Web 3.0 Manual
Web 3.0 Manual
Controller
User's Manual
V1.0.1
Foreword
General
This manual introduces the functions and operations of the Face Recognition Access Controller
(hereinafter referred to as the "Access Controller"). Read carefully before using the device, and keep
the manual safe for future reference.
Safety Instructions
Revision History
As the device user or data controller, you might collect the personal data of others such as their
face, fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
I
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Access Controller, hazard
prevention, and prevention of property damage. Read carefully before using the Access Controller,
and comply with the guidelines when using it.
Transportation Requirement
Transport, use and store the Access Controller under allowed humidity and temperature conditions.
Storage Requirement
Store the Access Controller under allowed humidity and temperature conditions.
Installation Requirements
● Do not connect the power adapter to the Access Controller while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the Access Controller.
● Do not connect the Access Controller to two or more kinds of power supplies, to avoid damage
to the Access Controller.
● Improper use of the battery might result in a fire or explosion.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the Access Controller in a place exposed to sunlight or near heat sources.
● Keep the Access Controller away from dampness, dust, and soot.
● Install the Access Controller on a stable surface to prevent it from falling.
● Install the Access Controller in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Access
Controller label.
● The Access Controller is a class I electrical appliance. Make sure that the power supply of the
Access Controller is connected to a power socket with protective earthing.
III
Operation Requirements
IV
Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Overview...........................................................................................................................................................1
1.1 Introduction........................................................................................................................................... 1
1.2 Features.................................................................................................................................................. 1
1.3 Application............................................................................................................................................. 1
2 Local Operations.............................................................................................................................................. 3
2.1 Basic Configuration Procedure............................................................................................................. 3
2.2 Common Icons........................................................................................................................................3
2.3 Initialization........................................................................................................................................... 4
2.4 Standby Screen...................................................................................................................................... 4
2.5 Logging In...............................................................................................................................................6
2.6 Network Communication...................................................................................................................... 6
2.6.1 Configuring IP.............................................................................................................................. 6
2.6.2 Active Register.............................................................................................................................7
2.6.3 Configuring Wi-Fi.........................................................................................................................8
2.6.4 Configuring Serial Port ...............................................................................................................9
2.6.5 Configuring Wiegand.................................................................................................................. 9
2.7 User Management............................................................................................................................... 10
2.7.1 Adding Users..............................................................................................................................10
2.7.2 Viewing User Information.........................................................................................................12
2.7.3 Configuring Administrator Password......................................................................................13
2.8 Access Management............................................................................................................................ 14
2.8.1 Configuring Unlock Combinations.......................................................................................... 14
2.8.2 Configuring Alarms................................................................................................................... 15
2.8.3 Configuring Door Status........................................................................................................... 17
2.8.4 Configuring Lock Holding Time............................................................................................... 17
2.9 System.................................................................................................................................................. 17
2.9.1 Configuring Time.......................................................................................................................17
2.9.2 Configuring Face Parameters................................................................................................... 19
2.9.3 Setting Volume.......................................................................................................................... 21
2.9.4 (Optional) Configuring Fingerprint Parameters..................................................................... 21
2.9.5 Screen Settings.......................................................................................................................... 21
2.9.6 Restoring Factory Defaults....................................................................................................... 21
2.9.7 Restart the Device..................................................................................................................... 21
2.10 USB Management.............................................................................................................................. 21
2.10.1 Exporting to USB..................................................................................................................... 22
V
2.10.2 Importing From USB............................................................................................................... 22
2.10.3 Updating the System.............................................................................................................. 23
2.11 Configuring Features.........................................................................................................................23
2.12 Unlocking the Door........................................................................................................................... 25
2.12.1 Unlocking by Cards................................................................................................................. 25
2.12.2 Unlocking by Face................................................................................................................... 25
2.12.3 Unlocking by User Password.................................................................................................. 26
2.12.4 Unlocking by Administrator Password..................................................................................26
2.12.5 Unlocking by QR code.............................................................................................................26
2.12.6 Unlocking by Fingerprint....................................................................................................... 26
2.13 System Information...........................................................................................................................26
2.13.1 Viewing Data Capacity............................................................................................................27
2.13.2 Viewing Device Version.......................................................................................................... 27
3 Web Operations............................................................................................................................................. 28
3.1 Initialization......................................................................................................................................... 28
3.2 Logging In.............................................................................................................................................28
3.3 Resetting the Password.......................................................................................................................29
3.4 Configuring Door Parameters.............................................................................................................30
3.5 Configuring Alarm Linkage.................................................................................................................33
3.5.1 Setting Alarm Linkage.............................................................................................................. 33
3.5.2 Viewing Alarm Logs.................................................................................................................. 35
3.6 Intercom Configuration.......................................................................................................................35
3.6.1 Configuring SIP Server.............................................................................................................. 35
3.6.2 Configuring Basic Parameters.................................................................................................. 39
3.6.3 Adding the VTO......................................................................................................................... 41
3.6.4 Adding the VTH......................................................................................................................... 42
3.6.5 Adding the VTS.......................................................................................................................... 44
3.6.6 Viewing Device Status...............................................................................................................44
3.6.7 Viewing Call Logs...................................................................................................................... 44
3.7 Personalization.................................................................................................................................... 45
3.7.1 Adding Resources......................................................................................................................45
3.7.2 Configuring Themes..................................................................................................................46
