SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Preamble
This manual is for understanding how to use fingerprint device for
users,which is a device with color screen and access controller, as
well has attractive prospect .
This is device of fingerprint identification. You could download data
by linking to fingerprint device, as well select download by off-line,
desides, you also use for operation and administrate of full functional
time zone.
fingerprint device separately has fundamental form ,and advanced
form ,which has the function of disposing with camera.
Installation
Normally , we often install it on indoor wall ,because of avoiding
strong sunshine to harm fingerprint sensor.
Normally , we install device on wall with high of 1.4 meters.


                                          Fingerprint device

                     1.4m




Fingerprint device has metal trestle on back, use for installing it on
wall.


                                                               metal trestle




           use screw to install device             Making fingerprint device
           frame on wall.                          to be fixed on deivce frame.




                                         ·1·
connection methods of electric lock
method One:




connection methods of Anti-robbery bell




                                 ·2·
menu construction as follow below:
user administration                  device setup
      fingerprint register                basic setup
                                          advanced setup
      RF card register                    power management
      password register                   communication setup
      original sound transcribed          alarm setup
      photograph image                    setup of access control
                                          function of self-checking
U disk management
      download confirmation record          data checking
      download administration records            system info
      download user Info                         device info
      upload user Info                           advanced checkup
      upload messager notification               alarm restoration
      MP3 upload Mp3
startu p screen
after starting up fingerprint device, symbol will be showed a while,
which means device is working now.




Device screen on standing by ready will be displayed as below, which
will display current date and time. The clock is placed on left. If you
already set up the function of "setup of spare time inside " power
management' , it will run this function at specified time.




                                   ·3·
If machine leave unused specified time, this function will be started up.
Under the function of free time, you also press fingerprint or menu
button to operate different menu function.
user administration
under user administration , you also could add one new user or delete
existing users.




each user has own job No, as you add new user, firstly need to input
job NO. it will display unused job No on dvice, if you accept it , only
need you to press "confirmation".
If you want to use other job No, you also can input appointed Number
by pressing figure keys. 0 in front of Number no need to press, if you
want to input 27, only need press button "2 and 7'.after that , you need
to select inspection register. You can select fingerprint, card or
password.
If you select fingerprint, need to register fingerprint for three times.
the dvice will store best gingerprint template as best standard data.
If you select card, need to brush card , making device automatically
read card No.
if you select password, need to input you appointed password on
figure key.
If need to delete user, you only input job No of user to be deleted.
assume existing staff No and staff name, we want to register job No
of user and related data, can refer to below methods:

       job No of user            staff No                 name

       1                MIS001                    John

       2                ACC001                    Mary

       3                MIS002                    Peter
       4                SAL001                    Susan


deviuce setup
device seup is divided into 7 branch menu, such as basic seup,
advanced setup, power management, communication setup, record
setup, setup of access control and function of self-checking. Every
branch menu has different parameter to set up project list among menu.
Using left, right , up, down arrows to enter into different menu.

                                            ·4·
basic seup
basic stup is basic seup of device, which includes time setup ,language
setup, voice prompt, volume adjustment, keypad tone.
time setup
time setup is setting up time on fingerprint device, if long time not to
connect computer , after processing data, the device might not be
inaccurate. You could use menu to correct time, also use Unionattend
software to synchronize their time. When you download data each time,
it will automatically synchronize time.
language setup
you also could set device's language, allow it as English , Chinese trad
and Chinese simplified. We also can change the language for customer,
such thailand or spanish etc.
Voice prompt
voice prompt device will speak" Thank you" to you when you press
fingerprint or brush card. If fingerprint hasn't yet registered or identified
failure, this device will speak" "identification failure". if you closed this
function , this device won't speak up.
As press fingerprint, device will give 3 short buzzing. if identify failure,
it will sound long , and screen will display failure,because this sound
chip only can store one kind of sound language. So , before leaving
factory, customer need to select appointed sound language.
Volume adjustment
Which adjust sound volume as you set the startup function .
Keypad tone
which means whether buzzer has prompt voice as press button down.
Advanced setup
beforehand setup changes important parameter of device installation.
If this deive has administrator, whom only can operate menu function,
which includes verified pattern,inspect port, and functional key setup
of beach menu, as well as setup of day-light saving time,firmware
upgrade,recover tacit setup of leaving factory, and delete all attendance
and registered data etc.
Tacitly verifying method
which is setting tacit inspected pattern, you might select fingerprint.
fingerprint
card + fingerprint
Job No + fingerprint
Job No + password
Fingerprint + password
card + password
job No + fingerprint that means pass with identification through both
job No and fingerprint.


