UNIS 4.5_Manual_ENG
UNIS 4.5_Manual_ENG
SOFTWARE GUIDE
UNION COMMUNITY
Version 4.5.0.1
2019-01-01
1. Before Starting Program............................................................................................... 6
1.1 Product Introduction ................................................................................................ 6
1.1.1 Outline ............................................................................................................... 6
1.1.2 Product Configuration ..................................................................................... 6
1.1.3 Minimum & Recommended Specification ...................................................... 7
1.1.4 Product Support Information ......................................................................... 7
1.2 Authentication Method ............................................................................................. 7
1.3 Procedures for Fingerprint Recognition Sensor Use ............................................ 8
1.4 Fingerprint Registration Procedures .................................................................... 12
1.5 Start Program .......................................................................................................... 14
2. Remote Manager Menu Configuration ...................................................................... 16
2.1 HOME ........................................................................................................................ 16
2.2 MAIN MENU ............................................................................................................. 17
2.3 LIVE VIEW ................................................................................................................ 17
2.3.1 Site Map ........................................................................................................... 17
2.3.1.1 Wizard ...................................................................................................... 18
2.3.1.2 Set Terminal Position ............................................................................. 21
2.3.1.3 Set Drawing Position .............................................................................. 21
2.3.2 Monitoring ....................................................................................................... 24
2.3.2.1 Authentication Log List .......................................................................... 25
2.3.2.2 Remote Manager ..................................................................................... 27
2.3.2.3 Terminal Status ....................................................................................... 27
2.3.2.4 Event List ................................................................................................. 28
2.4 USERS ....................................................................................................................... 30
2.4.1 User Management .......................................................................................... 30
2.4.1.1 Add User ................................................................................................... 32
2.4.1.2 Delete User .............................................................................................. 43
2.4.1.3 Terminal User .......................................................................................... 43
2.4.1.4 Send User to Terminal ............................................................................ 44
2.4.1.5 MobileCard Management ....................................................................... 46
2.4.1.6 Issue Smart Card .................................................................................... 47
2.4.1.7 Black List User ......................................................................................... 48
2.4.1.7.1 Send Blacklist to Terminal ...................................................... 51
2.4.1.7.2 Delete Blacklisted User ............................................................ 52
2.4.2 Visitor Management ....................................................................................... 53
2.4.2.1 Add Visitor................................................................................................ 55
2.4.2.2 Delete Visitor ........................................................................................... 58
2.4.2.3 Lookup Visitor.......................................................................................... 58
2.5 REPORTS .................................................................................................................. 60
2.5.1 Log Management (Report Writer) ................................................................ 60
2.5.2 User Tracking Report ..................................................................................... 67
2.5.3 User Rights Audit Report ............................................................................... 67
2.5.4 TNA Reports .................................................................................................... 68
2.5.5 Meal Management Reports ........................................................................... 68
2.5.6 Terminal Settings Report .............................................................................. 68
2.6 TNA............................................................................................................................ 68
2.6.1 TNA Settings ................................................................................................... 70
2.6.1.1 Wizard ...................................................................................................... 70
2.6.1.2 Shift Config .............................................................................................. 73
2.6.1.3 Set Schedule ............................................................................................ 76
2.6.1.4 Apply Schedule ........................................................................................ 79
2.6.1.5 Rate of Pay ............................................................................................... 80
2.6.2 Set Special Shift .............................................................................................. 81
2.6.3 TNA Management ........................................................................................... 83
2.6.3.1 Process Transactions .............................................................................. 83
2.6.3.2 Modify Hours............................................................................................ 85
2.6.3.3 Output Period Result .............................................................................. 86
2.6.3.4 Output Person Result ............................................................................. 87
2.6.3.5 Output Weekly Hours Result ................................................................. 89
2.6.4 TNA Reports .................................................................................................... 89
2.6.5 Break Reports ................................................................................................. 91
2.6.6 Summary Management .................................................................................. 92
2.6.6.1 Process Totals .......................................................................................... 92
2.6.6.2 Modify Total Hours .................................................................................. 94
2.6.6.3 Output Period Summary ......................................................................... 95
2.6.6.4 Output Person Summary ........................................................................ 95
2.6.7 Transfer Work Result ..................................................................................... 96
2.7 MEAL ....................................................................................................................... 101
2.7.1 Process Meal Manually ................................................................................ 101
2.7.2 Meal Management Report ........................................................................... 102
2.7.3 Statstics of Total Meal ................................................................................. 103
2.7.4 Statistics of Individual Total Meal.............................................................. 104
2.7.5 Settings .......................................................................................................... 104
2.7.5.1 Wizard .................................................................................................... 104
2.7.5.2 Meal Code 1 ........................................................................................... 107
2.7.5.3 Meal Codel 2 .......................................................................................... 108
2.7.5.4 Set Meal Cost ......................................................................................... 109
2.8 OTHER..................................................................................................................... 110
2.8.1 Change Master Password ............................................................................ 110
2.8.2 Database Backup .......................................................................................... 110
2.8.3 Service Manager ........................................................................................... 110
2.8.4 Import User From File .................................................................................. 111
2.8.5 Search Terminal Data .................................................................................. 112
2.8.6 Reset Terminal Emergency ......................................................................... 113
2.8.7 Lockdown Terminals .................................................................................... 113
2.8.8 Release Terminal Lockdown ....................................................................... 114
2.8.9 Door Open ..................................................................................................... 115
2.8.10 Door Unlock ................................................................................................... 116
2.8.11 Door Lock....................................................................................................... 116
2.8.12 Send Notice To Terminal ............................................................................. 117
2.9 ADVANCED ............................................................................................................. 119
2.9.1 User Batch Editing ........................................................................................ 119
2.9.2 Data Query .................................................................................................... 119
2.9.3 Export Log File .............................................................................................. 122
2.9.4 Import / Merge Log File .............................................................................. 123
2.9.5 Import Terminal Data .................................................................................. 123
2.10 SETTINGS ............................................................................................................... 126
2.10.1 SETUP ............................................................................................................. 126
2.10.1.1 Environment Settings ........................................................................... 126
2.10.1.1.1 Local Environment ................................................................. 126
2.10.1.1.1.1 General ............................................................................. 126
2.10.1.1.1.2 Server Connection .......................................................... 128
2.10.1.1.1.3 Alarm Popup .................................................................... 129
2.10.1.1.1.4 Picture Popup .................................................................. 129
2.10.1.1.2 Server Environment ............................................................... 130
2.10.1.1.2.1 General ............................................................................. 130
2.10.1.1.2.2 Fingerprint ....................................................................... 133
2.10.1.1.2.3 Emergency ....................................................................... 135
2.10.1.1.2.4 Required Field ................................................................. 137
2.10.1.1.2.5 Mail Environment ............................................................ 138
2.10.1.1.3 Password Security .................................................................. 140
2.10.1.1.4 TNA ........................................................................................... 141
2.10.1.1.5 Other Module .......................................................................... 142
2.10.1.2 Company Info Setup ............................................................................. 143
2.10.1.3 Terminal Configuration ........................................................................ 146
2.10.1.3.1 Add Terminal ........................................................................... 150
2.10.1.3.2 Delete Terminal ...................................................................... 154
2.10.1.3.3 Upgrade Firmware ................................................................. 155
2.10.1.3.4 Assign Admins ........................................................................ 157
2.10.1.3.5 Customize Logo / Voice ......................................................... 158
2.10.1.3.6 Setup Options ......................................................................... 161
2.10.1.4 Anti-Passback Setup ............................................................................. 170
2.10.1.5 Site Map.................................................................................................. 172
2.10.1.6 Wiegand Format Setting ...................................................................... 172
2.10.1.7 Smart Card Layout Setting .................................................................. 175
2.10.1.8 MobileCard Admin Setting ................................................................... 177
2.10.1.9 DVR Configuration Setting ................................................................... 180
2.10.1.10 Holiday Management ............................................................................ 181
2.10.2 CONFIGURATION ......................................................................................... 182
2.10.2.1 Access Control Settings ........................................................................ 182
2.10.2.1.1 Access Wizard ......................................................................... 183
2.10.2.1.2 Time Zone ................................................................................ 188
2.10.2.1.3 Access Time ............................................................................. 190
2.10.2.1.4 Access Area ............................................................................. 191
2.10.2.1.5 Access Group........................................................................... 192
2.10.2.1.6 Delete....................................................................................... 193
2.10.2.1.7 Send to Terminal .................................................................... 194
2.10.2.2 Access Group Shift Settings ................................................................. 194
2.10.2.3 Application Authority Management .................................................... 196
3. Appendix ..................................................................................................................... 197
3.1 Verifying UNIS Normal Operation ....................................................................... 197
3.2 Anti Pass Back Configuration .............................................................................. 198
3.3 TNA Settings (Examples) ..................................................................................... 202
3.3.1 Example of TNA Settings (General Workplace) ........................................ 203
3.3.2 Example of TNA Settings (Public Office) ................................................... 209
3.3.3 Example of TNA Settings (Night Shift) ...................................................... 215
3.3.4 Example of TNA Settings (Shift Work) ...................................................... 221
3.3.5 Example of TNA Settings (Multiple Going to and Leaving from Work) . 229
3.3.6 Shift Config - Advanced Settings(Shift) .................................................... 237
3.3.7 How to set the query items ......................................................................... 238
Move to Bottom: Move the checked item to the very end. ..................................... 239
3.4 Wiegand Setting ........................................................................................... 240
3.5 Face Authentication in Server Mode ................................................................... 244
3.5.1 Introduction .................................................................................................. 244
3.5.2 Activating License ........................................................................................ 244
3.5.3 Deactivating License .................................................................................... 252
1. Before Starting Program
1.1 Product Introduction
1.1.1 Outline
UNIS is a program that effectively operates a fingerprint recognition, card, a face recognition, and
mobile card terminal. It integrates and manages each terminal and users through network. Real-time
monitoring of authentication status is allowed, and authentication record of users can be searched
and viewed.
This manual explains how to install UNIS that can monitor and manage a terminal by linking with the
terminal.
Fingerprint Authentication
1:1 authentication
As a method that enters fingerprint after entering ID, a registered fingerprint that corresponds to ID
and an entered fingerprint are compared on 1:1 basis. Authentication process time is short.
1:N authentication
This is a method that authenticates fingerprint from the entire registered fingerprints without entering
an ID. This method is simple but processing time is long compared to 1:1 authentication method
when there are many users.
After storing user’s fingerprint information in the smart card, the fingerprint entered during
authentication and the fingerprint stored in the smart card are compared for authentication. Since a
storage medium other than smart card is not required, system security can be increased.
Password Authentication
This is a method that checks access rights using 4~8 digits password. It is used when fingerprint
cannot be used.
Card Authentication
This is a method that authenticates using RF card that a user has. Card number must be registered in
the system to use it.
Face Authentication
This is a method that authenticates registering a user’s face in a system. It can be used with the
terminal that supports the face authentication functions.
This is a method that authenticates in a smart phone. This function can be used with the terminal
that supports the mobile key function. Regarding to the method for using the mobile key, please refer
the user manual.
Fingerprint registration is the most important process in using the fingerprint recognition device.