3.8 Configuring Time Schedules............................................................................................................... 49
3.8.1 Configuring Time Sections........................................................................................................49
3.8.2 Configuring Holiday Groups.....................................................................................................50
3.8.3 Configuring Holiday Plans........................................................................................................51
3.9 Data Capacity....................................................................................................................................... 52
3.10 Configuring Video and Image...........................................................................................................52
3.10.1 Configuring Videos................................................................................................................. 52
3.10.2 Setting the Volume................................................................................................................. 59
VI
3.10.3 Configuring Local Coding....................................................................................................... 59
3.10.4 Configuring Image Mode........................................................................................................59
3.11 Configuring Face Detection.............................................................................................................. 60
3.12 Configuring Network.........................................................................................................................62
3.12.1 Configuring TCP/IP..................................................................................................................62
3.12.2 Configuring Ports.................................................................................................................... 64
3.12.3 Configuring Automatic Registration..................................................................................... 65
3.12.4 Configuring Cloud Service......................................................................................................65
3.12.5 Configuring Serial Port........................................................................................................... 66
3.12.6 Configuring Wiegand..............................................................................................................67
3.13 Safety Management.......................................................................................................................... 68
3.13.1 Configuring IP Authority........................................................................................................ 68
3.13.2 Configuring System.................................................................................................................71
3.14 User Management............................................................................................................................. 77
3.14.1 Adding Users........................................................................................................................... 77
3.14.2 Adding ONVIF Users................................................................................................................78
3.14.3 Viewing Online Users.............................................................................................................. 80
3.15 Maintenance...................................................................................................................................... 80
3.16 Configuration Management............................................................................................................. 80
3.16.1 Exporting/Importing Configuration Files............................................................................. 80
3.16.2 Restoring Factory Defaults.....................................................................................................81
3.17 Updating the System.........................................................................................................................81
3.17.1 File Update...............................................................................................................................82
3.17.2 Online Update......................................................................................................................... 82
3.18 Viewing Version Information........................................................................................................... 82
3.19 Viewing Logs......................................................................................................................................82
3.19.1 System Logs............................................................................................................................. 82
3.19.2 Admin Logs.............................................................................................................................. 83
3.19.3 Unlocking Logs........................................................................................................................ 83
4 Smart PSS Lite Configuration....................................................................................................................... 84
4.1 Installing and Logging In.................................................................................................................... 84
4.2 Adding Devices.................................................................................................................................... 84
4.2.1 Adding Device One By One.......................................................................................................84
4.2.2 Adding Devices in Batches....................................................................................................... 85
4.3 User Management............................................................................................................................... 87
4.3.1 Configuring Card Type..............................................................................................................87
4.3.2 Adding Users..............................................................................................................................87
4.3.3 Assigning Access Permission....................................................................................................92
4.4 Access Management............................................................................................................................ 93
4.4.1 Remotely Opening and Closing Door...................................................................................... 93
VII
4.4.2 Setting Always Open and Always Close...................................................................................94
4.4.3 Monitoring Door Status............................................................................................................ 94
Appendix 1 Important Points of Intercom Operation..................................................................................96
Appendix 2 Important Points of QR Code Scanning.................................................................................... 97
Appendix 3 Important Points of Fingerprint Registration Instructions.....................................................98
Appendix 4 Important Points of Face Registration....................................................................................100
Appendix 5 Security Recommendation...................................................................................................... 103
VIII
1 Overview
1.1 Introduction
The access controller is an access control panel that supports unlock through faces, passwords,
cards, fingerprint, QR code, and their combinations. Based on the deep-learning algorithm, it
features faster recognition and higher accuracy. It can work with management platform which
meets various needs of customers.
1.2 Features
● 7" LCD with a resolution of 1024 × 600.
● The 2-MP dual-lens CMOS camera and high-performance image sensor ensure accurate
recognition even in poor lighting and dark locations that lack illumination.
● Features auto illumination to effectively reduce light pollution.
● Supports 50,000 users (up to 50 administrators), 50,000 faces, 50,000 passwords, 100,000 cards,
10,000 fingerprints and 300,000 records.
● Multiple unlock methods including face, IC card, password, fingerprint and QR code. You can
also combine them to create your own personal unlock methods.
● Displays the face bounding box and detects the face that occupies the most pixels in real time.
You can also set target face filtering by configuring the face pixel threshold.
● Recognizes faces 0.3 m to 2.0 m away (0.98 ft–6.56 ft), and detects persons between the height
of 0.9 m and 2.4 m (2.95 ft–7.87 ft) when the camera is installed 1.4 m above the ground.
● Powered by the face recognition deep learning algorithm, the device can accurately locate over
360 key points on the face of a target.
● Faces can be recognized within 0.2 seconds, without need for the person to touch the device.
● Features face mask detection and safety helmet detection.
● Multiple display modes and voice prompts are available for broadcasting recognition results to
protect the privacy of users.
● Liveness detection is used to detect spoof attempt, such as using a photo or video to gain
access.
● Offers multiple types of alarms such as duress, tamper, intrusion, unlock timeout, and excessive
use of illegal card and password.
● Supports different types of users, including general, patrol, blocklist, VIP, guest and other.
● Supports making video calls with indoor monitors, VTS, and mobile app.
● TCP/IP and Wi-Fi connection, auto registration, P2P registration, and DHCP.
● Supports beautifying faces.
● Recognizes up to 6 faces at the same time.
● Plays advertisements in video and image format.
● Online update and update through USB.
● Connects to DSS Pro and SmartPSS Lite.
1.3 Application
It is widely used in parks, communities, business centers and factories, and ideal for places such as
office buildings, government buildings, schools and stadiums.
1
Figure 1-1 Networking
2
2 Local Operations
2.1 Basic Configuration Procedure
Figure 2-1 Basic configuration procedure
Icon Description
Confirm.
Turn on.
Turn off.
Delete
Home screen
Search
3
2.3 Initialization
For the first-time use or after restoring factory defaults, you need to set a password and email
address for the admin account. You can use the admin account to log in to the main menu of the
Access Controller and the webpage.
Figure 2-2 Initialization
● If you forget the administrator password, send a reset request to your registered e-mail address.
● The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
● If there is no operation in 30 seconds, the access controller will go to the standby mode.
● This manual is for reference only. Slight differences might be found between the standby screen
in this manual and the actual device.
4
Figure 2-3 Homepage
5
2.5 Logging In
Log in to the main menu to configure the Access Controller. Only admin account and administrator
account can enter the main menu of the Access Controller. For the first-time use, use the admin
account to enter the main menu screen and then you can create the other administrator accounts.
Background Information
● admin account: Can log in to the main menu screen of the Access Controller, but has no door
access permission.
