User Manual 5/7-inch Linux Visible Light Product Version: 1.
Important Statement Thank you for choosing our product. Before using this product, please read this user manual carefully to avoid risks of danger to the users of this product or those nearby and damaging the device. Follow these instructions to ensure that your product functions properly and completes verifications in a timely manner.
About This Manual This manual introduces the operations, interfaces and functions of Linux Visible Light Product. For installation, please refer to the Quick Start Guide of the product accordingly. Features and parameters with ★ are not available in all devices. All pictures shown are for illustration purpose only. Pictures in this manual may not be exactly consistent with the actual products.
Contents 1 Notice for Use ............................................................................................................................................................................................................................... 1 1.1 Finger Positioning★................................................................................................................................................................................................. 1 1.
7.4 Punch State Options★ .......................................................................................................................................................................................... 45 7.5 Shortcut Key Mappings★ ................................................................................................................................................................................... 47 8. Data Management ....................................................................
1 Notice for Use 1.1 Finger Positioning★ Recommended fingers: index, middle, or ring fingers; avoid using the thumb or pinky, as they are difficult to accurately press onto the fingerprint reader. Proper fingerprint placement: Press your finger onto the fingerprint reader. Ensure that the center of your finger is aligned with the fingerprint reader.
Note: During enrolment and verification, please remain natural facial expression and standing posture. 1.3 Face Registration Try to keep the face in the center of the screen during registration. Please face the camera and stay still during face registration.
1.4 Standby Interface After connecting the power supply, enter the following standby interface: Notes: 1. Click to enter the User ID input interface. 2. When there is no super administrator set in the device, click to enter the menu. After setting the super administrator, it requires the super administrator’s verification before entering the menu operation. For the security of the device, it is recommended to register super administrator the first time you use the device. 3.
Press the corresponding shortcut key to select the current punch state, which is shown in green. Please refer to "7.5 Shortcut Key Mappings" below for the specific operation method.
1.5 Virtual Keyboard . Note: The device supports the input of English, numbers and symbols. Click [En] to switch to English keyboard. Press [123] to switch to the numeric and symbolic keyboard, and click [ABC] to return to the alphabetic keyboard. Click the input box, virtual keyboard appears. Click [ESC] to exit the input.
1.6 Verification Mode 1.6.1 Fingerprint Verification★ 1: N fingerprint verification mode Compares the fingerprint that is being pressed onto the fingerprint reader with all of the fingerprint data that is stored in the device. The device will enter the fingerprint authentication mode when a user presses his/her finger onto the fingerprint scanner. Please follow the correct way to place your finger onto the sensor. For details, please refer to section 1.1 Finger Positioning. Verification is successful.
Verification is failed. 1: 1 fingerprint verification mode Compares the fingerprint that is being pressed onto the fingerprint reader with the fingerprints that are linked to User ID input via the virtual keyboard. Users may try verifying their identities with 1:1 verification mode when they cannot gain access with 1: N authentication method. Click the button on the main screen to enter 1:1 fingerprint verification mode. 1. Input the user ID and press [OK].
If the user has registered face and password in addition to his/her fingerprints and the verification method is set to fingerprint/ password/ face verification, the following screen will appear. Select the fingerprint icon fingerprint verification mode. 2. Press the fingerprint to verify.
3. Verification is successful. 4. Verification is failed.
1.6.2 Password Verification Compare the entered password with the registered User ID and password. Click the 1. button on the main screen to enter the 1:1 password verification mode. Input the user ID and press [OK]. If an employee registers face and fingerprint in addition to password, the following screen will appear. Select the icon to enter password verification mode.
2. Input the password and press [OK].
Verification is successful. Verification is failed.
1.6.3 Facial Verification 1:N face verification Compare the acquired facial images with all face data registered in the device. The following is the pop-up prompt box of comparison result. 1:1 face verification Compare the face captured by the camera with the facial template related to the entered user ID. Press 1. on the main interface and enter the 1:1 facial verification mode. Enter the user ID and click [OK].
If an employee registers password and fingerprint in addition to face, the following screen will appear. Select the icon to enter face verification mode. After successful verification, the prompt box "successfully verified" will appear.
If the verification is failed, it will prompts “Please adjust your position!”.
1.6.4 Combined Verification★ To increase security, this device offers the option of using multiple forms of verification methods. A total of 11 different verification combinations can be used, as shown below: Notes: 1) "/" means “or”, and "+" means “and”. 2) You must register the required verification information before using the combination verification mode, otherwise the verification may fail.