                                  ·5·
Checking boundary seup
This menu function and fingerprint photograph are need to select
whether real time display or take photo.
Setup of real time photograph
if choose this function , we need input photo's percent ,fingerprint, card
and passoword etc.

              real time image caught
               fingerprint photo
              card photo
              PIN photoelectricity


display photo
which means that after successful identification, devive will display
photo to select.
delete all records
which means that delete all data inside device. beofre delete them , you
are need to confirm again to make sure to delete the data.
delete all registered data.
which means that all registered data inside device will be deleted.
recover setup of leaving factory
which recover tacit setup of device as leavinf factory, this function won't
affect existing data, and registered records, meanwhile, you are also
required again to confirm.
system upgrade
System upgrade is upgraded by U disk. When we have new function to
add or debug current firmware, we can use this method to upgrade.
setup of dayligh-saving time
This setup is for countries with daylight-saving time. You might make
device come back normal time after setting up of begining time and
closing time.
setup of functional key
the functional key have four different selections ( F1 to F4). tacit setup as
 F1 =on duty F2 =off duty        F3 =time over working        F4 = plus exit
you might change setup, for instance, might change motorcade info to
check , or change F2 to doorbell function.
ail setup list, adjust the function standing for start this job by appointed
time. The list of menu such as start up, closed, appointed dormancy,
ringdown setup, spare time setup and closed shutdown.



                                 ·6·
Automatically starting up
as open it at appointed time, device must be sleeping pattern beofre
opening it. for instance, you might set the automatically start up
device on 07:00.
Automatically shutdown
Automatical close and open is adverse functio , which is also
preinstalled for the automatical shutdown time.After using this function ,
you might press power button or set device as automatical startup. As
you start this function , device with sleeping condition.
Ringdown setup
you could set clock sound as 8 times. you also set ringdown music
and ringdown time-long. this device will output interior speaker and
exterior ring-clock.
Setup of spare time
this function is aimed at setting spare time and start up other function.
this function is given tacit consent to shutdown. If you set its function
as one minute, so it will jump into set pattern after spare time as one
minute, it is also set for sleeping or shutdown.
Closing shutdown key
Which is the function of closing shutdown button. If it is closed, you
can't start up this function.
Timing and state transition
We might set each time slot as transfer the state of on / off duty, for
Instance, with different time , and with different state, such as off duty,
overtime or reaching, and leave as exceed time.
Record set
record set is that display the info of alarm prompt, its branch selection
has three 3 functions, include"alarm of administration records, verify
record alarm and re-confirm time ".




Alarm of administration records
Which is also the alarm of administration log, which is changing
menu records, is also set quantity of record space to alarm surplus
volume of message, default as 100. That is to say screen will display
alarm info when surplus sapce volume only can save 100 records, by
that time, device will prompt you to download administration log or
delete records.


                                ·7·
Alarm of verifying records
which means an alarm of ordinary log. ordinary log means the
attendance records of pressing fingerprint or brushing card. Each
record, each authentication is only one record. when the surplus sapce
si reaching alarm quantity, screen will display alarm info, you should
download trade.
Re-confirm time
the second in this function is preventing the identified No of same user
to re-attendance at short time. Default is zero, which means that
device will record all records as you re-identify many times, at short
time, it will waste useless memory space, therefore, user might set to
record one time during number of minutes, allow max time as 255 minutes.
(about four and half hours).
Communication setup
which is mainly used for administration between fingerprint device and
computer. The communication parameter includes: baud rate, device
No,TCP/IP.S232, RS 485, connecting password, trends IPdistribute
and IP address of background PC etc.
Baud Rate
Baud rate must be known parameter as using Rs232 and RS485,
default rate is 115200bps per second. normally, we use this Baud rate.
Device No
Device No is only the identifier for each device, If you have multi
devices connected within one same network, you need unique device
No. for instance, three devices connected with same network, we must
set these device No as No 1,2 ans 3, meanwhile, each device has the
default No as 1.
TCP / IP
we could set IP address of fingerprint device within the function of
network communication. default IP address is 192.168.1.224, which is
network ID of fingerprint device.
RS232
this function means the communication through RS232, within the set
of NU3100 includes RS232 cable, which has the max communication
distance as 5 meters.
If your computer doesn't has COM port, you might add one USB
commutator to change RS232 to connect PC's USB port.