● Administration account: Can log in to the main menu of the Access Controller and has door
access permissions.
Procedure
Step 1 Press and hold the standby screen for 3 seconds, and then swipe left or right.
Step 2 select a verification method to enter the main menu.
● Face: Enter the main menu by face recognition.
● Fingerprint: Enter the main menu by using fingerprint.
● Card Punch: Enter the main menu by swiping card.
● PWD: Enter the user ID and password of the administrator account.
● admin: Enter the admin password to enter the main menu.
The serial port and the wiegand port might differ depending on models of Access Controller.
2.6.1 Configuring IP
Set IP address for the Access Controller to connect it to the network. After that, you can log in to the
webpage and the management platform to manage the Access Controller.
Procedure
Step 1 On the Main Menu, select Connection > Network > IP Address.
Step 2 Configure IP Address.
6
Figure 2-4 IP address configuration
Parameter Description
IP Address/Subnet Mask/Gateway The IP address, subnet mask, and gateway IP address must
Address be on the same network segment.
The management platform can clear all personnel configurations and initialize the Access
Controller. To avoid data loss, keep the management platform permissions properly.
7
Figure 2-5 Auto register
Step 2 Turn on the automatic registration function and set the parameters.
Parameter Description
Server Address The IP address of the management platform.
Port The port No. of the management platform.
Enter the device ID (user defined).
Wi-Fi function is only available for certain models of the Access Controller.
Step 2 Turn on Wi-Fi.
Step 3 Tap to search available wireless networks.
Step 4 Select a wireless network and enter the password.
If no Wi-Fi is searched, tap SSID to enter the name of Wi-Fi.
Step 5 Tap .
8
2.6.4 Configuring Serial Port
Procedure
Step 1 On the Main Menu, select Connection > Serial Port.
Step 2 Select a port type.
● Select Reader when the Access Controller connects to a card reader.
● Select Controller when the Access Controller functions as a card reader, and it will
send data to another external access controller.
Output Data type:
Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user's first card number when they use other unlock
methods.
No.: Outputs data based on the user ID.
● Select Reader (OSDP) when the Access Controller is connected to a card reader based
on OSDP protocol.
● Security Module: When a security module is connected, the exit button, lock and fire
alarm linkage will be not effective.
Figure 2-6 Serial port
9
Figure 2-7 Wiegand output
Parameter Description
Pulse Width
Enter the pulse width and pulse interval of Wiegand output.
Pulse Interval
The pictures in this manual are for reference only, and might differ from the actual product.
10
Figure 2-8 New user
Parameter Description
Enter user IDs. The IDs can be numbers, letters, and their
User ID combinations, and the maximum length of the ID is 32 characters.
Each ID is unique.
Enter name with at most 32 characters (including numbers, symbols,
Name
and letters).
Make sure that your face is centered on the image capturing frame,
Face and an image of the face will be captured and analyzed
automatically.
11
Parameter Description
A user can register five cards at most. Enter your card number or
swipe your card, and then the card information will be read by the
access controller.
Card You can enable the Duress Card function. An alarm will be triggered
if a duress card is used to unlock the door.
User Level
● User : Users only have door access permission.
● Admin : Administrators can unlock the door and configure the
access controller.
Period People can unlock the door only during the defined period.
Holiday Plan People can unlock the door only during the defined holiday plan.
Set a date on which the access permissions of the person will be
Valid Date
expired.
● General : General users can unlock the door.
● Blocklist : When users in the blocklist unlock the door, service
personnel will receive a notification.
● Guest : Guests can unlock the door within a defined period or for
certain amount of times. After the defined period expires or the
unlocking times runs out, they cannot unlock the door.
User Type ● Patrol : Patrol users will have their attendance tracked, but they
have no unlocking permissions.
● VIP : When VIP unlock the door, service personnel will receive a
notice.
● Others : When they unlock the door, the door will stay unlocked
for 5 more seconds.
● Custom User 1/Custom User 2: Same with general users.
12
Figure 2-9 Admin list
13
Figure 2-10 Set admin password
Step 2 Tap Administrator PWD, and then enter the administrator password.
Step 3 Tap .
Step 4 Turn on the administrator function.
Procedure
Step 1 Select Access > Unlock Mode > Unlock Mode.
Step 2 Select unlocking methods.
14
Figure 2-11 Element (multiple choice)
15
Figure 2-12 Alarm
Parameter Description
Users need to verify their identities both for entry and exit;
otherwise an alarm will be triggered. It helps prevents a card
holder from passing an access card back to another person
so they gain entry. When anti-passback is enabled, the card
holder must leave the secured area through an exit reader
before system will grant another entry.
Anti-passback
● If a person enters after authorization and exits without
authorization, an alarm will be triggered when they
attempt to enter again, and access is denied at the same
time.
● If a person enters without authorization and exits after
authorization, an alarm will be triggered when the they
attempt to enter again, and access is denied at the same
time.
16
Parameter Description
Intrusion and timeout alarms can be triggered only after
Door Sensor On
door sensor is enabled.
2.9 System
2.9.1 Configuring Time
Configure system time, such as date, time, and NTP.
Procedure
Step 1 On the Main Menu, select System > Time.
Step 2 Configure system time.
17
Figure 2-13 Time
Parameter Description
24-hour System The time is displayed in 24-hour format.
Date Setting Set up the date.
Time Set up the time.
Date Format Select a date format.
18
Parameter Description
19
Table 2-9 Description of face parameters
Name Description
Adjust the face recognition accuracy. Higher threshold means
Face Threshold
higher accuracy.
Set the maximum face pose angle for face detection. Larger value
Max. Angle of Face means larger face angle range. If the face pose angle is out of the
defined range, the face detection box will not appear.
Face images require desired pixels between the eyes (called
pupillary distance) for successful recognition. The default pixel is
Pupillary Distance 45. The pixel changes according to the face size and the distance
between faces and the lens. If an adult is 1.5 meters away from the
lens, the pupillary distance can be 50 px-70 px.
If a person with access permission has their face successfully
Recognition Timeout (S) recognized, the Access Controller will prompt face recognition
success. You can enter the prompt interval time.