2 Main Menu Press on the initial interface to enter the main menu, as shown below: Items User Mgt. User Role COMM. System Descriptions To add, edit, view, and delete basic information about a user. To set the permission scope of the custom role and enroller★, that is, the rights to operate the system. To set the relevant parameters of network, PC connection, cloud server and Wiegand.
Autotest System Info To automatically test whether each module functions properly, including the LCD, voice, fingerprint sensor★, camera and real-time clock. To view data capacity, device and firmware information of the current device. 3 User Management 3.1 Adding Users Click User Mgt. on the main menu. Click New User. Register a User ID and Name Enter the user ID and name. Notes: 1) A user name may contain 17 characters. 2) The user ID may contain 1-9 digits by default.
4) If a message "Duplicated ID" pops up, you must choose another ID. Setting the User Role There are two types of user accounts: the normal user and the super admin. If there is already a registered administrator, the normal users have no rights to manage the system and may only access authentication verifications. The administrator owns all management privileges. If a custom role is set, you can also select user defined role permissions for the user.
Press the same finger on the fingerprint reader three times. Green indicates that the fingerprint was enrolled successfully.
Register face Click Face to enter the face registration page. Please face the camera and stay still during face registration. The registration interface is as follows: Register password Click Password to enter the password registration page. Enter a password and re-enter it. Click OK. If the two entered passwords are different, the prompt "Password not match" will appear.
Note: The password may contain one to eight digits by default. Register user photo When a user registered with a photo passes the authentication, the registered photo will be displayed. Click User Photo, click the camera icon to take a photo. The system will return to the New User interface after taking a photo. Note: While registering a face, the system will automatically capture a picture as the user photo.
3.2 Search for Users Click the search bar on the user list and enter the retrieval keyword (The keyword may be an ID, surname or full name.). The system will search for the users related to the information.
3.3 Edit Users Choose a user from the list and click Edit to enter the edit user interface: Note: The operation of editing a user is the same as that of adding a user, except that the user ID cannot be modified when editing a user. Operation method refers to "3.1 new users". 3.4 Deleting Users Choose a user from the list and click Delete to enter the delete user interface. Select the user information to be deleted and click OK. Note: If you select Delete User, all information of the user will be deleted.
4 User Role If you need to assign some specific permissions to certain users, you may edit the “User Defined Role” under the User Role menu. You may set the permission scope of the custom role (up to 3 roles) and enroller★, that is, the permission scope of the operation menu. Click User Role on the main menu interface. 1. Click any item to set a defined role. Click the row of Enable Defined Role to enable this defined role. Click Name and enter the name of the role.
2. Click Define User Role to assign the privileges to the role. The privilege assignment is completed. Click Return. Note: During privilege assignment, the main menu is on the left and its sub-menus are on the right. You only need to select the features in sub-menus. If the device has a role enabled, you may assign the roles you set to users by clicking User Mgt. > New User > User Role.
If no super administrator is registered, the device will prompt "Please enroll super admin first!” after clicking the enable bar.
5 Communication Settings Set parameters of the network, PC connection, cloud server and Wiegand. Tap COMM. on the main menu. 5.1 Network Settings When the device needs to communicate with a PC over the Ethernet, you need to configure network settings and ensure that the device and the PC are connecting to the same network segment. Click Ethernet on the Comm. Settings interface.
Item IP Address Subnet Mask Gateway DNS TCP COMM. Port DHCP Display in Status Bar Descriptions The factory default value is 192.168.1.201. Please adjust them according to the actual network situation. The factory default value is 255.255.255.0. Please adjust them according to the actual network situation. The factory default address is 0.0.0.0. Please adjust them according to the actual network situation. The factory default address is 0.0.0.0. Please adjust them according to the actual network situation.
5.2 PC Connection To improve the security of data, please set a Comm Key for communication between the device and the PC. If a Comm Key is set, this connection password must be entered before the device can be connected to the PC software. Click PC Connection on the Comm. Settings interface. Item Comm Key Descriptions Comm Key: The default password is 0, which can changed. The Comm Key may contain1-6 digits. Identity number of the device, which ranges between 1 and 254.
5.3 Cloud Server Setting This represents settings used for connecting with the ADMS server. Click Cloud Server Setting on the Comm. Settings interface. Item Enable Domain Name Disable Domain Name Description When this function is enabled, the domain name mode “http://...” will be Server Address used, such as http://www.XYZ.com, while “XYZ” denotes the domain name when this mode is turned ON. Server Address IP address of the ADMS server. Server Port Port used by the ADMS server.