Fingerprint must be accurately and properly registered in order to successfully recognize fingerprint.
The use of index finger, middle finger and ring finger is recommended for registration. However, the
use of thumb and little finger should be avoided. As it is difficult to place thumb and little finger on
the fingerprint recognition sensor window properly, it is difficult to acquire accurate fingerprint image.
1 ) When the fingerprint recognition sensor blinks, place the finger on the sensor window.
2 ) After placing the fingertip at the fixing guide of the sensor window top as shown in the figure,
place and fix the finger tightly between the fixing guides of the sensor window top and bottom.
3 ) Press with adequate pressure as if stamping with finger. Do not apply too weak or too much force.
4 ) The finger should not be leaned to top, bottom, left and right of the fingerprint recognition sensor
window as shown in the figure. Do not input only the fingertip or do not input fingerprint while
rotating finger.
Figure 2 [ Improper Fingerprint Input Method ]
When fingerprint is entered, fingerprint registration can be adjusted after viewing the acquired
fingerprint image condition as in the following descriptions. The following are required fingerprint
image conditions.
The fingerprint core area represents the ridge area where bending is the largest. The area inside blue
circle in the below fingerprint image represents the core area. In general, such core area is located in
the center of fingerprint. Using fingerprint core position shown during fingerprint registration, the
finger can be placed so that the center area of fingerprint can coincide with the center of the sensor
window. It is necessary to acquire fingerprint whose core is located in the center of an image
captured during registration process. Registered fingerprint should not be twisted and it must be
directed vertically.
Fingerprint image quality is determined by the condition of fingerprint image ridge pattern.
Fingerprint with large-sized scar, fingerprint with poor condition due to eczema, dry fingerprint and
wet fingerprint usually produce low-quality image.
The fingerprint images shown above are produced due to wet finger or due to excessive applied
pressure during fingerprint input. The solution to the above condition would be to reduce the applied
pressure or wipe the wet finger with towel. Doing these things can help produce good-quality image.
The fingerprint images shown above are produced due to dry finger or due to insufficient applied
pressure during fingerprint input. Apply stronger pressure or blow into the finger to produce good-
quality fingerprint image. (Especially during winter)
The above fingerprint images are produced due to scar or eczema in the finger. If these fingerprints
are registered, authentication may be denied after scar or eczema is healed. Therefore, avoid such
types of fingers and use other finger for fingerprint registration.
The following are three conditions that need to be satisfied to produce good-quality fingerprint during
registration.
3) Ridge (black line) and valley line (white line) of fingerprint are expressed clearly.
1 ) False Rejection
This event represents a case when authentication trial for a registered fingerprint fails. If the
condition of a registered fingerprint image is poor, even properly entered user fingerprint can be
rejected for authentication. It should be noted that even if a fingerprint image is registered properly,
an improperly entered fingerprint can still be rejected for authentication. Factors such as fingerprint
input condition and fingerprint image quality affect the occurrence of this event.
2 ) False Acception
This event represents a case when another person’s fingerprint is authenticated. In general, this
event can occur frequently when a fingerprint with insufficient characteristics is registered due to
missing core. It can also occur when fingerprint types are similar.
This is a value set as criteria to determine authentication through matching between entered
fingerprint and registered fingerprint. If authentication security level is lowered, false rejection rate
decreases while false access rate increases. On the contrary, if authentication security level is raised,
false rejection rate increases while false access rate decreases. For such reasons, each location with a
fingerprint authentication system uses a suitable security level. The default security level setting can
be used for general purpose fingerprint authentication systems.
1.4 Fingerprint Registration Procedures
These are procedures to register a fingerprint using the fingerprint recognition sensor with the
Remote program.
3) Place the finger on the fingerprint 4) Briefly remove the finger from the fingerprint
recognition sensor recognition sensor.
5) Place the finger on the fingerprint 6) If fingerprint is entered properly, “OK!” is
recognition sensor again displayed to proceed to the next step.
1) Log in for a Master Manager: Click “Master Log Check Box”, and enter the pass word.
(Default value is “1”)
2) Log in for User having the administration authority: After entering the manager ID, enter
password or authenticate with your finger.
Regarding to the password for the initial master manager, modify in [Main Menu] – [System] –
[Change Master Password] in Menu which at the right side.
2. Remote Manager Menu Configuration
2.1 HOME
It is the screen that arranges a frequently used menu screen. When clicking the button, it moves
to the screen that the user wants.
The button for TNA and Meal menu is activated when connecting with USB Lock.
But in case of less than 10 people in the foreign web site, TNA and Meal menu can be managed
without USB Lock.
(USB Lock)
2.2 MAIN MENU
This is the Menu Tree to find all the menu and access easily.
It uses to find the menu directly when searching the name of menu or when clicking each menu.
In order to do this, the position of all terminals along with the drawings must be designated.
③ Press Register button to select the layout image to use in the area and place the terminal.
To place the terminal in the layout, drag the corresponding terminal in the left into the
layout with your mouse.
④ Drag each drawing position in the list to place in an entire layout.
Click on Set Terminal Position at the top menu. Then, the above screen appears, click Select Image to
select the background drawing to select a background image.
If needing to move the location, click the corresponding terminal with your mouse to place the proper
location. When a user double-clicks the terminal icon, check the detailed registration information.
If the position of each drawing is designated at the entire drawing, the position of a drawing can be
viewed at a glance during monitoring.
Drawing position designation can be registered only for a drawing with a designated terminal position.
After selecting a background image by clicking on the image button, continue with the work being
done.
Select a drawing to be placed by performing a right mouse click on the entire drawing.
To change the position of an item, move it while clicking down on it.
If an item is double-clicked, the information of the corresponding item is displayed.
When drawing position designation is completed, press Save button in order to save it.
: It marks the status of the designated external signal. (It marks notice on screen.)
: It marks that the door is closed which is connected to the terminal. (It marks normal on screen.)
: It marks that the door is opened which is connected to the terminal. (It marks normal on
screen.)
: It marks the status of normal condition of terminal. (It marks normal on screen.)
Server connection status: It displays the network connection status of the authentication server and
data server. Periodically, check the status of the connection and attempt to connect when
disconnecting.
(It displays green when connecting in normal, otherwise does red when in abnormal)
2.3.2.1 Authentication Log List
Access Log List of a user is displayed.
Time: Access date and time are displayed.
Terminal ID: ID of a terminal that authenticated is displayed.
User ID: ID of an authenticated user is displayed.
Name: Name of an authenticated user is displayed.
Emp No.: Employee Number of an authenticated user is displayed.
Branch: The branch information for an authenticated user is displayed.
Location: A User’s current location can be checked. (Only applied when using Anti Pass
back)
Access Group: Access Group of an authenticated user is displayed. (Refer to this link [Access
Control])
Class: Users and visitors
Mode: It displays the authentication mode among general/F1/F2/F3/F4.
(ex. [Terminal Information]-Functional Separation Meal: Breakfast, Lunch, Dinner Show, etc.,
if A/T: Attend, Leave, Out, In Display, etc.)
★ Notes
If the User’s Authentication Type was “OR”, the Authentication Log will be displayed
respectively per each authentication try on server authentication.
List Clear
Click the right button of the mouse in the authentication log list and select “List Clear” in pop-up
menu. The authentication log list, which is printed in real-time, is cleared.
Set Columns
Click the right button of the mouse in the authentication log list and Select “Set Columns” in the pop-
up menu.
Select only the field to be shown in the field list.
2.3.2.2 Remote Manager
It displays the access status of a client (Remote Manager), who is connected with the server.
※ Client connection status and whether to use the terminal state can be set to [Tool]-
[Environment Settings]-[Local Envirnment Setting] .
※ Door Control
- Select the connected terminal, click the button of the mouse and then click the pop-up menu.
After that, control the door.
1) Open Door: Release door unlock for a second.
2) Door Unlock: Activate the door lock to the unlocked state.
3) Door Lock: Activate the door lock to the locked state.
4) Setup Options: When the terminal is connected, it checks the Setup Options and applies.
(Reference: Setup Option)
Partition: It means the independent security zone that consists of many zones. (Only for MCP040)
Partition number #01~04
Account: The account number that set in ‘Partition Setting’ (Only for MCP040).
Class: The class of the events is displayed. (open/close, Access Control, System Trouble, Alarm)
Event: The type of the event is displayed.
ID: User number, Area code, 000-999 (System event is always 000.)
If the user number exceeds 999, the maximum value is less than 999. (Only for MCP040)
▶ From right side menu [USERS]-[User Management], add/modify/delete the users and transfer the
users to terminal well.
★ If any authentication method is not registered, the user is displayed as the color which is
designated in [Authentication Type Un-registered user Record colour] from [SETTINGS]-[SETUP]-
[Environment Settings]-[General].
Find: Select the item and option to find and search them
▶ Extended Information
(※ Display ID when it’s authorized with user information from the computer, only with AC2100)
Message: When authenticating a user, enter the notice to display in the terminal. (After
entering the notice, if the employee authenticates the check setting, the notice is sent to
terminal. Only 5000 and 6000 terminals are supported)
Picture Information: Click Add button to register the photo a user wants.
(Recommended Size: 320 x* 240). The registered picture size is limited to less than 7Kbytes.
If a user is connecting a USB camera button to enter the real-time video, pictures can be
obtained)
▶ Restriction
Remote Access Not available: Even if a user is registered as the administrator, the user can’t
log in UNIS
Initialization: Initialize the password as the designated value in the environment setting.
▶ Etc.
ACU Partition: If a user is the partition which is connected with MCP040, only checked
partition is allowed to access.
VOIP: It sets Voip account information.
▶ Authentication Type
- Combine the authentication methods such as fingerprint, fingerprint card, password, card, face,
mobile card, and etc.
- In case of the fingerprint card, others cannot be used.
- If a user uses the password, the OR combination with others is available for only 2 methods.
- Except for that, the maximum 3 authentication methods are available.
Registration level: Set the available standard value when registering the fingerprint.
Authentication level: Set the available standard value when authenticating the fingerprint.
Fingerprint registration: Through the wizard, a user can register the fingerprint or delete it.
1:N: This is a method that authenticates fingerprint. A user can set 1:1 or 1:N. (1:N is the
method that can be authenticated without entering ID when authenticating the
fingerprint.)
Alarm setting for Duress finger: Select the Duress alarm in [Environment] – [Local
Environment] – [Alarm Popup] as it is shown below.
Mail Setting for Duress fingerprint: Select the duress fingerprint in [SETUP]-[Environment
Settings]-[Mail Environment]
Enroll from Terminal: This button is used to enroll the fingerprint from the terminal instead
of USB Fingerprint Scanner.
Enroll: When clicking Enroll button, the selected terminal request to place the fingerprint like
below picture. At this time, the terminal will be asked automatically for inserting your finger
on the sensor with the message “Place finger on sensor” as below picture. In this case,
insert your finger twice as requesting of the terminal.
Delete: When clicking Delete button, the selected fingerprint can be removed.
Prev: When clicking Prev button, go back to the previous step.
Next: If you need to enroll another fingerprint, click Next button and then it will be possible
to enroll the fingerprint additionally.
Finish: When clicking Finish button, the fingerprint registration will be finished.