If a person without access permission attempts to unlock the door
Invalid Face Prompt Interval for several times in the defined interval, the Access Controller will
(S) prompt face recognition failure. You can enter the prompt interval
time.
Supports detecting 6 face images at the same time, and the unlock
Multi-face Recognition combinations mode become invalid. The door is unlocked after
any one of them gain access.
20
2.9.3 Setting Volume
Procedure
Step 1 On the Main Menu, select System > Volume.
Step 2 Select Beep Volume or Mic Volume.
Step 3 Tap or to adjust the volume.
Procedure
Step 1 On the Main Menu, select System > Fingerprint.
Step 2 Tap or to adjust the value.
21
● Make sure that a USB is inserted to the Access Controller before you export data or update the
system. To avoid failure, do not pull out the USB or perform any operation of the Access
Controller during the process.
● You have to use a USB to export the information from an Access Controller to other devices.
Face images are not allowed to be imported through USB.
22
Figure 2-16 USB import
23
Figure 2-17 Privacy setting
Parameter Description
● PWD Reset Enable: You can enable this function to reset
password. The PWD Reset function is enabled by default.
● HTTPS:
Hypertext Transfer Protocol Secure (HTTPS) is a protocol for
secure communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI
commands; otherwise HTTP will be used.
24
Parameter Description
When the Access Terminal connects to a third-party device
through Wiegand input, and the card number read by the Access
Card No. Reverse
Terminal is in the reserve order from the actual card number, you
need to turn on the Card No. Reverse function.
NC: When the door opens, the circuit of the door sensor circuit is
closed.
NO: When the door opens, the circuit of the door sensor circuit is
Door Sensor
open.
Intrusion and overtime alarms are triggered only after door
detector is turned on.
25
2.12.3 Unlocking by User Password
Enter the user ID and password to unlock the door.
Procedure
Step 1 Tap on the standby screen.
Step 2 tap PWD Unlock, and then enter the user ID and password.
Step 3 Tap Yes.
Administrator password cannot be used to unlock when the door status is set to NC.
Step 3 Tap .
You can also place the QR code in front of the lens directly without tapping .
26
2.13.1 Viewing Data Capacity
On the Main Menu, select System Info > Data Capacity, you can view storage capacity of each
data type.
27
3 Web Operations
On the webpage, you can also configure and update the Access Controller.
3.1 Initialization
Initialize the Access Controller when you log in to the webpage for the first time or after the Access
Controller is restored to the factory defaults.
Prerequisites
Make sure that the computer used to log in to the webpage is on the same LAN as the Access
Controller.
Procedure
Step 1 Open a browser, go to the IP address (the default address is 192.168.1.108) of the Access
Controller.
● The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: upper case, lower case, numbers, and special
characters (excluding ' " ; : &). Set a high-security password by following the password
strength prompt.
● Keep the password safe after initialization and change the password regularly to
improve security.
3.2 Logging In
Procedure
Step 1 Open a browser, enter the IP address of the Access Controller in the Address bar, and
press the Enter key.
28
Figure 3-1 Login
● The default administrator name is admin, and the password is the one you set up
during initialization. We recommend you change the administrator password regularly
to increase security.
● If you forget the administrator login password, you can click Forget password? For
29
Figure 3-2 Reset password
● Up to two security codes will be generated when the same QR code is scanned. If the
security code becomes invalid, refresh the QR code and scan again.
● After you scan the QR code, you will receive a security code in your linked e-mail
address. Use the security code within 24 hours after you receive it. Otherwise, it will
become invalid.
● If the wrong security code is entered in a row, the administrator account will be frozen
for 5 minutes.
Step 4 Enter the security code.
Step 5 Click Next.
Step 6 Reset and confirm the new password.
The password should consist of 8 to 32 non-blank characters and contain at least two of
the following types of characters: upper case, lower case, number, and special character
(excluding ' " ; : &).
Step 7 Click OK.
30
Figure 3-3 Door parameter
Parameter Description
Name Enter a name of the door.
Set the door status.
● NO : The door remains unlocked all the time.
State ● NC : The door remains locked all the time.
● Normal : If Normal is selected, the door will be unlocked
and locked according to your settings.
31
Parameter Description
An alarm will be triggered when a duress card or duress
Duress Alarm
password is used to unlock the door.
Intrusion and overtime alarms can be triggered only after
Door Sensor
Door Sensor is enabled.
When Door Sensor is enabled, an intrusion alarm will be
Intrusion Alarm
triggered if the door is opened abnormally.
A timeout alarm will be triggered if the door remains unlocked
Overtime Alarm
for longer time than the Timeout (Sec).
Users need to verify their identities both for entry and exit;
otherwise an alarm will be triggered. It helps prevents a card
holder from passing an access card back to another person so
they gain entry. When anti-passback is enabled, the card
holder must leave the secured area through an exit reader
before system will grant another entry.
Anti-passback Alarm
● If a person enters after authorization and exits without
authorization, an alarm will be triggered when they
attempt to enter again, and access is denied at the same
time.
● If a person enters without authorization and exits after
authorization, an alarm will be triggered when the they
attempt to enter again, and access is denied at the same
time.
1. In the Opening Method list, select Unlock by Period, and then click .
Figure 3-4 Time section parameter
2. Configure the time and the opening method for a time section. You can configure
up to four time sections for a single day.
3. Select Apply to the whole week to copy the defined time to the rest of days.
● Group Combination
1. In the Opening Method list, select Group Combination, and then click .
2. Click Add.
32
3. Select an unlocking method in the Opening Method list., and enter the number of
valid users.
If the number of valid users is 2, and there are 3 users in the defined user list. Two
users in the list are required to grant access.
Figure 3-5 Group Combination
4. In the User List area, click Add User, enter the user ID of existing users.
1. In the Opening Method list, select Group Combination, and then click .
2. In the Combination list, select Or or And.
And means you must use all the selected methods to open the door.
Or means you can open the door with any of the selected methods.