Wiegand input Item Descriptions Wiegand Format Values range from 26 bits, 34 bits, 36 bits, 37 bits, and 50 bits. Wiegand Bits Number of bits of Wiegand data. Pulse Width(us) Pulse Interval(us) ID Type The value of the pulse width sent by Wiegand is 100 microseconds by default, which can be adjusted within the range of 20 to 100 microseconds. The default value is 1000 microseconds, which can be adjusted within the range of 200 to 20000 microseconds. Select between User ID and badge number.
Consists of 26 bits of binary code. The 1st bit is the even parity bit of the 2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th bits. The 2nd to 25th bits are the card numbers. ESSSSSSSSCCCCCCCCCCCCCCCCO Wiegand26a Consists of 26 bits of binary code. The 1st bit is the even parity bit of the 2nd to 13th bits, while the 26th bit is the odd parity bit of the 14th to 25th bits. The 2nd to 9th bits are the site codes, while the 10th to 25th bits are the card numbers.
“C “denotes the card number; “E” denotes the even parity bit; “O” denotes the odd parity bit; “F“ denotes the facility code; “M” denotes the manufacturer code; “P” denotes the parity bit; and “S” denotes the site code. Wiegand output Item Descriptions Wiegand Format Wiegand output bits Failed ID Site Code Pulse Width(us) Values range from 26 bits, 34 bits, 36 bits, 37 bits, and 50 bits.
6 System Settings Set related system parameters to optimize the performance of the device. Click System on the main menu interface. 6.1 Date and Time Click Date Time on the System interface.
1. You can manually set date and time and click Confirm to save. 2. Click 24-Hour Time to enable or disable this format and select the date format. ★3. Click Daylight Saving Time to enable or disable the function. If enabled, select a daylight saving mode and set the switch time.
Week mode Date mode When restoring the factory settings, the time (24-hour) and date format (YYYY-MM-DD) can be restored, but the device date and time cannot be restored. Note: For example, the user sets the time of the device (18:35 on March 15, 2019) to 18:30 on January 1, 2020. After restoring the factory settings, the time of the equipment will remain 18:30 on January 1, 2020. 6.2 Attendance/Access Logs Setting Click Attendance/Access Logs Setting on the System interface.
Display User Photo Whether to display the user photo when the user passes verification. Alphanumeric User ID Whether to support letters in a User ID. Attendance Log Alert/ Access Logs Warning Cyclic Delete ATT Data/Access Records Cyclic Delete ATT Photo Cyclic Delete Blacklist Photo When remaining record space reaches a set value, the device will automatically display a remaining record memory warning. Users may disable the function or set a valid value between 1 and 9999.
Item Description Under 1:N verification mode, the verification will only be successful when the similarity between the acquired facial image and all registered facial templates is 1:N Match Threshold greater than the set value. The valid value ranges from 65 to 120. The higher the thresholds set, the lower the misjudgment rate, the higher the rejection rate, and vice versa.
6.4 Fingerprint Parameters★ Click Fingerprint on the System interface. Recommended matching FRR Item 1:1 Match Threshold 1:N Match Threshold thresholds FAR 1:N 1:1 High Low 45 25 Medium Medium 35 15 Low High 25 10 Descriptions Under 1:1 verification method, the verification will only be successful when the similarity between the acquired fingerprint data and the fingerprint template associated with the entered user ID enrolled in the device is greater than the set value.
Item Descriptions Show for enroll: to display the fingerprint image on the screen only during enrollment. Show for match: to display the fingerprint image on the screen only during verification. Always show: to display the fingerprint image on screen during enrollment and verification. None: not to display the fingerprint image. 6.5 Factory Reset Restore the device, such as communication settings and system settings, to factory settings (Do not clear registered user data).
7. Personalize Settings You may customize interface settings, voice, bell, punch state options and shortcut key mappings★. Click Personalize on the main menu interface. 7.1 Interface Settings You can customize the display style of the main interface. Click User Interface on the Personalize interface.
Item Description Wallpaper To select the main screen wallpaper according to your personal preference. Language To select the language of the device. Menu Screen Timeout (s) When there is no operation, and the time exceeds the set value, the device will automatically go back to the initial interface. You can disable the function or set the value between 60 and 99999 seconds. Idle Time To Slide When there is no operation, and the time exceeds the set value, a slide show will be Show (s) played.