                                ·8·
Fingerprint device use the port of RS 232 cable is socket of Rj45
berg crystal, its pinout as below:
Pin 6= RS232T, Pin 7 = RS232R, Pin 8 = GND, Pin 1=WGIN 1, Pin 2
=WGIN 0, Pin 3=RS485B, Pin 4=RS485A, 5= NC.




                                      RJ45 port of back
                                      fingerprint device




                     1     8
RS485
we also can choose whether use RS485 as communication. which
have the max communicated distance as 200 meters, Normally, we
might use RS485 cable to connect deive, besides, it is better to
choose CAT5 cable to replace ordinary 485 cable, becuase CAT5
cable is better in antijamming capability.




But computer doesn't have RS485 communication port, normally it
only has RS232 communication port, therefore, we need one
commutator which transfer 485 signals to be RS232 signals.
communication of RS485 is adopted as three wires, one is TX+, one
is RX+, and ground connection.




                                       commutator for
                                       Rs485 to RS 232




                               ·9·
Rs 485 cable uses the same communication socket with RJ45, the
pinout as below:
3=RS485B, Pin 4=RS485A, Pin 8 = GND, Pin 1=WGIN 1, Pin 2=
WGIN 0, Pin5= NC, Pin 6= RS232T, Pin 7 = RS232R.




use for commutator connection between 485 -232, that is to say ,
TX+ on device should connect to commutator's RX-, and another
one as well.




Connecting password
as you communicate , need one password to identify, which also
prevent others using similar software connecting fingerprint device,
the default communication password is "0"
Trends IP distributed
which automatically controls protocol between Router and finger
print device.DHCP distributes networking IP address into device.
IP address of background PC
which is also IP address of back-end computer, which will send out
parameter onto device to operate attendance administration, for
example: send one info of user onto device.
Setup of access control
Access controller bases on one of time slot, one user or group could
start up this connected access controller with these time slots. each
time slot has one open time within one week according to name list
every day, Sunday to Saterday. Each user can pass identification
belong to own group or time slots of gate. their relation is "or". for
instance,
if first time slot as below:
  Sun 08:00 – 19:00        Mon 08:00 – 19:00   Tue 08:00 – 19:00
  Wed 08:00 – 19:00        Thu 08:00 – 19:00   Fri 08:00 – 19:00
  Sat 08:00 – 19:00




                                ·10·
second time slot
   Sun 21:00 – 23:00     Mon 21:00 – 23:00      Tue 21:00 – 23:00
   Wed 21:00 – 23:00     Thu 21:00 – 23:00       Fri 21:00 – 23:00
   Sat 21:00 – 23:00
user "John" was appointed as time zone 1 and 2, therefore John
can open the door every day, from 8:00 to 19:00 and 21:00 to 23:00.
besides, we can set ten of unlocking combination, each combination
max has 3 combination patterns,If you choose 2 group of users,
any member of the two groups must successfully pass identification
at same time.
Setup of time slot
which is built on open time scope within one week. We can define
max 50 time zone every day. You only need to input begining and
shutown hours and minutes. Time zone 1 can open door within set
time.
   Sun 00:00 – 23:59      Mon 00:00 – 23:59    Tue 00:00 – 23:59
  Wed 00:00 – 23:59        Thu 00:00 – 23:59      Fri 00:00 – 23:59
  Sat 00:00 – 23:59
use<up> or <down> arrow to select one of time slot, then press <ok>
enter into What day.
Setup of grouping function
which can max set 5 groups. To each group, max appoint 3 of time
slots ,after all these, the group will open all time slot. new user will
have tacit group 1, using up/ down arrow and input time slot to
select group(1 to 50).
Tacit identification pattern of group
inside device, you could set tacit identification pattern of group ,
here has 8 kinds of identificaiton patterns:
fingerprint or card or password
fingerprint
card and fingerprint
card
job No and fingerprint
Job No and password
fingerprint and password
card and password
setup of user access contro l
We can appoint list of access control to each user.
user000001 belong to group 1 time slot of user group is time slot 1 1
time slot 2 8 time slot 3 40 identification pattern of user group is
identification pattern fingerprint