Cancel: When clicking Cancel button, the fingerprint registration will be cancelled.
- 1:N Face: When authenticating with your face, it is available to do Face Authentication directly
without entering ID or pressing the function key. (Now, only terminal authentication is
available)
- Register: Register a user’s face with the terminal AC7000.(Data is saved in the server)
1) Press Register button to start to register a user’s face.
2) Select the terminal to register in the list and press Start button to
keep processing.
4) Press Start button, show your face in the screen and register in each
steps according to the guide.
5) After completing the face registration, press Finish button and finish
registration.
Add Face Registration: Press Add button to register additionally. (It
only activates when the face data is registered in advance.)
Delete Face Registration: Press Delete button to delete the registered
data of face information.
MobileCard Information
- To use the mobile card, a user should register the administrator first.
(Refer MobileCard Admin Setting )
- Period Setting: Set the period of mobile card access. (Up to 1 year from the current time)
- Country Code: Country code for the international phone call
- Mobile number: A User’s mobile number
- Immediately issued when the register: After checking the corresponding menu, if the mobile
card is not issued, it transfers the mobile card sending message in SMS when adding or
deleting the user.
- Discard: Discard the issued mobile card.
** If a user wants to check whether mobile card is issued or not, double click the
corresponding user in the list and the user can find it.
In case of the user whose mobile card has already been issued, the window in Mobile
Card Information is deactivated.
After checking the user’s information to delete, delete the user from the list.
※ After entering the terminal’s ID or name to transfer, press F3 or Search button to search the
corresponding terminal.
※ When transferring the user’s name from the terminal, a maximum 16 bytes only can be
transferred.
※ Check the terminal to transfer after checking all the employees - For the employees who have no
Right to Access (Refer [Access Control]), its transmission is automatically skipped
It searches the users whose mobile card expiration date is less than a month or mobile card is not
issued yet and issues the mobile card for them.
▶ This function is used to send the Blacklist to terminal and also can delete the Blacklist User from
the Right Side Bar Menu [USERS]-[Black List User].
How to set up
Check [Use blacklist user management] from [SETTINGS] – [Environment Settings] -[Server
Environment].
Double click the user information to designate the blacklist from the user list to press
Change blacklist button and then it is changed like below.
Click the classified user in [Blacklist Management] to check the information like below.
Delete Blacklist: Press Remove from Blacklist button to delete the blacklist.
Check the use of mail service and [Blacklisted User Attempted Authentication] from[SETTINGS] –
[Environment Settings] – [Server Environment]-[Mail Environment] to forward the related contents
into the mail as below.
Check [Blacklisted User Attempted Authentication] in [SETTINGS] – [Environment Settings] –
[Alarm popup] – [Select popup alarm] to display the alarm window in the monitoring screen as below.
Find: Select the item and option to find and search them.
Basic information
ID: Assign visitor’s ID.
Reg. Date: Visitor’s registration date and hour are entered automatically.
Location: a visitor tells the current position information. ( ※ Refer [Anti-Passback Setup],
[ex1)Anti-PassBack] )
Authentication Type
- Combine the authentication methods such as fingerprint, fingerprint card, password, card, and
etc.
- In case of the fingerprint card, others cannot be used.
- If using the password, the OR combination with others is available for only 2 methods.
- Except for that, the maximum 3 authentication methods are available.
Visiting information
Visit Period: Assign visitor’s visit period. Visit is allowed only during the assigned period.
1:N: If it is selected, authentication is made only with fingerprint without fingerprint recognition
terminal keypad input.
Card Information: Press Reading button to read a card in the smart fingerprint reader. After the
card number appears, press Add button to register a card.
(Recommended Size: 320 x* 240) The picture size to be able to is limited to less than a 7Kbytes. If a
user is connecting a USB camera button, press the real-time video button to gain the picture.
Visit Period: Set the visiting period from Start date to End date.
Lookup Visitor: Get the registered visitor’s information from the list.
※ Visitor information cannot be transmitted to the terminal, and only Authentication server is
available.
Select: Display the selected visitor in the visitor’s information. (The applied item reflects only the
corresponding column.
After checking a visitor to delete from the visitor list window, select Delete.
Access Log
Period: Set the period to search. For entire period search, uncheck the check box on the
period dates.
Condition: Set the search condition. Set a desired condition from all search Terminal / User
/ Visitor / Access Group search.
(Searching in Group is the log the currently stored employee’s information)
Details Condition: Set the detailed search condition of the set condition. Detailed
assignment is used for searching by ID.
Result: Set the search condition for each authentication result. Search All/ Success/ Failure
of authentication results are set.
Mode: Set a desired Mode from Search All, Attend, Leave, Out, In, Breakfast, Lunch, Dinner,
Supper and Snack..
Search: Search authentication records to satisfy search conditions.
Delete: Delete authentication records to satisfy search conditions.
※ The deleted authentication log is re-uploaded from terminal. (In case of storing the
authentication log in the terminal.)
Save to File: Save searched records as CSV file.
Print: Click Print button to activate the print menu button.
Retrieve from Terminal: It brings authentication logs stored in a terminal to the server.
When a terminal operates in S/N mode or N/S mode, it stores authentication logs in the
terminal’s internal memory if connection to the server is disconnected.
Retrieve from Terminal: It retrieve the audit log which is saved in the terminal into the server.
A user can check the logs that the administrator has done in the terminal.
(Add User, Delete User, Add Fingerprint, Delete Fingerprint, Control Default, Control Access,
Initialization overally, Initialization setting, Initialization authentication log, and etc.)
1) Terminal State
A. Terminal Disconnected
B. Terminal Connected
C. Terminal Locked
D. Terminal Unlocked
E. Terminal Tamper
F. Terminal Attached
G. Terminal Lockdowned
2) Door State
A. Door Open
B. Door Close
C. Door Unlock
D. Door Locked
E. Door Forced
F. Door Not Closed
G. Door Restored
H. Lock Error
I. Not Monitoring
3) User Operation
A. Remote Door Open
B. Remote Door Unlock
C. Remote Door Lock
D. Attempt to access by Blacklist User
4) Emergency State
A. Fire Sensor Start
B. Fire Sensor End
C. Panic Sensor Start
D. Panic Sensor End
E. Emergency Sensor Start
F. Emergency Sensor End
5) External Sensor
A. External Sensor 1 Start
B. External Sensor 1 End
C. External Sensor 2 Start
D. External Sensor 2 End
E. External Sensor 3 Start
F. External Sensor 3 End
G. External Sensor 4 Start
H. External Sensor 4 End
When authentication log is delivered to the server, the server functions stores the log in UNIS main
DB. If any problem occurs in this case, the record is temporarily stored in local DB (UNIS_Temp.mdb)
so as to allow regular checking. The record is deleted after being stored in the main DB. Therefore, it
is normal to be empty at all times.
In the event of giving special command to the terminal such as user sync, etc. related with the
interface with the other system, the applicable command language is stored in [tCommandDown]
table, treated in order, and then deleted. Therefore, it is normal to be empty.
2.6 TNA
It gives the various Time and Attendance settings with the configured TNA conditions and the
authenticated log data for Output Period Result, Set Special Shift, Output Person Result, Attendance
Reports, Break Reports, Process Totals, Modify Total Hours and etc.
▶ Set Special Shift: A user can easily change the settings through the applicable menu if the user
needs to assign special work separately from the work schedule registered in Work Mode Registration
menu.
▶ Process Transaction: Time & attendance is calculated and applied based on the value registered in
Time & Attendance Setup.
▶ Modify Hours: In the event there is any change in the result after processing the employee’s time
& attendance, a user can manually input-modify the value by double-clicking the applicable time in
the menu.
▶ Output Period Result: Search the result of time & attendance processing for period. A user can
save in file and print the inquired data.
▶ Output Person Result: Search the result of time & attendance processing for personal. A user can
save in file and print the inquired data.
▶ Attendance Reports: Inquire the working status by query options. A user can inquire the list of
tardiness, early leave, absence respectively, and print or save them in a file.
▶ Break Reports: A user can inquire the hours excluded from basic work hours due to going out or
early leave out of the time & attendance processed.
▶ Process Totals: A user can count the result of daily time & attendance processed within a certain
period.
▶ Modify Total Hours: In the event there is any change in the employee after the completion of time
& attendance count, a user can manually input-modify the value by double-clicking the applicable
time.
▶ Output Period Summary: Search the result of total hours for period. A user can save in file and
print the inquired data.
▶ Output Person Summary: Search the result of total hours for personal. A user can save in file and
print the inquired data.
▶ Transmit Work Result to another DB: All the time and attendance results can be transferred to a
separate external DB. (In this case, all tables in the external DB should be created with same
properties with UNIS DB.)
※ Tip1 : It is used to edit the search column items when clicking the “Settings” button on the Ouput
Period Result section. (※ Refer [Output Reiod Result])
※ Tip2 : The selected items will be sorted when clicking the “Search” button and also it is possible to
drag your mouse to adjust the width of per each colume.
※ Tip3 : The size of each item can be edited manually by double-clicking on the mofidifaction mode.
2.6.1 TNA Settings
2.6.1.1 Wizard
Set the time if the over time exists. Check the check box to work and set the start time and end time.
If the time passes 24 hours, select “eve, Today, next” before the time.
③ Enter information
Enter the work name. If a user wants to add the work time, click Add new button. Only work time
that is registered in Wizard is printed. To set the work schedule, it cannot be returned into the enter
information when clicking Next button.
④ Set Schedule
Set the circulating working schedule and working day of the week.
⑤ Finish
Apply Schedule
Rate of Pay
Set each employee’s Work Hours on a daily basis and set the other types (tardiness, early leave,
exceptional hour, etc.). A user need to register in a separate code when there are different Work
hours and types on daily basis. Holiday and vacation, etc. must be registered. Time can be set in
DHH: MM (D: Day, HH: Hour, MM: Minute). In case of the current day, time will be entered in ‘ ‘,
while for the previous (following) day, ‘-‘ (‘+’) will be prefixed to the time. (Enter all times on the
basis of 24)
▶Enter Information
Code: As a unique code number, it must be entered as a 2-digit number or alphabetic letters but
not to be overlapped. (Special symbols are prohibited.)
Name: Enter the unique name of work time.
▶Basic Clocking config
Clocking Mode
- Use all function keys: Recognize all the records searched as time & attendance record from [Log]-
[Log Management]-[Access Log]
- Use attend and leave keys: Recognize first and last log of the arrival and depart logs searched
from [Log]-[Log Management]-[Access Log]
Basically, the success logs for authentication are used only for calculating TNA.
(The failure logs for authentication are not used for TNA)
Time Frame: The record of sign in/out within the relevant zone is processed as TNA.
- any range other than 24 hours can be assigned. (When one works longer than a day and time for
leaving work is beyond 24 hours, treat it by simply adjusting the zone)
If the time is over the 24 hours range, a user should delete the ‘ ‘ blank before the time when
entering the symbol.
For example) [ 00:00] ~ [ 00:00] => [ 05:00] ~ [+04:00]
Ignore if Absent (Only for Holiday): It does not treat as absence although one is absent on a
certain day. (That is, it is applied to holiday, vacation, etc.)