7.2 Voice Settings Click Voice on the Personalize interface. Item Description Voice Prompt Select whether to enable voice prompts during operating. Touch Prompt Select whether to enable keypad sounds. Volume Adjust the volume of the device; valid value: 0-100. 7.3 Bell Schedules★ Click Bell Schedules on the Personalize interface. Add a bell 1.
Item Description Bell Status Set whether to enable the bell status. Bell Time At this time of day, the device automatically rings the bell. Repeat Set the repetition cycle of the bell. Ring Tone Select a ring tone. Internal bell delay(s) Set the duration of the internal bell. Valid values range from 1 to 999 seconds. 2. Back to the Bell Schedules interface, click All Bell Schedules to view the newly added bell. Edit a bell On the All Bell Schedules interface, tap the bell to be edited.
Item Description To select a punch state mode, which can be: Off: To disable the punch state key function. The punch state key set under Shortcut Key Mappings menu will not work. Manual Mode: To switch the punch state key manually; the attendance status will be automatically reset after timeout. Auto Mode: The punch state key will switch to a specified status according to the Punch State Mode predefined schedule set under Shortcut Key Mappings.
7.5 Shortcut Key Mappings★ Users may define shortcuts as attendance status or functional keys. On the main interface, when the shortcut keys are pressed, the corresponding attendance status or function interface will quickly display. Click Shortcut Key Mappings on the Personalize interface. 1. Click the shortcut key to enter the shortcut key setting interface, and select the function as punch state key or function key (such as new user, all users, etc.
2. If the key is defined as a function key, the setting is completed; If set to a punch state key, set the punch state value (valid value 0~250), the name and switch time. How to set the switch time? The switch time is used in conjunction with the punch state options. When the punch state mode is set to auto mode, the switch time should be set.
Note: When the function is set to Undefined, the device will not enable the punch state key.
8. Data Management To delete the relevant data in the device. Click Data Mgt. on the main menu interface. 8.1 Delete Data Click Delete Data on the Data Mgt. interface.
Item Description Delete Attendance Data/Access To delete attendance data/access records conditionally. Records Delete Attendance Photo Delete Blacklist Photo To delete attendance photos of designated personnel. To delete the photos taken during verifications which are failed. Delete All Data To delete information and attendance logs/access records of all registered users. Delete Admin Role To remove administrator privileges. Delete Access Control To delete all access data.
all data with the period. Select Delete by Time Range. 52 Linux Visible Light Product User Manual Set the time range and click OK.
9. Access Control Access Control is used to set the schedule of door opening, locks control and other parameters settings related to access control. Click Access Control on the main menu interface. To gain access, the registered user must meet the following conditions: 1. The current door unlock time should be within any valid time zone of the user time period. 2.
9.1 Access Control Options To set the parameters of the control lock of the terminal and related equipment. Click Access Control Options on the Access Control interface. Item Gate control mode ★ Description Whether to turn on the gate control mode or not, when set to ON, on this interface will remove Door lock relay, Door sensor relay and Door sensor type function. Door Lock Delay (s) The length of time that the device controls the electric lock to be unlock.
triggered due to failed verifications. Door available time period★ To set time period for door, so that the door is available only during this. Normal Close Time Scheduled time period for “Normal Close” mode, so that no one can gain access during Period this period. Normal Open Time Scheduled time period for “Normal Open” mode, so that the door is always unlocked Period during this period. When setting up the master and slave, the status of the master can be set to out or in.
2. Click the date on which time zone settings is required. Enter the starting and ending time, and then press OK.
Notes: 1. When the ending time is earlier than the starting time, such as 23:57~23:56, it indicates that access is prohibited all day; when the ending time is later than the starting time, such as 00:00~23:59, it indicates that the interval is valid. 2. The effective time period to unlock the door: open all day (00:00~23:59) or when the ending time is later than the starting time, such as 08:00~23:59. 3. The default time zone 1 indicates that door is open all day long. 9.
Add a New Holiday Click Add Holiday on the Holidays interface and set the holiday parameters. Edit a Holiday On the Holidays interface, select a holiday item to be modified. Click Edit to modify holiday parameters. Delete a Holiday On the Holidays interface, select a holiday item to be deleted and click Delete. Click OK to confirm deletion. After deletion, this holiday is no longer displayed on All Holidays interface. 9.
