, such as IP address, model, and status.
Appendix 1 Important Points of Intercom Operation The Access Controller can function as VTO to realize intercom function. Prerequisites The intercom function is configured on the Access Controller and VTO. Procedure Step 1 On the standby screen, tap Step 2 Enter the room No, and then tap .
Appendix 2 Important Points of QR Code Scanning ● Access Controller (with QR code scanning module): Place the QR code on your phone at a distance of 3 cm - 5 cm away from the QR code scanning lens. It supports QR code that is larger than 30 mm × 30 mm - 5 cm × 5 cm and less than 100 bytes in size. QR code detection distance differs depending on the bytes and size of QR code.
Appendix 3 Important Points of Fingerprint Registration Instructions When you register the fingerprint, pay attention to the following points: ● Make sure that your fingers and the scanner surface are clean and dry. ● Press your finger on the center of the fingerprint scanner. ● Do not put the fingerprint sensor in a place with intense light, high temperature, and high humidity. ● If your fingerprints are unclear, use other unlocking methods.
How to Press Your Fingerprint on the Scanner Appendix Figure 3-2 Correct placement Appendix Figure 3-3 Wrong placement 82
Appendix 4 Important Points of Face Registration Before Registration ● Glasses, hats, and beards might influence face recognition performance. ● Do not cover your eyebrows when wearing hats. ● Do not change your beard style greatly if you use the access controller; otherwise face recognition might fail. ● Keep your face clean.
Appendix Figure 4-1 Appropriate face position Requirements of Faces ● Make sure that the face is clean and forehead is not covered by hair. ● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image recording. ● With eyes open, without facial expressions, and make your face toward the center of camera. ● When recording your face or during face recognition, do not keep your face too close to or too far from the camera.
Appendix Figure 4-2 Head position Appendix Figure 4-3 Face distance ● When importing face images through the management platform, make sure that image resolution is within the range 150 × 300 pixels–600 × 1200 pixels; image pixels are more than 500 × 500 pixels; image size is less than 100 KB, and image name and person ID are the same. ● Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area, and the aspect ratio does not exceed 1:2.
Appendix 5 Cybersecurity Recommendations Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc.
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission.
Legal and Regulatory I nformation 1 .2.51 .32. 1 52 1 0-001 V2.0.0 Legal Considerations Video s u rve, l lance can be repulated by l aws that vary from cou ntry to ccuntry Check the l aws ,n you r loca region before us,ng th,s prod u ct for s u rve, l lance p u rposes Disclaimer , Restrictions of Haza rdous Substances (Ro HS) Directi ve 2011 /65/EU and its amending Directive (EU) 201 5/863 A copy of the original declaration of oonfonnity may be obtained from Dah u a Technology.