Late IN Time/Early OUT Time: Tardiness and early leave are calculated based on the input time
Multiple Daily Shifts: Apply in case the number of sign in/out during the day exceeds 1. For
example, it can be set up when summing the Work hours by calculating from each sign in/out within
the range of morning shift/afternoon shift work divided into morning shift - break - afternoon shift.
Divided into a maximum of 4 zones (8 sub divisions) (※ For more information on setting
method, refer to [TNA Settings] )
Advanced Settings: A user can additionally set automatic creation of sign in/out, exclusion of
going out/early leave, fixed time excluded (lunch time, etc.), and multiple sign in/out zones.
Time Frame: Process the record of sign in/out within the applicable zone as time &
attendance.
- Assignment of the range other than 24 hours is available (In the event work hours do
not exist within 24 hours due to work that exceeds 1 day, it can be processed with real time
by adjusting the processing zone)
Auto Clock: Sign in/out can be automatically recognized when there is no sign in/out time.
- (For example, if a user arrives after 10:00, the lateness time is not calculated. The
arrival time should be admitted as 10:00)
Auto Clock IN: Applicable input time can be automatically recognized as sign-in
time when there is no sign-in record
- For example, if the setting time is 10:00, the arriving reports after 10:00 are
neglected and it is considered to arrive at 10:00
Auto Clock OUT: Applicable input time can be automatically recognized as sign-
out time when there is no sign-out record
- For example, if the setting time is 15:00, the leaving reports before 15:00 are
neglected and it is considered to leave at 15:00
Out of Office Settings: Set in case the network hours except vacant time out of work
hours should be calculated
Clocking Mode: Use all function key – Calculate in all logs regardless of the
authentication mode
Use attend and leave keys – Calculate the authenticated logs according to leave and
return mode
Break by LEAVE record: Check if a user wants to exclude the leave- time in the
middle of the working time because of outside work.
Clocking Mode: Use all function key - Calculate in all logs regardless of the
authentication mode.
Use attend and leave keys – Calculate the authenticated logs according to IN/OUT
mode
Break Times: Set in case there is fixed exceptional times such as lunch time, tea break,
etc.
Set Multi Daily Shift Times: Apply in case there occurs sign in/out at least two times a day,
that is, work schedule is divided into morning shift work-break-afternoon shift work. Each
sign in/out time is summed up within the range of morning/afternoon shift works.
Zones 1~4: Set and assign the time in the zone wider than the range of Work Hours
Registration so that the authenticated record of sign in/out within the zone can be
recognized as time & attendance.
Pay Rate: Select Normal Time, Time Before Shift, Overtime 1 Hours, Overtime 2
Hours, Off Day Hours, or Overtime 3 Hours.
Method
- No Shift: No calculate working hours
- Fixed Shift: Admit Start and End section to the corresponding working hours.
- Actual Time: On the basis of the user’s authentication log, all the range of IN/OUT
is handled
- Overtime: On the basis of the attendance logs, [End] is admitted as the working
hours after [Start] passes.
Start, End: It should be entered precisely because the standard is the time to specify
Pay Rate and and enter the time range..
Advanced Settings: A user can detaily set the time unit, minimum time,
maximum time and etc. about from Rate 1 to Rate 5 as the user enter above.
(※ For more information on setting method ex5: [TNA Settings] )
Add: Newly register the input data.
Modify: Modify and save the modified data.
Delete: Delete the registered data.
Close: Close the relevant window
Code: Enter unique code number (4-digit integer and alphabetic letters) / Name: Enter the title
of distinguishable work mode.
Define Holidays
Holiday: [ Data Management ] - Assign the holiday code registered in [ Holiday Information ]
(※ For more information on setting method : [Holiday Management] )
Set Schedule
Start Date: Select the date to start the schedule registration (It becomes the starting day of
rotation schedule)
Repeat After: Select the number of days for rotation (Normally in the unit of 7 days)
- Set the number of days repeated in accordance with the Work Hours registered in [ Shift
Config ]
- With the number of set days selected, the number of set days is displayed on the list starting
from the reference date at the bottom frame on the screen.
- With the assigned work mode double-clicked, the work code registered in [ Shift Config ] is
displayed.
- With the entry column double-clicked, an input window pops up. Enter the code directly and
then the user can enter data quickly by moving an input window using lower/upper keys. When the
selected work day code is different from the input code, priority is given to the code that was entered
directly.
- Assign all the days so that there is no unassigned date by work days.
Set in more detail the added/deducted hours and counting processing, etc. at the time of processing
time & attendance for Normal Time Detail, Time Before Shift Detail, Overtime1 Hours Detail,
Overtime2 Hours Detail, Off Day Hours Detail, Overtime3 Hours Detail respectively.
Apply Schedule: Select applicable work mode (※ For more information on setting method : [근 Set
Schedule])
Set: Click the button, then the applicable data is applied to the user checked above.
Close: Close the relevant window.
2.6.1.5 Rate of Pay
Set pay unit and pay rate.
▶ Enter Information
Code: Input a unique code number (4-digit integer)/ Name: Input the title of distinguishable
amount payable.
Name: Enter the name of the rate of pay. (4-digit.)
▶ Pay unit
Time unit: Paid the payment in time unit.
30 Min: Paid the payment in 30 min unit.
15 Min: Paid the payment in 15 min unit.
10 Min: Paid the payment in 10 min unit
1 Min: Paid the payment in 10 min unit
▶ Pay Rate
Normal Time: Pay rate set in Normal Time
Time before: Pay rate set in Time before.
Overtime 1 Hours: Pay rate set in Overtime 1 Hours.
Overtime 2 Hours: Pay rate set in Overtime 2 Hours.
Off Day Hours: Pay rate set in Off Day Hours.
Overtime 3 Hours: Pay rate set Overtime 3 Hours.
Search Option
Start Date: 30-day work schedule is inquired based on the starting date.
※ With the work code double-clicked on the special work day, a user can proceed to Modify mode
- Click Save, then the modified data is distinguished in shade.
Save: Modify and save the modified data.
※ Tip1: With your mouse right-clicked on Modify screen, [Select Shift] window pops up as follow.
2.6.3 TNA Management
Set the work period to be processed for time & attendance. (Maximum of 31 days)
The date of the process transactions cannot include the future date.
Ignore Modifications: After checking the applicable option, at the time of time & attendance
processing, the modified record manually input in Time & Attendance Result Modify menu among the
previously processed time & attendance is automatically changed (deleted) into time & attendance
record.
Process: When selecting the employee to treat time & attendance after checking his/her name,
‘Complete’ message pops up on Result.
Search Option
Search all record: Inquire about all records equivalent to the query option.
incomplete record:
※ Switch to modify mode by double-clicking the time to be modified - Apply by clicking Modify
button after entering the data
Settings: The Item inquired can be edited by the user. (※ For more information on how to
set up :[조회 How to set query items])
2.6.3.3 Output Period Result
It inquires the result of the process transactions for period. The inquired data can be saved in
a file and printed out.
Search Option
Search all record: Inquire all records equivalent to the query option.
incomplete record:
Save to File: The inquired screen can be printed out. Click the button so that Print Preview
screen pops up as follow. Click Print button to get a printout.
Save to File: The inquired data can be saved in a file (Excel CSV form). Click the button, and
then save them as follow;
Search Option
Search all record: Inquire all records equivalent to the query option.
Incomplete record:
Print: The inquired screen can be printed out. Click the button so that Print Preview screen pops
up as follow. Click Print button to get a printout.
It calculates for weekly TNA result to export. (It displays the employee who works more than 52
hours in a week)
Search Option
Print: The inquired screen can be printed out. Press the corresponding button to pop up
[Print]-[Print Preview]-[Set page]
Settings: The inquired items can be edited by the user.
(※ For more information on setting method :[How to set query items])
Save to File: A user can save the inquired data in file (Excel CSV form). Click the applicable
button, and then save them as follow.
Summary Date: Select the month to be counted and the unit of week (1st week ~ 5th week).
The applicable period is selected in date zone. The period can be adjusted in the unit of day.
Ignore Modifications: After checking the applicable option, the modified record manually
entered in Time & Attendance Result Modify menu among the previously processed time &
attendance is automatically changed (deleted) into time & attendance record.
Process: When selecting the employee to treat time & attendance after checking his/her name,
‘Complete’ message pops up on Result.
Close: Close the relevant window.
Of the items, the item equivalent to employee information is not modified. Modify it from the
user information, and then treat the time & attendance again.
Search Option
Search Period: Select the period to be inquired in the unit of month and week.
※ With the time to be modified double-clicked, the user can proceed to Modify mode - Apply it by
clicking Modify button after entering the data.
Search Option
Summary Date: Select the period to be inquired in month and week units.
(Maximum of 31 days.)
Search: The result for the search option can be printed out.
Print: The inquired screen can be printed out. Click the button so that Print Preview screen will
pop up. Click Print button to get a printout.
Save to File: The inquired data can be saved in file (Excel CSV form). Click the button and then
save them as follow.
Summary Date : Select the period to be inquired in month and week units. (Maximum of 31
days)
Search: The result for the search option can be printed out.
Print: The inquired screen can be printed out. Click the button so that Print Preview screen will
pop up. Click Print button to get a printout.
Save to File: The inquired data can be saved in file (Excel CSV form). Click the button and then
save them as follow.
Trans Work Result: Transfer all the time & attendance results (Contents of wWorkResult Table).
Trans Work Summary: Transfer all the time and attendance sums (Contents of wWorkSummary
Table).
Trans Except Record: Transfer all the exceptional records (Contents of wExceptRecord Table).
Transfer: Transfer all the data created within the designated period.
Desired results and attendance data can be sent to DB. Be sent to DB is supposed to be registered in
the ODBC Administrator.
5. Be transmitted in the database, select the path and name of the database, then click OK.
6. Click OK.
8. Be transmitted and transmit the data set period, then Send button.
Trans Data
- Enter DB access information that has done the connection setting from UNIS_WORK in ODBC.
2.7 MEAL
2.7.1 Process Meal Manually
It uses to process the Meal data manually. (At this case, the old processed data will be
removed)
2.7.2 Meal Management Report
Under the terms of user-selected query to look for Meal Management Result.
Basic Condition: All the search. Search for the department and the terminal the user.
2.7.5 Settings
2.7.5.1 Wizard
① Initialization
Select whether the code value of all the meal is initialized or not.
② Meal Code 1
Enter Code, Name, Meal type, Meal time, Limit meal and etc to register Add button.
③ Meal Code 2
Set Code, Name, Day limit, Monthly limit, and Period Setting to check the applying meal in the left
list.
Meal: Select of Breakfast, Lunch, Dinner, Snack, and Late Night Meal.
Limit Meal: The number of duplicated certificate of meals. However, when setting to 0, no limit
the number of meals.
Day Limit: The number of times to eat a day. However, when setting to 0, no limit to the number.
Monthly Limit: The number of times to eat a month. If setting to 0, no limit the number of times.
Set: If the code exists, modify setting a user want. Otherwise, make the new code.
Initialization: Initialize the screen setting. It doesn’t affect the existing DB.
Same Price: In case that a user checks each meal, set the meal cost for all of the menu to
setting costs on menu1.