3. In the Element list, select the unlock method.
Step 4 Configure other parameters.
Step 5 Click OK.
33
Step 2 Select Alarm Linkage > Alarm Linkage.
Figure 3-6 Alarm linkage
Step 3 Click , and then you can modify alarm linkage parameters.
Figure 3-7 Modify alarm linkage parameters
Parameter Description
Alarm Input The number of the alarm input which cannot be modified.
Name Enter the name of the alarm.
34
Parameter Description
When the Access Controller functions as the SIP server, it can connect up to 500 access control
devices and VTHs.
35
Procedure
Step 1 Select Intercom > SIP Server.
Step 2 Select a server type.
● Use the Access Controller as the SIP server.
Turn on SIP Server and keep other parameters as default.
Figure 3-8 Use the Access Controller as the SIP server
36
Figure 3-9 Use VTO as the SIP server
Parameter Description
IP Address IP address of the platform.
Username
Leave them as default.
Password
SIP Domain VDP.
SIP Server Username
The login username and password of the SIP server.
SIP Server Password
● Use the DSS Express or DSS Pro as the SIP server.
Do not enable SIP server . Select Express/DSS from the Server Type.
37
Figure 3-10 Use DSS Express or DSS Pro as the SIP server
Parameter Description
IP Address IP address of the platform.
Username
Leave them as default.
Password
SIP Domain Leave it as default.
SIP Server Username
The login username and password of the platform.
SIP Server Password
The alternate server will be used as the SIP server when DSS Express or
DSS Pro does not respond. We recommend you configure the alternate
IP address.
Alternate IP Addr. If you turn on the Alternate Server function, you will set the Access
Controllers the alternate server.
If you want another VTO to function as the alternate server, you need
to enter the IP address, username, password of the VTO. Do not
enable Alternate Server in this case.
We recommend you set the main VTO as the alternate server.
Alternate Username
Used to log in to the alternate server.
Alternate Password
Enter the IP address of the alternate VTS. When the management
Alternate VTS IP Addr. platform does not respond, the alternate VTS will be activated to make
sure VTO, VTH and VTS can still realize video intercom function.
38
Step 3 Click OK.
Parameter Description
Device Type Select Unit Door Station.
VTO No. The number of the VTO, which cannot be configured.
When you turn on the group call function, the VTO calls the main VTH
Group Call
and the extensions at the same time.
The default phone number is 888888+VTS No. when the VTO calls the
Centre Call No. VTS. You can check the number of the VTS from the Device screen of
VTS.
Transmission Mode Mode 1 is selected by default.
● Use other VTO as the SIP server.
Figure 3-12 Basic parameter
39
Table 3-6 Basic parameter description
Parameter Description
Device Type Select Unit Door Station.
The number of the VTO.
VTO No. The number must have four digits. The first two digits are 80, and
the last two digits start from 01. For example, 8001.
If multiple VTOs exist in one unit, the VTO No. cannot be repeated.
The default phone number for the management center is 888888. Keep
Centre Call No.
it as default.
Transmission Mode Mode 1 is selected by default.
● Use the Platform (DSS Express or DSS Pro) as the SIP Server.
Figure 3-13 Basic parameter
Parameter Description
Device Type Select the device type based on the installation position.
Select the checkbox and
then enter the number of If building and unit are enabled on DSS, enter
Building No. the building where the the building number and unit number on the
unit door station is webpage. The building number, unit number
installed. and VTO number must conform to the
configured parameters on DSS.
Select the checkbox and
then enter the number of
Unit No.
the unit where the unit Take room 1001, unit 2, and building 1 as an
door station is installed. example. If building number is enabled on the
The number of the unit DSS and the unit is not enabled, the room
door station. number is "1#1001". If building and unit are both
enabled, the room number is "1#2#1001". If
VTO No. building is not enabled, and unit is not enabled
If multiple VTOs exist in either, the room number is "1001". For details,
one unit, the VTO No. see the user manual of DSS.
cannot be repeated.
The default phone number is 888888 when the VTO calls the VTS. Keep it as
Centre Call No.
default.
40
Parameter Description
Transmission Mode Mode 1 is selected by default.
Step 3 Click Confirm.
Parameter Description
The number of the added VTO. You can check the number from the
Rec No.
Device page on the webpage of the VTO.
41
Parameter Description
Registration
Keep it default.
Password
Build No.
Cannot be configured.
Unit No.
IP Address The IP address of the added VTO.
Username The username and password used to log in to the webpage of the added
Password VTO.
● When there are main VTH and extension, you need to turn on the group call function first and
then add main VTH and extension on the VTH Management page. For how to turn on the
group call function, refer to "3.6.2 Configuring Basic Parameters".
● Extension cannot be added when the main VTHs are not added.
Procedure
Step 1 On the home page, select Talkback setting > Room No. Management.
Step 2 Add the VTH.
● Add individually
1. Click Add.
2. Configure parameters, and then click OK.
Figure 3-15 Add individually
42
Table 3-9 Room information
Parameter Description
Enter the room number of the VTH.
The room number consists of 1-5 digits, and must conform
to the configured room number on the VTH.
When there are main VTH and extensions, the room
Room No. number of main VTH ends with -0 and the room number of
extension ends with -1, -2 or -3. For example, the main VTH
is 101-0, and the room number of the extension is 101-1,
101-2...
If the group call function is not turned on, room number in
the format of 9901-xx cannot be set.
First Name
Last Name Enter the name of the VTH to help you differentiate VTHs.
Nick Name
Register Type
Keep them as defaults.
Registered Password
● Add in batches
1. Click Batch Add
2. Configure the parameters.
Figure 3-16 Batch add
Parameter Description
Unit Layer Amount The number of floors of the building (ranging from 1 to 99).
The number of rooms on each floor, which ranges from 1 to
Room Amount in One Layer
99.
First Floor Number The first room on the first floor.
The first room on the second floor, which equals the first
Second Floor Number room on the first floor plus the number of rooms on each
floor.
43
3.6.5 Adding the VTS
When the Access Controller functions as the SIP Server, you can add VTSs to the SIP server to make
sure they can call each other.