                                ·11·
user could be appointed one group, so that user open time zone to
user with group. If parameter "using time zone of group" set as "yes" ,
each user will identify according tome zone of this group.
for Instance, if user 00001 using time zone of 3 groups, three time
zones separately are 7,8,9, corresponding 7,8,9, that three zones.
If we change pattern of time zone, using " time zone of group" to
change as "NO" Auto.
Setup of unlocking combination
We can choose " basic setup of unlocking combination" or setup of
unlocking group's combination". Whin basic setup, we only need one
set of quantity of open users. default setup is 1, which also means that
after user pass through checking pattern of first group, the gate will be
open. You can set max 5 different group, If set it as second group, that
 means only users from second group can pass through checkup
within 30 seconds.
this system doesn't care which group belong to 2. allow first to 3rd
group to open door, we can set up 10 group of open door. for example :
cluster 1 has first , second,third group, which means any user from the
3 groups can be verified through access control, another sample
second group was set up, but fourth group was not set up , so any
member from fourth group can open the door.
Control time for gate lock
control time of gate lock means that time sent through inspection and
sign to gate lock adapter.
               open                             inspect time




mini unit is 0.5 second, max 5 seconds. if it was set up as zero, contrller
of door lock will be closed.
Duration of lock drive
After verifying through, fingerprint device will automatically produce
open sign, and connecting E-lock switch to pen, But duration of lock
drive means that open door during the appointed time, otherwise,
need to re-verify for open. To this function , set unit is " second"
Door magnistor time-lapse
As gate is open, sensor function is also open, door sensor will
inspect time. if time over was inspected, alarm will be started up. To
this function ,the unit is " second"
Setuo of door magnistor switch
Which includes three kinds of types, such as normal open, normal
close and Nothing. "Nothing" stands for not using door magnistor
switch. If gate always keep open, lock also as open condition, if lock is
closed, alarm function will calculate, and will start up door magnistor
switch to time-lapse. if over time , it will alarm. oppositely door often
be close, the lock also should be set up for normal close. otherwise,
door sensor will start alarm up because time-lapse.

                                 ·12·
Setup of stress alarm
Normally , user registered two fingerprints , one is used for stress
alarm. when user is forced to open door, who will use the fingerprint
of stress alarm.
Alarm as wrong press
If we to use this function, press ▲▼” arrows over set times, device
will send alarm sign out.assume that we set 3 times, then press
fingerprint or input job No of user, and verifying password etc, if it is
failure over three times, which will lead to start up the function of
stress alarm. if closing this function, only need to set up with "NO".
Function of self-checking
As you distrust fingerprint has problem or need to be repaired, you
can use this selection to solve test problem. If you find it working
normally as tesing, so you maybe look out other out connected parts.
this kind of self-checking includes interior memory,LCD displayer,
sound, fingerprint sensor, keyboard and time tested.please looking
out keeping stable power as testing, so that exactly check up and
test. Otherwise, it is possible to lead to damage device, especially
check up under unstable working surroundings.
U disk administration
the main function of U disk inside menu as below:
download identification records
download administration record
download user Info
Upload user info
upload message notification
upload Mp3
Download identification records
which means download registered data of user into USB disk, job NO
of user might has several fingerprint and card or password etc. All
data will be downloaded.
Download administration records
which means that download administration records into USB disk,
any changed record on device will be download into USB disk.
Download user Inof
which means that download user info from device into USB disk,
User info is that all registered identification methods and job No of
user etc.
upload user info
which means upload user info from USB disk into fingerprint device.
upload message Notification
which means that upload info from USB into fingerprint device.
upload Mp3
which means that upload sound and ring from USB disk into
fingerprint device.


                                  ·13·
Data checkup
this function mainly provides data checkup, which is divided into 3
parts of information such as system info, device Info and advanced
checkup.




System info
information checkup includes all data by using memory space of
different parameter, as follow below:
times of user registered
times of fingerprint registered
times of password registered
time of card registered
recorded times of testing and verifying
times of administration records
used RAM
Times of user registered mean the quantity of registers. Times of
fingerprint registered is the quantity of fingerprint registered. Time of
password register is the quantity of password registered.n the
quantity of RF registered is the times of response card registered.
Record times of testing and verifying is the quantity of comprehen
sive identification.
Times of administration records is the quantity of administration
records changed.
used RAM means volumn of used memories.