To register normally, field name should be matched same on the base of the file.
② Press Open button to import CSV file where user information is entered.
.
2.9 ADVANCED
2.9.1 User Batch Editing
It uses to modify User Access, TNA, Meal Control in batches.
Condition : Set the condition tosearch the user or visitor who needs to be sorted.
Function : Select the target to apply among Access Group/Work Code/Meal Code.
Apply : Modify in batches for selected function to the selected users.
Detail: Branch, Department, Access Group, Authority, T/A Code, Meal Code and Payroll Code
Authentication Type: Search in the combination of fingerprints, password, face, fingerprint card,
card, mobile card and And/or condition.
Save to File: Click the button below to save the queried information.
Log file name that is saved is created into the period ended date (YYYYMMDD).
2. Press Save button after specifying the location where a user want to save the file and file
name.
Select the corresponding log file, click Merge button and add it.
① Select the icon “USB” from the terminal Menu after inserting USB memory.
※ For more information on setting method : Refer the AC6000 User’s Manual
② After selecting the “Event Log” from the above menu, the terminal’s log will be
stored to USB memory. (This feature is applied only for “Event Log”.)
③ Copy the “data” folder from the USB and then paste it to the hard disk.
And then extract it like as the picture
- File Name : Terminal ID(8digits)_logdata.tar.gz ( Do not change this name)
- “00000004_logdata.tar” folder is extracted to the root folder
- ac6000 > data > 00000004_logdata > mnt folder is created
In case of AC2200, AC2200 > Data > Terminal ID > log.dat will be
created.
④ UNIS - [ADVANCED] - [Import Terminal Data] - [Open] – Select the folder
00000004_logdata.tar - [OK]
⑥ Find the quantity of the saved logs and then click to the “Save” for uploading to UNIS
2.10 SETTINGS
2.10.1 SETUP
2.10.1.1 Environment Settings
2.10.1.1.1 Local Environment
2.10.1.1.1.1 General
▶ Set Basic
Language: It supports English, Korean and Japanese basically. In addition, a user can set
the custom language. To set the additional language, open Lanuguage.xml file in Config folder in
UNIS installation path and add Addition section.
▶ Restriction
Door Control
Allow all functions: The pop-up menu about the terminal control is available in the terminal
list in the monitoring viewer.
Disabled: The pop-up menu about the terminal control is not available in the terminal list in
the monitoring viewer.
Remote door open only: The pop-up menu for door open is only allowed.
The maximum number of monitoring lists: Enter the maximum number of lists to be
displayed on the monitoring screen.
The maximum number of search list outputs: Enter the maximum number of lists to be
displayed in the authentication record search screen.
▶ Authentication Server
IP Address: Enter authentication server IP address (UNIS_Server)
Connection Port: Enter the authentication server socket port number
▶ Database Server
IP Address: Enter server database IP address (IP address of a PC installed as the server
during program installation) (UDB_Server)
Port: Enter the socket port number for connection to the database server.
Database connection information: It changes the database account information which is
currently connecting. When changing the access information, a user should do in caution and it is
only changed by the master administrator.
2.10.1.1.1.3 Alarm Popup
The number of maximum pop up of alarm’s window (0~50): When it happens alarm, the
number of maximum pops up alarm’s window is displayed.
The size of pop up window’s alarm (0.2): It inputs the size of pop up.
Notice board of window’s time (Maximum: 600 sec): The time from open to close
automatically if admin do not check after showing the pop up window (If it is set up “0”, there is no
closing automatically)
▶ Alarm Select
Alarm for matching fail
Alarm for disconnect
Alarm for cover open
Alarm for door forced
Alarm for door open
Alarm for lock error
Blacklisted User Attempted Authentication
Duress
▶ Popup Location
Auto Position: Select the popup location. When checking the Auto Position, the window pop-
up appears in order.
▶ Terminal
Select the terminal to popup the picture.
▶ Authentication
Automatically upload log data from terminal
: When connecting the terminal, non transmitted authentication log data is sent from the terminal.
Save only successful authentication log: Authentication failure event can be checked only in
monitor but it is not saved.
▶ Door
Save log for door open and close status
: It decides to save log data such as authentication success, inside open, compulsory open
with remote.
▶ Access control
Restrict the use of access control admin.: The master administrator gives
the access authority to the user who has management authority.
(Refer [Add User])
Non assigned access user not allowed to access: If the access group is not assigned, it
restrict the access.
Blocking Time (Sec): Set the time value that restricts the authentication consecutively.
▶ Picture Information
Saving path to picture log (dat): terminal input / specify path to save the release of
photographs taken.
Saving path to picture log (JEPG): time of path appointing, save in/out capture image by
Jpeg.
▶ Security
Using the encrypted packets: Use the Seed encrypted packets.
User Information Encryption: Encrypt user name, serial number, password in remote access
log-in.
▶ Other
Language: Set the server language such as mail.
Logo picture to home screen: Change the logo picture in mail screen.
Update Term: Set the information update term from Host server to DDNS Server.
Contract No.: Press Apply button to get the contract number from DDNS Server.
port: Enter socket port number to connect terminal to server. (Basic Port: 9870)
Connection status check interval: Connection status between terminal and server is checked
with a time interval in setting.
Set cipher
Visitor ID Range: When adding a visitor, ID is added in the corresponding range in order.
Archive Period: Data Management > It specifies the numbers of days for data storage that is
inquired at Data Management.
Store Access Log: A standard unit is days, if setting 0, period for storage is unlimited. (100 = It
means that records are deleted automatically after storage record for 100days)
Store Event Log: A standard unit is days, if setting 0, period for storage is unlimited.
Store Terminal Commands: A standard unit is days, if setting 0, period for storage is
unlimited
Elevator floor setting : It can be configured to display the number of floors on [SETTINGS] >
[CONFIGURATION] > [Access Control Settings] > [Access Group] > [Elevator floor setting]
(Maximum floor is 64)
Number of basement floors : The basement floors are displayed with “B”
2.10.1.1.2.2 Fingerprint
Set Finger Order : If the number of fingerprint is limited to send to the terminal, send
fingerprints according to the priority of fingerprint.
If a user doesn’t allow the similar fingerprint, the user search is set automatically
with the fingerprints.
It means if a user doesn’t check “Allow similar finger prints to be registered”, “Find user from
fingerprint” deactivates like the picture below.
2.10.1.1.2.3 Emergency
Control terminals in fire
- When connecting with PIN which the sensing signal for fire is set in, it is available to process the
corresponding event.
Automatically terminates: When the situation ends, it finishes the control automatically.
- When connecting with PIN which panic status signal is set in, it is available to process the
corresponding event.
Automatically terminates: When the situation ends, it finishes the control automatically.
- When connecting with PIN which the sensing signal for fire is set in, it is available to process the
corresponding event.
Automatically terminates: When the situation ends, it finishes the control automatically
Attach Picture: Check whether attach picture to log mail during sending.
Mail config
※ Tip: Can be filtered to spam mail, accept email address from spam mail setting
Sender: Settings displayed on the sender name (ex. Access Control Manager)
Select mail: Be sent to the event, select the item ( Terminal disconnected, Terminal
Detached, Door Forced , Door Not Closed, Lock Error, Emergency State, External Sensor )
Press Apply button to send the test mail to the setting mail account.
Setting an example
Password Available Days: A user can login a designated password during this period.
Authentication Failure Allowing Option: The number of possible re-entry as password isn’t
matched.
Password Change required at the first log-on: When login at first, a user should change your
password exactly.
Initial Value
Initialization Method: Defined Value - (Default:1234) Administrator can set it. / Employee ID is
designated automatically.
Initial Value: Initial value to that extent that initialization method is designated value.
Password Generation
Consecutive Characters not Allowed: Consecutive Characters are not allowed. ( ex. 1111 is not
possible)
Not allowed with the same ID and Password: If ID and password are same, a user is not allowed
to input.
Character Limitation for Password: If checking this menu, a user can set Password Character
Limitation
2.10.1.1.4 TNA
Time and Attendance setting
Auto Process Time: Set the time and attendance time in 1 times daily automatically.
No. Decimals (Currency): The number of decimals to be able to enter when registering payment
according to working hours.
Time Displayed As: Set the type of time display.
No. of Decimals: Set the number of decimals of time display.
Pay period: Total Period
First Day of Week: Set the first day of week
Calculate Daily: The last day of time and attendance.
Calculate From: The last day of calculating total working hours.
Using Neis
This is the function that connects with the external system and the result of time&attendance. And
then a user should start from the server.
After setting whether using or not, setting the path, a user should restart in uWorkServer.
The result of time&attendance is saved in the designated format in the corresponding path when
processing time&attendance.
After registering Branches, they are used when entering user/terminal/visitor information.
Input Information
After registering departments, they are used when entering employee/visitor information.
Input Information
Title
After registering positions, they are used when entering employee/visitor information.
Input Information
※ Area entrance / exit details, [Anti Pass Back Management] ,[ex1)Anti Pass Back]
Remote Manager: The remote control of the access door is displayed. (0: Allow to use all the
functions, 1: Prevent to use all the functions, 2: Allow only door open)
Find: Select the item and option to find and search them.
Find contents: Enter to the terminal to find.
Upper, Lopper case: In case of English, select whether classifying captial and small letter.
Full Char: Select if searching with the full name of the terminal or not. If not checking.
Set Columns: Set the item to print from the list. (Size, Visible can bechanged as double-
clicking)
Refresh: Update the list information.
Time Zone: Standard time in the world to the information terminal Time Zone setting (world
standard time-based time synchronization of the handset)
Anti Pass Back(※ See detailed setting an example: [ex1)Anti Pass Back)
(Even if it has the limitation of the Pass Back, it processes the authentication success in the terminal
or the server and it alarms the current status in the monitoring screen.
Function Assignment
UNIS S/W can basically use one DVR and a license should be purchased to use multi DVR.
After selecting a user to be assigned as an administrator, move the selected user to “Assigned Admin”
After confirming to delete the terminal information, delete the registered device.
2.10.1.3.3 Upgrade Firmware
Terminal firmware can be upgraded.
Find the path which has the firmware file, choose that file and press Open button.
Select a terminal to be upgraded and press Send button to upgrade the firmware.
※ If operating a terminal during firmware upgrade, the firmware internal functions stop and the
terminal cannot be used. Therefore, take caution during firmware upgrade.
2.10.1.3.4 Assign Admins
A terminal that can be managed by each administrator is assigned. A terminal administrator is
a user who can use terminal menus. In case more than one administrator is registered in a
terminal, the administrator authentication process is required to enter the setting menu.
After selecting an administrator, select a terminal to be registered from [Unassigned Terminal] list
After designating the terminal admistrator and sending the user from terminal, the designation is
applied.
2.10.1.3.5 Customize Logo / Voice
Download customized file is the function that a user can separately specify file and send it to
the terminal. Defined Text File(.csv)/Backgroud image File(.jpg)/Success voice File(.wav)/Fail
voice File(.wav)/Movie File(.mp4) Please refer to the terminal introduction for the defined file.
After specifying a file as a Defined Text File (.csv) and selecting the CSV file (.csv), press OK button
to display the selecting terminal window.