Procedure
Step 1 On the Homepage, select Talkback setting > VTS Management.
Step 2 Click Add and set parameters.
Figure 3-17 VTS management
Parameter Description
VTS No. The number of the VTS, which can have up to 9 digits.
Registration password is the login password of the VTS. We
Registration Password
recommend you keep it as default.
IP Address The IP address of the VTS.
Step 3 Click OK.
44
3.7 Personalization
Configure themes and add video or image resources to the Access Controller.
1. Click .
45
2. Select image from the local and upload it.
46
Figure 3-20 Ad mode
47
Figure 3-21 Add time schedules
48
Figure 3-22 Greetings
4. Click Confirm.
49
Figure 3-23 Time section parameters
50
Figure 3-24 Add a holiday group
Step 4 Set the name and the time for the holiday group.
● Holiday Name : Enter the name of the holiday group. Enter a name for each time
section. You can enter a maximum of 32 characters (contain numbers, special
characters and English characters).
● Time Section : Select the start time and end time of the holiday.
51
Step 4 Enter a number and name for the holiday plan.
● No. : Enter a section number. It ranges from 0 through 127.
● Name : Enter a name for each time section. You can enter a maximum of 32 characters
(contain numbers, special characters and English characters).
Step 5 In the Holiday Group No. list, select the number of the defined holiday group.
PAL video standard is 25 fps and the NTSC video standard is 30 fps.
Procedure
Step 1 Select Video Setting > Video Setting.
Step 2 Select 1 from the Channel No. list.
Step 3 Configure the date rate.
52
Figure 3-26 Date rate
Parameter Description
When the Access Controller functions as the
a VTO and connects the VTH, the acquired
Video Format stream limit of VTH is 720p.When resolution
is changed to 1080p, the call and monitor
function might be affected.
Main Format The number of frames (or images) per
Frame Rate
second. The frame rate range is 1–25 fps.
It indicates the amount of data transmitted
over an internet connection in a given
Bitrate
amount of time. Select a proper bandwidth
based on your network speed.
The sub-stream supports D1, VGA and
Video Format
QVGA.
The number of frames (or images) per
Frame Rate
Extra Stream second. The frame rate range is 1–25 fps.
It indicates the amount of data transmitted
Bitrate over an internet connection in a given
amount of time.
Step 4 Configure the image.
53
Figure 3-27 Image
Parameter Description
Brightness is the relative lightness or darkness of a particular color.
Brightness
The larger the value is, the brighter the image will be.
Contrast is the difference in the luminance or color that makes an
Contrast object distinguishable. The larger the contrast value is, the greater
the color contrast will be.
54
Parameter Description
When the function is turned on, images will be displayed with the
Mirror
left and right side reversed.
Flip When this function is turned on, images can be flipped over.
Step 5 Configure the exposure parameters.
Figure 3-28 Exposure
55
Table 3-14 Exposure parameter description
Parameter Description
When you select Outdoor from the Anti-flicker list, you can
select Shutter Priority as the exposure mode.
Exposure mode might differ depending on different models of
Access Controller.
Gain When the gain value range is set, video quality will be improved.
Exposure You can make a photo brighter or darker by adjusting exposure
Compensation compensation value.
3D NR When 3D Noise Reduction (RD) is turned on, video noise can be reduced
to ensure high definition videos.
Grade
You can set its grade when this function is turned on.
Procedure
Step 1 Select Video Setting > Video Setting.
Step 2 Select 2 from the Channel No..
Step 3 Configure the video status.
We recommend you turn on the WDR function when the face is in back-lighting.
56
Figure 3-29 Image
Parameter Description
Brightness is the relative lightness or darkness of a particular color.
Brightness
The larger the value is, the brighter the image will be.
Contrast is the difference in the luminance or color that makes an
Contrast object distinguishable. The larger the contrast value is, the greater
the color contrast will be.
● Close : Back-light compensation is turned off.
● Backlight : Black-light compensation automatically brings more
light to darker areas of an image when bright light shining from
behind obscures it.
● Wide dynamic : The system dims bright areas and compensates
for dark areas to ensure to create a balance to improve the
Backlight Mode overall image quality.
● Inhibition : Highlight compensation (HLC) is a technology used
in CCTV/IP security cameras to deal with images that are
exposed to lights like headlights or spotlights. The image sensor
of the camera detects strong lights in the video and reduce
exposure in these spots to enhance the overall quality of the
image.
57
Figure 3-30 Exposure parameter
Parameter Description
When you select Outdoor from the Anti-flicker list, you can
select Shutter Priority as the exposure mode.
Exposure model might differ depending on different models
of Access Controller.
58
Parameter Description
Gain When the gain value range is set, video quality will be improved.
You can make a photo brighter or darker by adjusting exposure
Exposure Compensation
compensation value.
3D NR When 3D Noise Reduction (RD) is turned on, video noise can be
reduced to ensure high definition videos.
Grade
You can set its grade when this function is turned on.
To avoid video data loss, we recommend you turn on the local coding function when the VTO is
connected to VTH.
Procedure
Step 1 Select Video & Audio > Local Coding.
Step 2 Select Enable to turn on the function.
Step 3 Click OK.
59
● Other: The human face is in back-lighting, which makes the face dim. We recommend
you select other mode to make it easier for the Access Controller to detect.
Step 3 Click OK.
Parameter Description
Adjust the face recognition accuracy. Higher threshold
Face Recognition Threshold
means higher accuracy.
Set the maximum face pose angle for face detection. Larger
value means larger face angle range. If the face pose angle is
Max. Angle of Face Recognition
out of the defined range, the face detection box will not
appear.
60
Parameter Description
61
Parameter Description
After a QR code is scanned, the Access Controller will give
out light to illuminate the QR code, and the Access Controller
Exposure Time (QR code) (S)
will not give out light again until the defined exposure time
has passed.
Supports detecting 6 face images at the same time, and the
Multi-face Recognition unlock combinations mode becomes invalid. The door is
unlocked after any one of them gain access.
