User Manual ZKBioBL www.zkteco.
Important Statement Thank you for choosing our product. Before use, please read this manual carefully to avoid unwanted damages caused, ensuring high effectiveness and authentication speed under proper use. It is informed that without our company's written consent, no copy or any other forms of distribution of this guide's content may be allowed. The products described in the manual may contain copyrights shared by licensors including our company.
Contents Contents ................................................................................................................................................................................ 1 Necessity for ZKBioBL .................................................................................................................................................... 3 ZKBioBL Administrator Operating Procedures .............................................................................................
Device Management .................................................................................................................................................. 26 ZKBioBL Settings............................................................................................................................................................ 28 Setting App Password ....................................................................................................................................
Necessity for ZKBioBL Necessity for ZKBioBL IPhone with system above IOS 7.0, such as iPhone4S/iPhone5/iPhone5S/iPhone5C/iPhone6/iPhone6 plus/iPhone7/iPhone7 plus/iPhone8 iOS OS Requirement: 7.0 and above Android OS Requirement: 4.3 and above Bluetooth Requirement: Bluetooth 4.0 A lock with Bluetooth function, such as TL400B The app may not operate normally when a low battery warning is displayed on the lock.
ZKBioBL Administrator Operating Procedures Use phone to download and install ZKBioBL.
Connecting ZKBioBL with Lock Connecting ZKBioBL with Lock Note: Please confirm that the Bluetooth function on the Phone device is turned on before using ZKBioBL to connect with the lock. 1. Turn on ZKBioBL and click [BLE Lock] on the main interface to enter the devices listing interface; the app will automatically search for surrounding Bluetooth devices. Note: 1. When lock is not yet connected, click the Unlock button on the main interface, “Please connect to the lock first” will be displayed.
2. After the app searches for the lock, click the lock for connection on the device list and enter the correct Bluetooth connection password (the default connection password is 000000), and click [OK]: Note: If a wrong connection password is input, “Connection failed” will be shown. Click [OK] to re-enter the password for matching.
Connecting ZKBioBL with Lock After the device is connected to a lock, the LED green light of the fingerprint sensor will blink, and the app will return to the main interface automatically. You can see the connected devices list on the [BLE Lock] interface: Note: 1. The default privilege for ZKBioBL new users is “Invalid User”. Administrator requires to assign privileges for new users by using admin password. 2.
Setting Administrator After successfully connect the app with the lock, enter the [App Setting] interface and click [Supervisor password mode], and then enter the password (the default supervisor password is 12345678) and click [OK].
Setting Administrator Please note that the administrator is temporary at this stage; the user privilege is still Invalid User. You need to change privileges on the user information interface. Click the > at the top right corner, slide down the screen to refresh the user list, and select the user corresponding to your number and name on the user list.
Return to the user list interface, you can see your logo has been changed from Invalid User to Administrator. Icons Meanings Administrator Normal User Temporary User Invalid User App. User Fingerprint User Password User Card User Note: As shown in above figure, the user list needs to be refreshed by sliding down the screen so as to display the newly connected locks.
Unlocking the Door Unlocking the Door 1. If a lock is connected but the user privilege has not been changed, when clicking the open button, “Access Denied” will be displayed, as shown in figure 2. If a lock has not been connected, when clicking the open button, the app will automatically search for the surrounding BLE locks, if you haven’t connect the lock or your privilege can’t unlock the door “Access Denied” will be displayed, as shown in figure 3.
12
Visitor Password Visitor Password After setting administrator, enter the [Unlock] interface and click” Visitor password” to access the visitor password generation interface. Enter admin password of the lock, then click Create Visitor password button at the center, the visitor password is created done, and you can copy the code and send to others who are temporary users. Note: ·You must know the admin password. ·The visitor password is limited to use one time in 5 minutes.