Add a New Group Click New Group on the Access Groups interface and set access group parameters. Note: 1. There is a default access group numbered 1, which cannot be deleted, but can be modified. 2. A number cannot be modified after being set.
3. When the holiday is set to be valid, personnel in a group may only open the door when the group time zone overlaps with the holiday time period. 4. When the holiday is set to be invalid, the access control time of the personnel in a group is not affected during holidays. Edit a Group On the All Groups interface, select the access group item to be modified. Click Edit and modify access group parameters.
Examples: The door-unlocking combination 1 is set as (01 03 05 06 08), indicating that the unlocking combination 1 consists of 5 people, and the 5 individuals are from 5 groups, namely, access control group 1 (AC group 1), AC group 3, AC group 5, AC group 6, and AC group 8, respectively.
Item Alarm on 1:1 Match Description When a user uses any fingerprint to perform the 1:1 verification, an alarm signal will be generated, otherwise there will be no alarm signal. Alarm on 1:N When a user uses any fingerprint to perform 1:N verification, an alarm signal will be Match generated, otherwise there will be no alarm signal.
10. USB Manager★ You can import user information, access data and other data from a USB drive to computer or other devices. Before uploading or downloading data from or to the USB drive, insert the USB drive into the USB slot first. Click USB Manager on the main menu interface. 10.
10.2 Upload Item Descriptions Screen To upload a screen saver from a USB drive to the device. Before uploading, you may select Upload Saver selected picture or Upload all pictures. To upload a wallpaper from a USB drive to the device. Before uploading, you may select Upload Wallpaper selected picture or Upload all pictures. The images will be displayed on the screen after manual settings. User Data To upload all user information from a USB drive to the device.
11. Attendance Search When the identity of a user is verified, the attendance/access record will be saved in the device. This function enables users to check their attendance/access logs. Click Attendance Search on the main menu interface. The process of searching for attendance and blacklist photos is similar to that of searching for attendance/access records. The following is an example of searching for attendance/access records. On the Attendance Search interface, click Attendance/Access Record.
1. Enter the user ID to be searched and click OK. If you 2. Select the time range in which the records you want want to search for records of all users, click OK without to search for. entering any user ID.
3. The record search succeeds. Click the record in 4. The below figure shows the details of the selected green to view its details. record.
12. Autotest To automatically test whether all modules in the device function properly, which include the LCD, voice, fingerprint sensor★, camera and real-time clock (RTC). Click Autotest on the main menu interface. Item Test All Test LCD Test Voice Test Fingerprint Sensor★ Camera testing Test Clock RTC 68 Description To automatically test whether the LCD, audio, camera and RTC are normal.
13. System Information With the system information option, you can view the storage status, the version information of the device, and so on. Click System Info on the main menu interface. Item Description Displays the current device's user storage, password, fingerprint★ and face storage, Device Capacity administrators, attendance/access records, attendance and blacklist photos, and user photos.
14. Connect to ZKBioSecurity Software 14.1 Set the Communication Address Device side 1. Click COMM. > Ethernet in the main menu to set IP address and gateway of the device. (Note: The IP address should be able to communicate with the ZKBioSecurity server, preferably in the same network segment with the server address) 2. In the main menu, click COMM. > Cloud Server Setting to set the server address and server port. Server address: Set as the IP address of ZKBioSecurity server.
14.2 Add Device on the Software Add device by searching. The process is as follows: 1) Click Access Control > Device > Search Device, to open the Search interface. 2) Click Search, and it will prompt [Searching……]. 3) After searching, the list and total number of access controllers will be displayed. 4) Click Add after the device to complete adding. 14.3 Add Personnel on the Software 1.
2. After setting all parameters, click OK. Note: For other specific operations, please refer to ZKBioSecurity User Manual.
Statement on the Right to Privacy Dear Customers: Thank you for choosing this hybrid biometric recognition product, which was designed and manufactured by ZKTeco. As a world-renowned provider of core biometric recognition technologies, we are constantly developing and researching new products, and strive to follow the privacy laws of each country in which our products are sold. We Declare That: 1.
Eco-friendly Use This product's "eco-friendly use period" refers to the period during which this product will not leak toxic or hazardous substances, when used in accordance with the conditions in this manual. The eco-friendly use period indicated for this product does not include batteries or other components that are easily worn down and must be periodically replaced. The battery's eco-friendly use period is 5 years.
FCC warning: Any Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.