Product Chart
Table Of Contents
- Legal Information
- Symbol Conventions
- Regulatory Information
- Safety Instruction
- Available Models
- Chapter 1 Overview
- Chapter 2 Appearance
- Chapter 3 Installation
- Chapter 4 Wiring
- Chapter 5 Activation
- Chapter 6 Quick Operation
- Chapter 7 Basic Operation
- Chapter 8 Configure the Device via the Mobile Browser
- 8.1 Login
- 8.2 Search Event
- 8.3 User Management
- 8.4 Configuration
- 8.5 Door Operation
- Chapter 9 Quick Operation via Web Browser
- Chapter 10 Operation via Web Browser
- 10.1 Login
- 10.2 Forget Password
- 10.3 Live View
- 10.4 Person Management
- 10.5 Search Event
- 10.6 Configuration
- 10.6.1 Set Local Parameters
- 10.6.2 View Device Information
- 10.6.3 Set Time
- 10.6.4 Set DST
- 10.6.5 Change Administrator's Password
- 10.6.6 View Device Arming/Disarming Information
- 10.6.7 Network Settings
- 10.6.8 Set Video and Audio Parameters
- 10.6.9 Set Image Parameters
- 10.6.10 Access Control Settings
- 10.6.11 Card Settings
- 10.6.12 Set Privacy Parameters
- 10.6.13 Time and Attendance Settings
- 10.6.14 Set Biometric Parameters
- 10.6.15 Set Preference
- 10.6.16 Upgrade and Maintenance
- 10.6.17 Device Debugging
- 10.6.18 Log Query
- 10.6.19 Security Mode Settings
- 10.6.20 Certificate Management
- Chapter 11 Client Software Configuration
- 11.1 Configuration Flow of Client Software
- 11.2 Device Management
- 11.3 Group Management
- 11.4 Person Management
- 11.5 Configure Schedule and Template
- 11.6 Set Access Group to Assign Access Authorization to Persons
- 11.7 Configure Advanced Functions
- 11.8 Door Control
- Appendix A. Tips for Scanning Fingerprint
- Appendix B. Tips When Collecting/Comparing Face Picture
- Appendix C. Tips for Installation Environment
- Appendix D. Dimension
- Appendix E. Communication Matrix and Device Command
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN
RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATTER
PREVAILS.
Data Protecon
During the use of device, personal data will be collected, stored and processed. To protect data,
the development of Hikvision devices incorporates privacy by design principles. For example, for
device with facial recognion features, biometrics data is stored in your device with encrypon
method; for ngerprint device, only ngerprint template will be saved, which is impossible to
reconstruct a ngerprint image.
As data controller, you are advised to collect, store, process and transfer data in accordance with
the applicable data
protecon laws and regulaons, including without limitaon, conducng
security controls to safeguard personal data, such as, implemenng reasonable administrave and
physical security controls, conduct periodic reviews and assessments of the
eecveness of your
security controls.
DS-K1T321 Series Face Recognion Terminal
ii