After selecting the terminal on terminal list window click Send and file is sent and the results of
download appear.
CSV file is created after text which will change in excel file with firmware is changed to make csv file.
If changing back from the defined text to the default text, select Application - Display - User Text
in the Terminal menu and clear the mark in the check box.
Designate the File type as the background image file(.jpg) and select the image file(.jpg).
Press OK button to display the terminal window. Select the terminal in the terminal list window. After
that, press Send again and the file is transferred and the result of the download is displayed.
At this time the file name is applicable to file within only 15 words. and JPG file of 320* 240 can be
sent. If data of other format is downloaded there is an "version error" in the result of download.
If,Backgroud image File to change back to the default: Application – Display and choose to enter
the menu.
When a file is specified with ‘success voice file (.wav)’, select Wav file (.wav) and click OK button to
display the selecting terminal window.
Press Send button to transfer the file and display the downloaded result.
At this time, choose file name within 15 words including extension name, send Wav file of 8 KHz ,16
bit mono. If date other format is downloaded version error is displayed on the monitor.
In case of fail voice, change in the same way by designating file type as (.wav)
If changing back to the default voice from the defined voice, select Operation method – Window
setting in the terminal and clear the mark in the check box.
To change back to the default in the Custom Voice Voice [operating system] from the terminal -
[Screen Settings] to enter the menu to place a checkmark in the "Use your voice 'item unchecked.
Press Send button in the terminal list to transfer the file and display the downloaded result.
At this time, use the file name within 15 words including the extension and only transfer MP4 file. If
the data of another format is download, “version error” is displayed in the results .
When a file is wanted to be sent to the terminal, select the File Type with “All File(.*) and click OK
button to send it.
Press Send button in the terminal list to transfer the file and display the downloaded result.
2.10.1.3.6 Setup Options
When a terminal is connected, the terminal option setting is confirmed and applied.
Button
Refresh: Brings back the setting value which is applied to the terminal.
▶ Basic
Authentication Level
1:1: It is the level value used during 1:1 authentication recognition terminal.
1:N: It is the level value used during 1:N authentication at the fingerprint recognition terminal.
Access Level
Anti Pass Back: It is the anti pass back assigned value.(※ See detailed setting an example:
[ex1)Anti Pass Back] )
- Access Allowed When server disconnected: Access allowed for all users in case of
communication disconnection.
- Access Denied when server disconnected: Access prohibited for all users in case of
communication disconnection.
Authentication Restriction: User authentication method in devices that are limited to a fingerprint
and password.
Others
Sound Volume(0~20): Specifies the sound volume of the terminal (authentication notification
sound) - AC1000 ~ AC6000: Volume value 0 ~ 5 / AC7000: Volume value 0-15
User ID Length (2~8): Specifies The ID length of a user assigned in the terminal.
User Key: The type of the number to be entered during 1:1 authentication is assigned; user ID or
Unique ID. User ID is the default key used in the program and it can be up to an 8-digit number.
▶ Network Setting
Authentication Server Port: Port of the authentication server to connect a terminal is displayed.
(basic port: 9870)
- NS: Authentication is made with the server first. In case that the terminal and server are
disconnected, authentication is made with the terminal.
- SN: Authentication is made with the terminal first. In case an authenticated user is not available
in the terminal, authentication is made with the server.
- NO: Authentication is made only with the server. If the terminal disconnects the server, the
authentication cannot be authenticated.
Operation Mode: It displays the operation mode; Access Control, TNA, Meal, Shift and People
Count. (Shift and People count functions are only applied in the special terminal and firm ware.)
The text for Meal Printer: Set the text to be printed to the Meal Printer which is connected in the
terminal.
▶ Locking Setting
1) Drag the left and right borders of that appears after clicking the mouse button in the slider (grid
square) to adjust the time. Or, enter a time value directly by pressing the enter key to complete the
setting. (Up to 3 is available.) The locking time and opening time cannot be duplicated.
2) Set the day of the week, click Apply button, and then it is applied on that day.
3) When clicking the right button of the mouse in the timeline (slider), the menu will pop up.
These are the values in timeline control and they are fixed in English, even when clicking the mouse
right-click in the menu.
1) In case of applying lock/unlock setting only in Holidays (holidays, national holidays, etc.) and
special holiday, Holiday 1, Holiday 2 and Holiday 3 schedule is registered in the menu.
2) Holidays must be registered and Add / Delete from the menu to add the date / apply, please.
▶ Holiday Setting
1) Select a number to set from the list and assign the holiday type.
3) Select a date to be set as holiday and press Registration button to assign it as holiday.
※Up to 100 holiday registrations can be made. Two or more of the same date that the holiday will
be designated as case number. (Sequential)
▶ Siren
Set alerts and let the siren sound every set time.
1) Retrieve: Bring back the Siren configuration information from the saved file (Alarm.dat) in the
installation path.
2) Save to File: Save the Siren information in the installation path. (Alarm.dat)
7) Use the entered details with Add / Modify / Delete button to manage in the left list.
Breakfast, Lunch, Dinner, Snack, and Late Night Meal can be set.
▶VoIP
Set the server access account of SIP for voIP or exchanger.
Entrance and exit exist in a zone, and only a person who enters through the entrance can
leave through the exit.
For example, when a person moves from zone 1 to zone 2, that person goes .
Here, the terminal 1 becomes both the exit of zone 1 and the entrance of zone 2. Only a
Select SETTINGS > SETUP > Anti-Pass Back Setup on the right side menu.
Anti pass back code is registered.
Input Information
Registered anti pass back information is registered as Enter zone / Exit zone ( [Add Terminal] )during
terminal registration.
Wiegand support is available in the terminal for connecting external wiegand card readers or
controllers. Note that in UNIS a fully customizable setting for Wiegand Input and Wiegand Output can
be programmed. Standard 26bit, 34bit Wiegand, as well as a variety of settings are available in your
environment. In addition, the parity, number of bits, data fields can be set and downloaded to the
terminal. Here is how to set up for Wiegand Output.
Bit Length: Length (Unused / St. 26bit / St. 34bit / Customize 중 선택)
- Unused : When Disabled
- St. 26bit : When the standard 26bit
- St. 34bit : When the standard 34bit
- Customize : Users when any designated date
Custom Size: settings is Bit Length - [Customize] then Length select( Range: 1~128bit )
Port State: Active Low(Basic) / Active High
Site Code: if necessary, user settings (Settings range from the terminal: 0~255, UNIS can enter
a range of others)
※ Tip: 26bit - 3byte(Site Code: 1byte + UID: 2byte) / 34bit - 4byte(Site Code: 1byte + UID: 3byte)
Fail Data: settings is Send Fail - [Send Fail Data] then Fail Data format input
Bypass: If YES , Wiegand card readers to transfer card data is entered. It is transfer the input
value itself.(NO(Basic)) Interval Time(us): 0 (설정하지 않을 경우 보통 2ms)
Field Type
Set Field: Field Type value set to the right, select the item and to specify one.
Set Parity: Verify the accuracy range of Even Parity and Odd Parity
※ Tip: 26bit = Except for Even Parity , 12bit Specify +Except for Odd Parity , 12bit Specify
Set Wiegand In
Wiegand support is available in the terminal for connecting external wiegand card readers or
controllers. Note that in UNIS a fully customizable setting for Wiegand Input and Wiegand Output can
be programmed. Standard 26bit, 34bit Wiegand, as well as a variety of settings are available in your
environment. In addition, the parity, number of bits, data fields can be set and downloaded to the
terminal. Here is how to set up for Wiegand Input.
Bit Length: Length settings
- Unused : When Disabled
- St. 26bit : When the standard 26bit
- St. 34bit : When the standard 34bit
- Customize : Users when any designated date
Custom Size: settings is Bit Length - [Customize] then Length select( Range: 1~128bit )
Field Type
: Input Data 1
: Input Data 2
: Input Data 3
: Input Data 4
: Input Data 5
Set Field: Field Type value set to the right, select the item and to specify one.
Set Parity: Verify the accuracy range of Even Parity and Odd Parity
※ Tip: 26bit = Except for Even Parity , 12bit Specify +Except for Odd Parity , 12bit Specify
Card Data
Digit Size
Bit Order: Data transmission (MSB(Basic): Sequential Transfer / LSB: Reverse Transfer)
※ Tip: MSB: Most Significant Bit: The most significant bit: the first digit of binary numbers
LSB: Least Significant Bit: Least significant bit: the last digit of binary numbers
Standard Card
Serial Number Type: If a user chooses an authentication method [Card Serial No]
- Default: 8-digit display with hex
- Hexa String: Changing the order of Byte / 8-digit display with hex
- Decimal String: hex to 10-digit display with decimal number
- 3.5 Decimal : Change the hexadecimal number (8 digits) into decimal number (10 digits).
Sector information: If a user chooses an authentication method [Card Data] or [MAD]
- Sector: [Card Information] depending on card capacity, 000~127 select
- Block: 0~2 block
- Data Start / Data Length: Start of the data sequence number / Data Full length
- Key Type: KEY A or KEY B
- Key Value
- Size of summary card
After choosing the data on the list below press Delete button to delete it.
Press Send to Terminal button to send the setting information to the terminal.
Purchase page link: To issue the mobile card, a user should purchase in the assigned number. It
connects with the corresponding site to purchase.
Sign in: It tries to log-in with the information of the registered manager.
Country Code / Mobile Number: Country code or Mobile number of the manager.
Time zone: The time information to use the mobile card service.
renewal list: Renewal Management about the user who got the mobile card.
Renewal List
Automatically renew setting of user renewal list and mobile card expiration date.
Expiration Date Range: Search the user to issue the mobile card with the following
condition.
Automatic Renewal: Select the inquired user, set whether automatic renewal or not
and reflect the list pressing the Modify button. And then the setting information of
automatic renewal applies in the mobile card server.
Manual synchronization: If bringing back the users from the terminal after uploading,
when only running NIS B Plus and the terminal, it synchronizes the information such
as mobile card access period and KeyNo from the mobile card server.
2.10.1.9 DVR Configuration Setting
It can set a various of DVR in advance and select the DVR when registering the terminal.
DVR configuration
DVR Previous Play time: Set from 0 to 1800 per seconds and set the play time before the
event occurs when playing the video.
Input Information
Add/Delete Holiday
After entering all holidays, press Register button to assign holidays to their applicable codes.
※ As some holidays such as New Year’s Day and Thanksgiving Day in lunar calendar change
every year, it is necessary to set these holidays every year.
2.10.2 CONFIGURATION
2.10.2.1 Access Control Settings
An administrator uses the access control function to restrict user’s access by a date of the week.
▶ [SETTINGS]-[CONFIGURATION]-[Access Control Settings] from the right side menu, Time Zone,
Access Hour, Access Area and Access Group that are lower functions of Access Control are configured
as tab to show their setting values.
To set the Access Control, use [Wizard] function or Set [Time Zone][Access Time][Access
Area][Access Group] directly.
To set the Access Control, use [Wizard] function or Set [Time Zone][Access Time][Access
Area][Access Group] directly.
Set access group to terminal: Transfer the access group to the terminal after finishing
[Wizard].