Dvice Info
device Info is all info data inside fingerprint device, as follow below:
date of production serial number manufacturer device name
device No algorithm edition system edition


                                  ·14·
Ddvanced checkup
includes inquiries of checking records, administration records and
user register.




inquiry of testing and verifying is checking record for all identification
methods, may check according to job No of user or date. checking for
Administration records is changing checkup of management log.
register to check for user is checking Info of each user.to each inquiry,
you need input date scope or Job No of user or user name.
Relieve alarm
this function can be seen in menu when alarm is started up, after
opening it , we can select to relieve alarm function inside menu, only
administrator can do it .




                                   ·15·

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Kürzlich hochgeladen (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Empfohlen

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Secubio Icolor660 and Icolor900 Embedded Camera fingerprint machine hardware user manual

  • 1. Preamble This manual is for understanding how to use fingerprint device for users,which is a device with color screen and access controller, as well has attractive prospect . This is device of fingerprint identification. You could download data by linking to fingerprint device, as well select download by off-line, desides, you also use for operation and administrate of full functional time zone. fingerprint device separately has fundamental form ,and advanced form ,which has the function of disposing with camera. Installation Normally , we often install it on indoor wall ,because of avoiding strong sunshine to harm fingerprint sensor. Normally , we install device on wall with high of 1.4 meters. Fingerprint device 1.4m Fingerprint device has metal trestle on back, use for installing it on wall. metal trestle use screw to install device Making fingerprint device frame on wall. to be fixed on deivce frame. ·1·
  • 2. connection methods of electric lock method One: connection methods of Anti-robbery bell ·2·
  • 3. menu construction as follow below: user administration device setup fingerprint register basic setup advanced setup RF card register power management password register communication setup original sound transcribed alarm setup photograph image setup of access control function of self-checking U disk management download confirmation record data checking download administration records system info download user Info device info upload user Info advanced checkup upload messager notification alarm restoration MP3 upload Mp3 startu p screen after starting up fingerprint device, symbol will be showed a while, which means device is working now. Device screen on standing by ready will be displayed as below, which will display current date and time. The clock is placed on left. If you already set up the function of "setup of spare time inside " power management' , it will run this function at specified time. ·3·
  • 4. If machine leave unused specified time, this function will be started up. Under the function of free time, you also press fingerprint or menu button to operate different menu function. user administration under user administration , you also could add one new user or delete existing users. each user has own job No, as you add new user, firstly need to input job NO. it will display unused job No on dvice, if you accept it , only need you to press "confirmation". If you want to use other job No, you also can input appointed Number by pressing figure keys. 0 in front of Number no need to press, if you want to input 27, only need press button "2 and 7'.after that , you need to select inspection register. You can select fingerprint, card or password. If you select fingerprint, need to register fingerprint for three times. the dvice will store best gingerprint template as best standard data. If you select card, need to brush card , making device automatically read card No. if you select password, need to input you appointed password on figure key. If need to delete user, you only input job No of user to be deleted. assume existing staff No and staff name, we want to register job No of user and related data, can refer to below methods: job No of user staff No name 1 MIS001 John 2 ACC001 Mary 3 MIS002 Peter 4 SAL001 Susan deviuce setup device seup is divided into 7 branch menu, such as basic seup, advanced setup, power management, communication setup, record setup, setup of access control and function of self-checking. Every branch menu has different parameter to set up project list among menu. Using left, right , up, down arrows to enter into different menu. ·4·
  • 5. basic seup basic stup is basic seup of device, which includes time setup ,language setup, voice prompt, volume adjustment, keypad tone. time setup time setup is setting up time on fingerprint device, if long time not to connect computer , after processing data, the device might not be inaccurate. You could use menu to correct time, also use Unionattend software to synchronize their time. When you download data each time, it will automatically synchronize time. language setup you also could set device's language, allow it as English , Chinese trad and Chinese simplified. We also can change the language for customer, such thailand or spanish etc. Voice prompt voice prompt device will speak" Thank you" to you when you press fingerprint or brush card. If fingerprint hasn't yet registered or identified failure, this device will speak" "identification