14
Creating New Phone User Creating New Phone User Create new phone user by installing ZKBioBL on the phone device of other users. Administrator uses the app on the user’s phone device to connect to the lock, and enter admin password to assign privilege to the phone user (Admin, Normal User, and Temporary User), and also edit and save the user information (number and name). After setting, the phone user can use the app to carry out operation corresponding to the set privilege.
User Management Users can be classified into four types according to the creating methods: 1. Fingerprint User: users directly registered in the lock. 2. Card User: users directly registered in the lock. 3. Password User: users directly registered in the lock. 4. Phone User: users created by app. Administrator can manage all users who registered in the lock and phone users. To change user information and privilege and to allocate time table 1.
User Management 17
Pin: Default PIN denotes the user’s position in the system’s sequence. It should be numerical, which can be changed but cannot be duplicated. PIN ranges from 1 to 65534. Name: Default name denotes the user’s position in the system’s sequence. It can be changed to any numbers, letters or signs, with the maximum length of 24 characters. Privileges: Administrator, Normal User, Temporary User and Invalid User.
User Management user and temporary user can gain access anytime as well, but no other permissions are allowed; Invalid user cannot gain access anytime, no does he/she have other permissions. Registration Time: This denotes when the user registered on the lock or when the phone user was connected with the lock; it cannot be edited. Time table: The time table in which the user can gain access.
Note: For the procedure of deleting users in batches, please refer to the lock user manual.
Time table Management Time table Management Time table is set for regulating user’s valid access time. Each user must belong to one time table. Time Table: There are 12 time tables in the time table list, in which Time table 1 and 2 cannot be edited. Time table 1: It includes anytime on every day, which means users applying this time table can gain access anytime. Time table 2: It does not include any time, which means users applying this time table cannot gain access anytime.
To Edit Timetable 1. Click in the “Time Table”, and select any time table from the 10 editable time tables; 2. Choose on which day can users gain access (multiple selection is enabled), for example, select “Sun” and “Mon” for allowing users to unlock the door on Sunday and Monday; 3. Set the start time and end time for each day, and then click [Done].
Time table Management To Allocate Timetable 1.
Note: Only Normal User and Temporary User can choose time table; administrator uses Time table 1 and it is unchangeable. 2. Return to the time table setting interface, and click Save to upload the time table settings to the lock. After uploading successfully, the lock will beep and the fingerprint sensor will be activated. Note: You can also allocate the time table in User Management.
Checking Access Record Checking Access Record Administrator can check all access records after entering the [Records] interface; all access records within 7 days will be shown. It supports searching for records within 30 days by choosing the date manually. It also supports quick search for records of a user or within a time period by inputting user name or ID.
Device Management When administrator enters the [Setting] menu (as the below figure), he/she can change the Admin password of the app, Lock name, and Pairing password. He/she can set the always open mode. Note: A lock can only have one connection password. Once the password is changed, the connection password for all app users is also changed.
Device Management Admin Password: The default supervisor password is 12345678. After changing the admin password, a new password needs to be entered in supervisor password verification. The password should be in 8 digits. Lock Name: Lock name, which is ZKBiolock as default. The lock name cannot be blanked; it supports at most 10 letters or numbers. After change, “Update Finish. BLE lock will disconnect soon!” will be displayed.
ZKBioBL Settings Setting App Password After turning on and setting the app password, only after the password verification for turning on ZKBioBL succeeds can the user continues to use the app.
ZKBioBL Settings One touch to Open The major function of One touch to open is to simplify the access procedure. Turn on the One touch to Open function and click open on the main interface, the app will automatically search the surrounding for lock devices which have been ever connected, and automatically matches with Bluetooth password and open the door.
Enable APP Login Increase a step of verify code to enhance security for the app. Note: 1. If the connection password is changed, the password needs to be re-entered when using One touch to Open. 2. When “One touch to Open” function is enabled, after then Bluetooth name is changed and the Bluetooth is disconnected, the system will automatically search for lock devices which have been ever connected and connect with one of them. This device complies with part 15 of the FCC Rules.
31