Set access group to user: Set the access group after finishing [Wizard].
Registration Procedures
3) Check the time zone to use and enter the time range value.
If a time zone is assigned, the precise time of the time zone is displayed at Time Zone Setting.
2.10.2.1.3 Access Time
Access time for weekday and holiday is set according to codes. The set value will be applied
when setting the access group.
After entering the desired code and name, set a time zone code set at [Add Time
Zone] according to dates of the week and holidays. Holiday setting [Holiday Management]
code is registered in the holidays.
Enter the desired code and name, select the access time to be used in the access area and
select the terminal available.
2.10.2.1.5 Access Group
Set the Access Area to be included in Access Group.
Enter the desired code and name to select the desired code from the registration code in [Add
Access Area]
Enter the desired code and name to select the desired code from the
registration code in [Add Access Area].
Start Date : Choose the starting date to apply the selected Access Group
Repeat After : Choose the period to repeat the selected Access Group
Access Shift Code : Double-click to choose the different shift code to apply the selected
day.
- To insert the code manually, double-click [Enter Directly]
Send to Terminal : This button is used to send this configuration to the terminal.
After setting a range that can be managed by assigning a range at set detailed items.
**** A general user cannot make change, and the default setting is assigned to all users.
All administrators can search general users but only the upper level administrator can make a
change.
3. Appendix
When attempting re-authentication with terminal 1 in Zone 1 instead of accessing zone 2, the
access is in fact not allowed.
2.. Public Office: Example of Attendance Setting at Public Office such as Overtime Work. ▶ Move to
[Public Office]
3. Night Shift: Example of the case where the range of attendance per day is 24 hours like frequent
night shifts ▶ Move to [Night Shift]
4. Shift Work: Example of the case where the range of Going to and Leaving from Work is
complicated like three-shift work, etc. ▶ Move to [Shift Work]
5. Multiple Going to and Leaving from Work: Applicable when the frequency of Going to and Leaving
from Work is one or more times per work day. For example, it is the case where the work is divided
into Morning work - Break - Afternoon work and the Times when going to and leaving from work is
added to the range of Morning/Afternoon Work Range respectively ▶ Move to [Multiple Going to and
Leaving from Work]
☞ Code: 11 / Name: Enter the ordinary days (ex. Working day, normal day, etc.)
② Clocking Mode
- Use all function keys: Acknowledge all the records inquired in [Log Management]-[Access Log]as
the attendance record
- Use attend and leave keys: Acknowledge the first and last among the records, [Mode] of which
inquired in [Log Management]-[Access Log] are Going to and Leaving from Work data
③ Time Frame: Process the record of Going to and Leaving from Work within the applicable zone as
the attendance
☞ Normally set to 06:00~+06:00 (In the event of going to work at 05:59 and going
from work at 06:01 on the following day, it is not recorded as attendance)
④ Set Shift Times: Split into a maximum of five types depending on options
☞ Normal Time: 09:00~18:00 (Times of going to work and leaving from work to be
entered accurately)
☞ etc, In the event of counting Time Before Shift, Overtime1 Hours, Overtime2 Hours
enter the applicable time
※Note: The range of time zones of [Start] and [End] must be within the time range
input in No.
2. [TNA Settings]: Register the work type in accordance with the work schedule as follow in [Set
Schedule]
① Code: Enter a four-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
③ Set Shift: Double-click to inquire the work code registered in [ Shift Config ]
3. [TNA Settings]: Designate the attendance codes registered as follow on a lump sum basis in
[Apply Schedule].
① Apply Schedule: Select the work type to be applied
Set: Click this button to have the applicable contents to be applied to the employee checked as
above.
4. [TNA]: Attendance is counted and applied based on the set value registered as follow in [Process
Transanctions]
① Set Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
: Press button to display complete message on the processing result after processing.
5. [TNA]: Inquire the attendance results as follow from [Output Period Result]
① ① Search Period: Designate the subject period of attendance processing. (Maximum Period: 31
days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
③ Transaction Reports
Arrival Departure Late After Early Departure Normal Time Before Overtime1
Date
Time Time Time Time Time Shift Hours
Attendance After Before
09:00 18:00 Before 18:00 9Hours After 18:00
Setting Value 09:00 09:00
2010-05-06 09:01 18:42 00:01 00:00 08:59 00:00 00:42
2010-05-07 08:48 20:31 00:00 00:00 09:00 00:12 02:31
☞ Code: 01 / Name: Enter the ordinary days (ex. Date of Work, Weekday, etc.)
② Clocking Mode
- Use all function keys: Acknowledge all the records inquired in [Log Management]-[Access Log]as
the attendance record
- Use attend and leave keys: Acknowledge the first and last among the records, [Mode] of which
inquired in [Log Management]-[Access Log] are Going to and Leaving from Work data
③ Time Frame: Process the record of Going to and Leaving from Work within the applicable zone as
the attendance
☞ Normally set to 04:00~+04:00 (In the event of going to work at 03:59 and leaving
from work at 05:01 on the following day, it is not recorded as attendance)
④ Set Shift Times: Split into a maximum of five types depending on option
☞ Normal Time: 09:00~18:00 (Times of going to work and leaving from work to be
entered accurately)
☞ Time Before Shift: 04:00~09:00 / ☞ Overtime1 Hours: 18:00~+04:00 (Omit entry if
counting is not necessary)
☞ Overtime3 Hours: 04:00~09:00 / ☞ Overtime3 Hours: 18:00~+04:00 (All the hours
other than basic work are summed up as excessive hours)
※Note: The range of time zones of [Start] and [End] must be within the time range
input in No.
2. [TNA Settings]: Register the work type in accordance with the work schedule as follow in [Set
Schedule]
① Code: Enter a four-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
③ Set Shift: Double-click to inquire the work code registered in [ Shift Config ]
④ Overtime3 Hours Detail: Set the public office overtime work standard
☞ Add. Hours After: The set time based on the over time.
☞ Del. Hours: One hour is deducted for the overtime work period
☞ Del. Hours After: The set time based on the deducted time ☞ Min. Time: Acknowledge as
overtime work when the work time is at least one hour
☞ Max. Time: Acknowledges a maximum of four hours per day
☞ Rate: Rate the time base on the minimum time.
- Define Pay Period Rules: When processing TNA, the detailed setting and contents are same.
☞ Transfer to : Add the corresponding over time to the other working time.
3. [TNA Settings]: Designate the attendance codes registered as follow on a lump sum basis in
[Apply Schedule]
① Apply Schedule: Select the work type to be applied
Set: Click this button to have the applicable contents to be applied to the employee checked as
above.
4. [TNA]: Attendance is counted and applied based on the set value registered as follow in [Process
Transactions]
① Set Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
Process: Press Process button to display ‘complete’ message on the processing result after
processing.
5. [TNA]: Inquire the attendance results as follow from [Output Period Result]
① Search Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
③ Transaction Reports
☞ Overtime3 Hours: Hours other than the basic work, acknowledges a maximum of four
hours per day (For a minimum of at least one hour, basically one hour is deductible)
Early
Arrival Departure Late After Normal Time Before Overtime1
Time Departure Overtime3 Hours
Time Time Time Time Shift Hours
Time
Attendance
Time Before
Setting 09:00 18:00 After09:00 Before18:00 9Hours Before09:00 After18:00
Shift+Overtime1
Value
07:20 +01:25 00:00 00:00 09:00 01:40 07:25 04:00
☞ Overtime3 Hours =1:40+7:25 = 9:05 (Del. Hours 1, Max. Time 4) ▷ 4:00
CASE1
11:02 +01:05 02:02 00:00 06:58 00:00 07:05 04:00
☞ Overtime3 Hours = 07:05 (Del. Hours 1, Max. Time 4) ▷ 4:00
12:41 22:55 03:41 00:00 05:19 00:00 04:55 03:55
CASE2
☞ Overtime3 Hours = 04:55 (Del. Hours 1) ▷ 3:55
08:50 19:33 00:00 00:00 09:00 00:10 01:33 00:00
☞ Overtime3 Hours = 00:10 + 01:33 = 01:43 (Del. Hours 1, Min. Time 1) ▷ 00:00
CASE3
08:41 19:27 00:00 00:00 09:00 00:19 01:27 00:00
☞ Overtime3 Hours = 00:19+ 01:27 = 01:46 (Del. Hours 1, Min. Time 1) ▷ 00:00
☞ Overtime3 Hours: Time other than Basic Work Time, Acknowledge a maximum of
four hours per day (Del. Hours 1)
Time Arrival Departure Late After Early Normal Time Before Overtime1 Overtime3 Hours
Time Time Time Departure Time Shift Hours
Time
Attendance Time Before
09:00 18:00 After09:00 Before18:00 9Hours Before09:00 After18:00
Setting Value Shift+Overtime1
08:41 19:27 00:00 00:00 09:00 00:19 01:27 00:46
☞ Overtime3 Hours = 00:19+ 01:27= 01:46 (Del. Hours 1) ▷ 00:46
CASE4
07:15 15:13 00:00 02:47 06:13 01:45 00:00 00:45
☞ Overtime3 Hours = 01:45 (Del. Hours 1) ▷ 00:45
☞ Code: 44 / Name: Enter the ordinary days (ex. Working day, normal day, etc.)
② Clocking Mode
- Use all function keys: Acknowledge all the records inquired in [Log Management]-[Access Log]as
the attendance record
- Use attend and leave keys: Acknowledge the first and last among the records, [Mode] of which
inquired in [Log Management]-[Access Log] are Going to and Leaving from Work data.
③ Time Frame: Process the record of Going to and Leaving from Work within the applicable zone as
the attendance
☞ Normal Time: All hours from the time when going to work until the time when
leaving from work (Count it as the record of Going to and Leaving from Work within the
applicable zone)
※If there is Basic Work Time Standard, set in the same way as general workplace
2. [TNA Settings]: Register the work type in accordance with the work schedule as follow in [Set
Schedule]
① Code: Enter a four-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
③ Set Shift: Double-click to inquire the work code registered in [ Shift Config ]
3. [TNA Settings]: Designate the attendance codes registered as follow on a lump sum basis in
[Apply Schedule]
4. [TNA]: Attendance is counted and applied based on the set value registered as follow in [Process
Transactions].
① Set Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
after processing
5. [TNA]: Inquire the attendance results as follow from [Output Period Summary]
① Search Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
③ Transaction Reports
☞ Calculation Standard: Record of going to work and leaving from work between 06:00
and +12:00
☞ Code: 11 / Name: Enter the ordinary days (ex. Working day, normal day, etc.)
② Clocking Mode
- Use all function keys: Acknowledge all the records inquired in [Log Management]-[Access Log]as
the attendance record
- Use attend and leave keys: Acknowledge the first and last among the records, [Mode] of which
inquired in [Log Management]-[Access Log] are Going to and Leaving from Work data
※ Authentication record used for attendance is applied when such authentication was successful(The
record of failure in authentication is disregarded from the attendance)
③ Time Frame: Process the record of Going to and Leaving from Work within the applicable zone as
the attendance
☞ Normal Time: 08:00~16:00 (Times of going to work and leaving from work to be
entered accurately) Enter the time in accordance with each shift work time
☞ ☞ etc, In the event of counting Time Before Shift, Overtime1 Hours, Overtime2 Hours
enter the applicable time
※Note: The range of time zones of [Start] and [End] must be within the time range
input in No.