failure". if you closed this function , this device won't speak up. As press fingerprint, device will give 3 short buzzing. if identify failure, it will sound long , and screen will display failure,because this sound chip only can store one kind of sound language. So , before leaving factory, customer need to select appointed sound language. Volume adjustment Which adjust sound volume as you set the startup function . Keypad tone which means whether buzzer has prompt voice as press button down. Advanced setup beforehand setup changes important parameter of device installation. If this deive has administrator, whom only can operate menu function, which includes verified pattern,inspect port, and functional key setup of beach menu, as well as setup of day-light saving time,firmware upgrade,recover tacit setup of leaving factory, and delete all attendance and registered data etc. Tacitly verifying method which is setting tacit inspected pattern, you might select fingerprint. fingerprint card + fingerprint Job No + fingerprint Job No + password Fingerprint + password card + password job No + fingerprint that means pass with identification through both job No and fingerprint. ·5·
  • 6. Checking boundary seup This menu function and fingerprint photograph are need to select whether real time display or take photo. Setup of real time photograph if choose this function , we need input photo's percent ,fingerprint, card and passoword etc. real time image caught fingerprint photo card photo PIN photoelectricity display photo which means that after successful identification, devive will display photo to select. delete all records which means that delete all data inside device. beofre delete them , you are need to confirm again to make sure to delete the data. delete all registered data. which means that all registered data inside device will be deleted. recover setup of leaving factory which recover tacit setup of device as leavinf factory, this function won't affect existing data, and registered records, meanwhile, you are also required again to confirm. system upgrade System upgrade is upgraded by U disk. When we have new function to add or debug current firmware, we can use this method to upgrade. setup of dayligh-saving time This setup is for countries with daylight-saving time. You might make device come back normal time after setting up of begining time and closing time. setup of functional key the functional key have four different selections ( F1 to F4). tacit setup as F1 =on duty F2 =off duty F3 =time over working F4 = plus exit you might change setup, for instance, might change motorcade info to check , or change F2 to doorbell function. ail setup list, adjust the function standing for start this job by appointed time. The list of menu such as start up, closed, appointed dormancy, ringdown setup, spare time setup and closed shutdown. ·6·
  • 7. Automatically starting up as open it at appointed time, device must be sleeping pattern beofre opening it. for instance, you might set the automatically start up device on 07:00. Automatically shutdown Automatical close and open is adverse functio , which is also preinstalled for the automatical shutdown time.After using this function , you might press power button or set device as automatical startup. As you start this function , device with sleeping condition. Ringdown setup you could set clock sound as 8 times. you also set ringdown music and ringdown time-long. this device will output interior speaker and exterior ring-clock. Setup of spare time this function is aimed at setting spare time and start up other function. this function is given tacit consent to shutdown. If you set its function as one minute, so it will jump into set pattern after spare time as one minute, it is also set for sleeping or shutdown. Closing shutdown key Which is the function of closing shutdown button. If it is closed, you can't start up this function. Timing and state transition We might set each time slot as transfer the state of on / off duty, for Instance, with different time , and with different state, such as off duty, overtime or reaching, and leave as exceed time. Record set record set is that display the info of alarm prompt, its branch selection has three 3 functions, include"alarm of administration records, verify record alarm and re-confirm time ". Alarm of administration records Which is also the alarm of administration log, which is changing menu records, is also set quantity of record space to alarm surplus volume of message, default as 100. That is to say screen will display alarm info when surplus sapce volume only can save 100 records, by that time, device will prompt you to download administration log or delete records. ·7·
  • 8. Alarm of verifying records which means an alarm of ordinary log. ordinary log means the attendance records of pressing fingerprint or brushing card. Each record, each authentication is only one record. when the surplus sapce si reaching alarm quantity, screen will display alarm info, you should download trade. Re-confirm time the second in this function is preventing the identified No of same user to re-attendance at short time. Default is zero, which means that device will record all records as you re-identify many times, at short time, it will waste useless memory space, therefore, user might set to record one time during number of minutes, allow max time as 255 minutes. (about four and half hours). Communication setup which is mainly used for administration between fingerprint device and computer. The communication parameter includes: baud rate, device No,TCP/IP.S232, RS 485, connecting password, trends