● Click Draw Target, and then draw the minimum face
detection frame.
Draw Target ● Click Remove All, and you can remove all the frames you
drew.
62
Figure 3-32 TCP/IP
Parameter Description
IP Version IPv4
MAC Address MAC address of the Access Controller.
● Static : Manually enter IP address, subnet mask, and gateway.
● DHCP : It stands for Dynamic Host Configuration Protocol.
Mode When DHCP is turned on, the Access Controller will
automatically be assigned with IP address, subnet mask, and
gateway.
IP Address If you select static mode, configure the IP address, subnet mask
Subnet Mask and gateway.
Default Gateway
IP address and gateway must be on the same network segment.
63
3.12.2 Configuring Ports
You can limit access to the Access Controller at the same through web, desktop client and phone.
Procedure
Step 1 Select Network Setting > Port.
Step 2 Configure port numbers.
Figure 3-33 Configure ports
Except Max Connection and RTSP Port, you need to restart the Access Controller to
make the configurations effective after you change other parameters.
Parameter Description
You can set the maximum number of clients (such as web,
Max Connection desktop client and phone) that can access the Access
Terminal at the same time.
TCP Port Default value is 37777.
Default value is 80. If you want to change the port number,
HTTP Port add the new port number after the IP address when you log
in to the webpage.
HTTPS Port Default value is 443.
RTSP Port Default value is 554.
Step 3 Click OK.
64
3.12.3 Configuring Automatic Registration
The Access Controller reports its address to the designated server so that you can get access to the
Access Controller through the management platform.
Procedure
Step 1 On the home page, select Network Setting > Register.
Step 2 Enable the automatic registration function and configure the parameters.
Figure 3-34 Register
Parameter Description
Host IP The IP address or the domain name of the server.
Port The port of the server used for automatic registration.
Enter the sub-device ID (user defined).
Sub-Device ID When you add the Access Controller to the management platform,
the sub-device ID on the management platform must conform to the
defined sub-device ID on the Access Controller.
65
Figure 3-35 Cloud service
66
● Select Reader when the Access Controller connects to a card reader.
● Select Controller when the Access Controller functions as a card reader, and the
Access Controller will send data to the Access Controller to control access.
Output Data type:
Card: Outputs data based on card number when users swipe card to unlock door;
outputs data based on user's first card number when they use other unlock
methods.
No.: Outputs data based on the user ID.
● Select Reader (OSDP) when the Access Controller is connected to a card reader based
on OSDP protocol.
● Security Module: When a security module is connected, the exit button, lock and fire
alarm linkage will be not effective.
● Select Wiegand Input when you connect an external card reader to the Access
Controller.
● Select Wiegand Output when the Access Controller functions as a card reader, and
you need to connect it to a controller or another access terminal.
Parameter Description
67
Parameter Description
Pulse Width
Enter the pulse width and pulse interval of Wiegand output.
Pulse Interval
Procedure
Step 1 Select Network Access from the Type list.
Step 2 Select the Enable check box.
68
Figure 3-39 Network access
69
Table 3-22 Description of adding IP parameters
Parameter Description
Type Select the address type from the Type list.
IP Version IPv4 by default.
Select All Ports check box, and your settings will apply to all
All Ports
ports.
Device Start Port If you clear All Ports check box, set the device start port and
Device End Port device end port.
Procedure
Step 1 Select Prohibit PING from the Type list.
Step 2 Select the Enable check box.
Figure 3-41 Prohibit PING
Procedure
Step 1 Select the Anti Half Connection from the Type list.
Step 2 Select the Enable check box.
Step 3 Click OK.
70
3.13.2 Configuring System
Procedure
Step 1 Log in to the web interface.
Step 2 Select Safety Mgmt. > System Service.
Step 3 Enable or disable the system services as needed.
Figure 3-42 System service
Parameter Description
Enable other devices to pull the video stream of the VTO via the ONVIF
ONVIF
protocol.
Audio and Video
If this function is enabled, audio and video transmission is automatically
Transmission
encrypted.
Encryption
71
Parameter Description
If this function is enabled, audio and video transmission is encrypted via
RTSP Over TLS
THE RTSP protocol.
Compatible with
TLSv1.1 and earlier Enable this function if your browser is using TLS V1.1 or earlier versions.
versions
Emergency
Enable it for faults analysis and maintenance.
Maintenance
Password Expires in Set the password expiration date.
Step 4 Click OK.
● If you use HTTPS for the first time or the IP address of the Access Controller is changed, create a
server certificate and install a root certificate.
● If you use another computer to log in to the webpage of the Access Controller, you need to
download and install the root certificate again on the new computer or copy the root certificate
to the it.
Procedure
Step 1 On the System Service page, click Create Server Certificate.
Step 2 Enter information and click OK.
The Access Controller will restart.
72
Figure 3-43 Create Server Certificate
Procedure
Step 1 On the System Service page, click Download Root Certificate.
Step 2 Double-click the file that you have downloaded, and then click Open.
Figure 3-44 File download
73
Figure 3-45 Certificate information
Step 4 Select Current User or Local Machine, and then click Next.
74
Figure 3-46 Certificate import wizard (1)
75
Figure 3-47 Certificate Import Wizard (2)
76
Figure 3-48 Certificate import wizard (3)
● The username cannot be the same with existing account. The username consists of up
to 31 characters and only allows for numbers, letters, underscores, midlines, dots, or @.
● The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: Upper case, lower case, numbers, and special
characters (excluding ' " ; : &).
77
Set a high-security password by following the password strength prompt.
Figure 3-49 Add user
Only admin account can change password and admin account cannot be deleted.
78
Figure 3-50 Add ONVIF user
Parameter Description
The username cannot be the same with existing account. The
Username username consists of up to 31 characters and only allows for
numbers, letters, underscores, midlines, dots, or @.
The password must consist of 8 to 32 non-blank characters
and contain at least two types of the following characters:
Password
Upper case, lower case, numbers, and special characters
(excluding ' " ; : &).
There three permission groups which represents different
permission levels.