2. [TNA Settings]: Register the work type in accordance with the work schedule as follow in [Set
Schedule]
① Code: Enter a four-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
② Repeat After: Select the number of days revolving repeatedly (Normally in the unit of 7 days)
☞ Select 7 days (Normally repeated in the unit of 7 days)
③ Set Shift: Double-click to inquire the work code registered in [ Shift Config ]
3. [TNA Settings]: Designate the attendance codes registered as follow on a lump sum basis in
[Apply Schedule]
4. [TNA]: Attendance is counted and applied based on the set value registered as follow in [Process
Transactions].
① Set Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
Process: Press Process button to display complete message on the processing result after
processing.
5. [TNA]: Inquire the attendance results as follow from [Output Period Result]
① Search Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
Date Work Type Arrival Time Departure Time Normal Time Time Before Shift Overtime1 Hours
2010-01-01 Morning 7:31 16:59 8:00 0:29 0:59
2010-01-02 Morning 7:19 17:39 8:00 0:41 1:39
2010-01-03 Morning 6:22 17:22 8:00 1:38 1:22
2010-01-04 Night 23:49 +8:49 8:00 0:11 0:49
2010-01-05 Night 23:19 +9:34 8:00 0:41 1:34
2010-01-06 Holiday - - - - -
2010-01-07 Day 15:37 +1:47 8:00 0:23 1:47
2010-01-08 Day 15:09 +1:53 8:00 0:51 1:53
2010-01-09 Day 14:58 +1:49 8:00 1:02 1:49
2010-01-10 Night 22:55 +8:40 8:00 1:05 0:40
2010-01-11 Holiday - - - - -
2010-01-12 Morning 7:40 16:15 8:00 0:20 0:15
① Code: Enter a two-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
☞ Code: Individual Entry / Name: Multiple going to and leaving from work
② Clocking Mode
- Use all function keys: Acknowledge all the records inquired in [Log Management]-[Access Log]as
the attendance record
- Use attend and leave keys: Acknowledge the first and last among the records, [Mode] of which
inquired in [Log Management]-[Access Log] are Going to and Leaving from Work data
※ Authentication record used for attendance is applied when such authentication was successful(The
record of failure in authentication is disregarded from the attendance)
③ Time Frame: Process the record of Going to and Leaving from Work within the applicable zone as
the attendance
⑤ Advanced Settings(Clocking)
☞ ① 1st Band: 06:00~13:00 / 2nd Band: 13:00~22:00
☞ Broadly set Normal Time so as to include the time zones 08:00~12:00 and
14:00~18:00
☞ The hours of 1st Band and 2nd Band may not be overlapped
⑥ Advanced Settings(Shift)
☞ Set the applicable zones to 1st Band, 2nd Band, Not Defined, Not Defined for the
Shift1 through Shift4 settings as above
2. [TNA Settings]: Register the work type in accordance with the work schedule as follow in [Set
Schedule]
① Code: Enter a four-character code consisting of digits or English alphabet letters without
overlapping (Special characters are not allowed) / Name: Code Name
② Repeat After: Select the number of days revolving repeatedly (Normally in the unit of 7 days)
③ Set Shift: Double-click to inquire the work code registered in [ Shift Config ]
3. [TNA Settings]: Designate the attendance codes registered as follow on a lump sum basis in
[Apply Schedule]
① Apply Schedule: Select the work type to be applied
Set: Click this button to have the applicable contents to be applied to the employee checked as
above.
4. [TNA]: Attendance is counted and applied based on the set value registered as follow in [Process
Transactions]
① Set Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
Process: Press the button to print the complete message after processing.
5. [TNA]: Inquire the attendance results as follow from [Output Period Result]
① Search Period: Designate the subject period of attendance processing. (Maximum Period: 31 days)
☞ Normally in the unit of a day or seven days (The data of attendance processed must
exist during the applicable period)
③ Transaction Reports
☞ Calculation Standard: Normal Time = Time Before Shift in the morning + Overtime1
Hours Work in the afternoon
Clock Time
Arrival Departure Normal Clock Overtime1 Overtime1 Overtime1
Date Out Before
Time Time Time IN from starts ends Hours
from Shift
2010-03-02 07:56 19:36 8:00 07:56 12:01 4:00 13:57 19:36 4:00
2010-03-03 07:46 21:56 8:00 07:46 12:47 4:00 13:59 21:56 4:00
2010-03-04 07:38 18:38 8:00 07:38 12:38 4:00 13:38 18:38 4:00
2010-03-05 07:27 19:47 8:00 07:27 12:55 4:00 13:25 19:47 4:00
2010-03-06 13:22 19:04 4:00 - - 0:00 13:22 19:04 4:00
※When the number of multiple zones is at least three, it is impossible to
inquire the record of going to and leaving from work in the morning and
afternoon as above respectively
☞ Final time when going to work and leaving from work and total basic
work hours can be checked by designating the basic work time setting
only
Shift 1 ~ Shift 5
Pay Rate: [Shift Config]- Title of the work set in [Set Shift Times] (Inactive Window)
Rounding: Enable to set in accordance with time & attendance calculation standard such as
applying all the minute units, rounding off 10 minutes, etc.
Min. Time: Minimum time recognized. That is, if the basic work hours are 9 hours and the
minimum one hour’s work can be recognized as basic work, then the minimum time will be 1 hour. So
if the basic work hour is 59 minutes, it cannot be recognized as basic work.
Max. Time: Maximum time recognized. That is, if the basic work hours are 9 hours, although one
worked for 13 hours as overtime work, the work hours recognized is 10 hours only where the
maximum time is specified as 10 hours.
Rate: Ratio of Extra Hourly Pay by Work Hours Zone for Calculation (Basic 100%, setting is
changed in case night shift work, etc. is added)
Select Range: [Shift Config]-Apply the zone value set in [Multiple going to and leaving from
work)]
Checking this item activates the setting window.
Shift Auto OUT: Recognized as sign-out if there is no record of sign-out for Multiple Sign in/out
Zone Setup.
Essential items can be moved to other positions, but the item itself may not be excluded from
selection.
The following is an example of setting the 26bit Wiegand for. Part of the default settings below for
other options if a user needs to input: [Set Wiegand Out Format] ¹× [Set Wiegand In Format]. Please
refer to the section.
③ Field Type: First, select . As shown above, Set Field area, click once. Other type is
the same way too. ☞ E: 1bit / S: 8bit / D: 16bit / O: 1bit
③ Field Type: First, select . As shown above, click ④ Set Field area and set. Other type is the
same way too.
☞ E: 1bit / 1 (Card Data 1): 8bit / 2 (Card Data 2): 8bit / 3 (Card Data 3): 8bit / O: 1bit
⑥ Card Data: Card Number (0× B2 0× 34 0× 74) Type and Each digit Set, ④ Set Field area click,
is set as shown above. , this is enter the same way too.
☞ 1 (Card Data 1): Data Type - Hexa String / Digit Size - 2 / Bit Order - MSB
☞ 2 (Card Data 2): Data Type - Hexa String / Digit Size - 2 / Bit Order - MSB
☞ 3 (Card Data 3): Data Type - Hexa String / Digit Size - 2 / Bit Order - MSB
③ Field Type: First, select . As shown above, ④ Set Field area, click once. Other
type is the same way too.
☞ E: 1bit / 1 (Card Data 1): 24bit / O: 1bit
④ Set Field: Is set as shown above.
⑤ Set Parity: First, select on Set Field area and specify - From second bit to 13th bit . Next
select, specified - From 14th bit to 25th bit
☞ E: 2bit~13bit / O: 14bit~25bit
⑥ Card Data: Card Number (0× B2 0× 34 0× 74) Type and Each digit Set, ④ Set Field area click,
is set as shown above.
☞ 1 (Card Data 1): Data Type - Decimal String / Digit Size - 10 /Bit Order - MSB
③ Field Type: First, select . As shown above, ④ Set Field area, click once. Other
type is the same way too.
☞ E: 1bit / 1 (Card Data 1): 8bit / 2 (Card Data 2): 16bit / O: 1bit
④ Set Field: Set as shown above.
⑤ Set Parity: Set Parity: First, select on ④Set Field area and specify - From second bit to 13th
bit . Next select and specify - From 14th bit to 25th bit
☞ E: 2bit~13bit / O: 14bit~25bit
⑥ Card Data: Set Card Number 0× B2 0× 34 0× 74 Type and Each digit, and click on ④ Set
Field area as it is shown above. has the same way.
☞ 1 (Card Data 1): Data Type - Decimal String / Digit Size - 3 / Bit Order - MSB
☞ 2 (Card Data 2): Data Type - Decimal String / Digit Size - 5 / Bit Order - MSB
3.5.1 Introduction
This document is based on the Activation.pdf document from NEURO technology Co.,Ltd, which
provides face authentication algorithm. For more detailed information, refer Activation.pdf.
Unzip a file in UNIS installation path after downloading the license activation program to show the
following file. (If unzipping a file in the path including characters, not English, a user can fail the gain
of license in UNIS. (A user should unzip a file in the English folder.)
When running the program Activation Wizard.exe, the following window appears.
Press Finish button, the following license activation screen appears like below.
When checking the detailed information tap from task manager, ‘pg.exe’, which is Activation service
program, runs.
※ ‘pg.exe’ is the program that communicates the face authentication SDK and API.
If a user does the forced termination, the function of face authentication is not worked.
Please be careful.
To activate the license, press Browse button and attach the issued license file (*.sn).
** When using USB dongle license, the serial license (*.sn) is not needed.
In general, attach *.sn file as the following picture below.
When pressing Open button, the file is added as below.
※ When pressing Activate button, the fixed license activates in the corresponding PC.
After that, the corresponding license cannot be used in the other PC, please be careful.
After completing , “Activated” appears on the status window.
When pressing Finish button, Licenses folder is created and the license file appears as below.
※ Please Keep your license file after the separate backup not to be deleted because it affects the
face authentication action and it is used in Deactivate.
If attempting to activate or deactivate your license several times, a user may encounter the following
error.
If an error occurs, please send an activation request to Neurotechnology's customer support email
([email protected]) directly, as the screen messages above.
Activate the license through the link site below with computer id file.
http://www.neurotechnology.com/cgi-bin/nla.cgi
Regarding to how to create Computer id file, please refer to "2.2.1 Single computer license" items,
which is Activation.pdf file.
3.5.3 Deactivating License
To deactivate the license, a user can move the license to the other PC.
※ If a user often run a license Activate and Deactivate, the user may not be able to use the license
according to Neurotechnology licensing policy. Please refer the Activation.pdf file for more information.
If pressing Deactivate button in Activation Wizard, the list of licenses appears as follows:
Select the license a user wants to deactivate and press Deactivate button.
If pressing Deactivate button, the warning message appears as below and the deactivation
processes.
please send a deactivation request by sending the two files to Neurotechnology's customer support
email ([email protected]) directly.
With the files generated from items, a user can proceed to deactivate from the following site.
http://www.neurotechnology.com/cgi-bin/nlz.cgi