IPdistribute and IP address of background PC etc. Baud Rate Baud rate must be known parameter as using Rs232 and RS485, default rate is 115200bps per second. normally, we use this Baud rate. Device No Device No is only the identifier for each device, If you have multi devices connected within one same network, you need unique device No. for instance, three devices connected with same network, we must set these device No as No 1,2 ans 3, meanwhile, each device has the default No as 1. TCP / IP we could set IP address of fingerprint device within the function of network communication. default IP address is 192.168.1.224, which is network ID of fingerprint device. RS232 this function means the communication through RS232, within the set of NU3100 includes RS232 cable, which has the max communication distance as 5 meters. If your computer doesn't has COM port, you might add one USB commutator to change RS232 to connect PC's USB port. ·8·
  • 9. Fingerprint device use the port of RS 232 cable is socket of Rj45 berg crystal, its pinout as below: Pin 6= RS232T, Pin 7 = RS232R, Pin 8 = GND, Pin 1=WGIN 1, Pin 2 =WGIN 0, Pin 3=RS485B, Pin 4=RS485A, 5= NC. RJ45 port of back fingerprint device 1 8 RS485 we also can choose whether use RS485 as communication. which have the max communicated distance as 200 meters, Normally, we might use RS485 cable to connect deive, besides, it is better to choose CAT5 cable to replace ordinary 485 cable, becuase CAT5 cable is better in antijamming capability. But computer doesn't have RS485 communication port, normally it only has RS232 communication port, therefore, we need one commutator which transfer 485 signals to be RS232 signals. communication of RS485 is adopted as three wires, one is TX+, one is RX+, and ground connection. commutator for Rs485 to RS 232 ·9·
  • 10. Rs 485 cable uses the same communication socket with RJ45, the pinout as below: 3=RS485B, Pin 4=RS485A, Pin 8 = GND, Pin 1=WGIN 1, Pin 2= WGIN 0, Pin5= NC, Pin 6= RS232T, Pin 7 = RS232R. use for commutator connection between 485 -232, that is to say , TX+ on device should connect to commutator's RX-, and another one as well. Connecting password as you communicate , need one password to identify, which also prevent others using similar software connecting fingerprint device, the default communication password is "0" Trends IP distributed which automatically controls protocol between Router and finger print device.DHCP distributes networking IP address into device. IP address of background PC which is also IP address of back-end computer, which will send out parameter onto device to operate attendance administration, for example: send one info of user onto device. Setup of access control Access controller bases on one of time slot, one user or group could start up this connected access controller with these time slots. each time slot has one open time within one week according to name list every day, Sunday to Saterday. Each user can pass identification belong to own group or time slots of gate. their relation is "or". for instance, if first time slot as below: Sun 08:00 – 19:00 Mon 08:00 – 19:00 Tue 08:00 – 19:00 Wed 08:00 – 19:00 Thu 08:00 – 19:00 Fri 08:00 – 19:00 Sat 08:00 – 19:00 ·10·
  • 11. second time slot Sun 21:00 – 23:00 Mon 21:00 – 23:00 Tue 21:00 – 23:00 Wed 21:00 – 23:00 Thu 21:00 – 23:00 Fri 21:00 – 23:00 Sat 21:00 – 23:00 user "John" was appointed as time zone 1 and 2, therefore John can open the door every day, from 8:00 to 19:00 and 21:00 to 23:00. besides, we can set ten of unlocking combination, each combination max has 3 combination patterns,If you choose 2 group of users, any member of the two groups must successfully pass identification at same time. Setup of time slot which is built on open time scope within one week. We can define max 50 time zone every day. You only need to input begining and shutown hours and minutes. Time zone 1 can open door within set time. Sun 00:00 – 23:59 Mon 00:00 – 23:59 Tue 00:00 – 23:59 Wed 00:00 – 23:59 Thu 00:00 – 23:59 Fri 00:00 – 23:59 Sat 00:00 – 23:59 use<up> or <down> arrow to select one of time slot, then press <ok> enter into What day. Setup of grouping function which can max set 5 groups. To each group, max appoint 3 of time slots ,after all these, the group will open all time slot. new user will have tacit group 1, using up/ down arrow and input time slot to select group(1 to 50). Tacit identification pattern of group inside device, you could set tacit identification pattern of group , here has 8 kinds of identificaiton patterns: fingerprint or card or password fingerprint card and fingerprint card job No and fingerprint Job No and password fingerprint and password card and password setup of user access contro l We can appoint list of access control to each user. user000001 belong to group 1 time slot of user group is time slot 1 1 time slot 2 8 time slot 3 40 identification pattern of user group is identification pattern fingerprint ·11·
  • 12. user could be appointed one group, so that user open time zone to user with group. If parameter "using time zone of group" set as "yes" , each user will identify according tome zone of this group. for Instance, if user 00001 using time zone of 3 groups, three time zones separately are 7,8,9, corresponding 7,8,9, that three zones. If we change pattern of time zone, using " time zone of group" to change as "NO" Auto. Setup of unlocking combination We can choose " basic setup of unlocking combination" or setup of unlocking group's combination". Whin basic setup, we only need one set of quantity of open users. default setup is 1, which also means that after user pass through checking pattern of first group, the gate will be open. You can set max 5 different group, If set it as second group, that means only users from second group can pass through checkup within 30 seconds. this system doesn't care which group belong to 2. allow first to 3rd group to open door, we can set up 10 group of open door. for example : cluster 1 has first , second,third group, which means any user from the 3 groups can be verified through access control, another sample second group was set up, but fourth group was not set up , so any member from fourth group can open the door. Control time for gate lock control time of gate lock means that time sent through inspection and sign to gate lock adapter. open inspect time mini unit is 0.5 second, max 5 seconds. if it was set up as zero, contrller of door lock will be closed. Duration of lock drive After verifying through, fingerprint device will automatically produce open sign, and connecting E-lock switch to pen, But duration of lock drive means that open door during the appointed time, otherwise, need to re-verify for open. To this function , set unit is " second" Door magnistor time-lapse As gate is open, sensor function is also open, door sensor will inspect time. if time over was inspected, alarm will be started up. To this function ,the unit is " second" Setuo of door magnistor switch Which includes three kinds of types, such as normal open, normal close and Nothing. "Nothing" stands for not using door magnistor switch. If gate always keep open, lock also as open condition, if lock is closed, alarm function will calculate, and will start up door magnistor switch to time-lapse. if over time , it will alarm. oppositely door often be close, the lock also should be set up for normal close. otherwise, door sensor will start alarm up because time-lapse. ·12·
  • 13. Setup of stress alarm Normally , user registered two fingerprints , one is used for stress alarm. when user is forced to open door, who will use the fingerprint of stress alarm. Alarm as wrong press If we to use this function, press ▲▼” arrows over set times, device will send alarm sign out.assume that we set 3 times, then press fingerprint or input job No of user, and verifying password etc, if it is failure over three times, which will lead to start up the function of stress alarm. if closing this function, only need to set up with "NO". Function of self-checking As you distrust fingerprint has problem or need to be repaired, you can use this selection to solve test problem. If you find it working normally as tesing, so you maybe look out other out connected parts. this kind of self-checking includes interior memory,LCD displayer, sound, fingerprint sensor, keyboard and time tested.please looking out keeping stable power as testing, so that exactly check up and test. Otherwise, it is possible to lead to damage device, especially check up under unstable working surroundings. U disk administration the main function of U disk inside menu as below: download identification records download administration record download user Info Upload user info upload message notification upload Mp3 Download identification records which means download registered data of user into USB disk, job NO of user might has several fingerprint and card or password etc. All data will be downloaded. Download administration records which means that download administration records into USB disk, any changed record on device will be download into USB disk. Download user Inof which means that download user info from device into USB disk, User info is that all registered identification methods and job No of user etc. upload user info which means upload user info from USB disk into fingerprint device. upload message Notification which means that upload info from USB into fingerprint device. upload Mp3 which means that upload sound and ring from USB disk into fingerprint device. ·13·
  • 14. Data checkup this function mainly provides data checkup, which is divided into 3 parts of information such as system info, device Info and advanced checkup. System info information checkup includes all data by using memory space of different parameter, as follow below: times of user registered times of fingerprint registered times of password registered time of card registered recorded times of testing and verifying times of administration records used RAM Times of user registered mean the quantity of registers. Times of fingerprint registered is the quantity of fingerprint registered. Time of password register is the quantity of password registered.n the quantity of RF registered is the times of response card registered. Record times of testing and verifying is the quantity of comprehen sive identification. Times of administration records is the quantity of administration records changed. used RAM means volumn of used memories. Dvice Info device Info is all info data inside fingerprint device, as follow below: date of production serial number manufacturer device name device No algorithm edition system edition ·14·
  • 15. Ddvanced checkup includes inquiries of checking records, administration records and user register. inquiry of testing and verifying is checking record for all identification methods, may check according to job No of user or date. checking for Administration records is changing checkup of management log. register to check for user is checking Info of each user.to each inquiry, you need input date scope or Job No of user or user name. Relieve alarm this function can be seen in menu when alarm is started up, after opening it , we can select to relieve alarm function inside menu, only administrator can do it . ·15·