● admin: You can view and manage other user accounts on
the ONVIF Device Manager.
Group
● Operator: You cannot view or manage other user accounts
on the ONVIF Device Manager.
● User: You cannot view or manage other user accounts and
system logs on the ONVIF Device Manager.
79
3.14.3 Viewing Online Users
You can view online users who currently log in to the webpage. On the home page, select Online
User .
3.15 Maintenance
You can regularly restart the Access Controller during the idle time to improve its performance.
Procedure
Step 1 Log in to the webpage.
Step 2 Select Maintenance.
Figure 3-51 Maintenance
80
Figure 3-52 Configuration management
Configuration file can only be imported to the device with the same model.
Restoring the Access Controller to default configurations will cause data loss. Please be advised.
Procedure
Step 1 Select Config Mgmt. > Default
Step 2 Restore factory defaults if necessary.
● Restore Factory : Resets configurations of the Access Controller and delete all data.
● Restore Factory (Save user & log) : Resets configurations of the Access Controller
and deletes all data except for user information and logs.
● Use the correct update file. Make sure you get the correct update file from the technical support.
● Do not disconnect the power supply or network, or restart or shut down the Access Controller
during the update.
81
3.17.1 File Update
Procedure
Step 1 On the home page, select Upgrade.
Step 2 In the File Upgrade area, click Browse, and then upload the update file.
available.
Step 3 Update the Access Controller when the latest version is available.
82
3.19.2 Admin Logs
Search for admin logs by using admin ID.
Procedure
Step 1 Log in to the webpage.
Step 2 Select System Log > Admin Log.
Step 3 Enter the admin ID, and then click Query.
83
4 Smart PSS Lite Configuration
This section introduces how to manage and configure the Access Controller through Smart PSS
Lite.
Set the password is for the first-time use, and then set security questions to reset your
password when you forgot it.
Step 3 Enter your username and password to log in to Smart PSS Lite.
84
Figure 4-1 Add devices
Parameter Description
We recommend you name devices with the monitoring area for easy
Device Name
identification.
Select IP/Domain.
Method to add ● IP/Domain: Enter the IP address or domain name of the device.
● SN: Enter the serial number of the device.
Enter the port number, and the port number is 37777 by default. The
Port
actual port number might differ according to different models.
User Name Enter the username of the device.
Password Enter the password of the device.
Step 3 Click Add.
You can click Add and Continue to add more devices.
● We recommend you add devices by automatically search when you need to add devices in
batches within the same network segment, or when the network segment is known but the
exact IP addresses of devices are not known.
● Close ConfigTool and DSS when you configure devices; otherwise, you may not be able to find
all devices.
85
Procedure
Step 1 On the Device Manager page, click Auto Search.
Step 2 Select a search method.
● Auto Search: Enter the username and the password of the device. The system will
automatically search for devices that are on the same network to your computer.
● Device Segment Search: Enter the username and the password of the device, and then
define the start IP and the end IP. The system will automatically search for devices in
this IP range.
You can select both methods for the system to automatically search for devices on the
network your computer is connected to and other networks.
Figure 4-2 Search for devices
86
4.3 User Management
Add users, assign cards to them, and configure their access permissions.
Make sure that the card type is same to the actually assigned card; otherwise, the card
number cannot be read.
Step 4 Click OK.
Procedure
Step 1 Select Personnel > Personnel Manager > Add.
Step 2 Enter basic information of staff.
1. Select Basic Info.
2. Add basic information of staff.
3. Take snapshot or upload picture, and then click Finish.
Only 8-digit card number in hexadecimal mode can display the QR code of the
card.
● Configure fingerprint
87
a. Click to select Device or Fingerprint Scanner as the fingerprint collector.
b. Add fingerprint. Select Add > Add Fingerprint, and then press finger on the
scanner for three times continuously.
Figure 4-4 Add basic information
Step 3 Click Extended information to add extended information of the personnel, and then
click Finish to save.
88
Figure 4-5 Add extended information
89
Figure 4-6 Configure permission groups
After completing adding, you can click to modify information or add details in the list
of staff.
90
4.3.2.2 Adding Users in Batches
Procedure
Step 1 Click Personnel Manger > Batch Update > Batch Add.
Step 2 Select Card issuer or Device from the Device list, and then configure the parameters.
Figure 4-7 Add users in batches
91
Table 4-2 Add users in batches parameters
Parameter Description
Start No. The user ID starts with the number you defined.
Quantity The number of users you want to add.
Department Select the department that the user belongs to.
Effective Time/Expired Time The users can unlock the door within the defined period.
Step 3 Click Read Card No., and swipe cards on the card reader.
The card number will be read automatically.
Step 4 Click OK.
92
Step 7 Select users to associate them with the permission group.
Figure 4-9 Add users to a permission group
93
Related Operations
● Event filtering: Select the event type in the Event Info, and the event list displays the selected
event type, such as alarm events and abnormal events.
● Event refresh locking: Click to lock the event list, and then event list will stop refreshing. Click
to unlock.
● Event deleting: Click to clear all events in the event list.
The door will remain open or closed all the time. You can click Normal to restore the
access control to normal status, and then the door will be open or closed based on the
configured verification methods.
Click Stop Monitor, real-time access control events will not display.
94
Figure 4-12 Monitor door status
Related Operations
● Show All Door: Displays all doors controlled by the Device.
● Reboot: Restart the Device.
● Details: View the device details, such as IP address, model, and status.
95
Appendix 1 Important Points of Intercom
Operation
The Access Controller can function as VTO to realize intercom function.
Prerequisites
The intercom function is configured on the Access Controller and VTO.
Procedure
Step 1 On the standby screen, tap
Step 2 Enter the room No, and then tap .
96
Appendix 2 Important Points of QR Code
Scanning
Access Controller: Place the QR code on your phone at a distance of 30 mm–50 mm away from the
QR code scanning lens. It supports QR code that is 22 mm × 22 mm–50 mm × 50 mm and less than
128 bytes in size.
● QR code detection distance differs depending on the bytes and size of QR code.
● Make sure the QR code is aligned with the lens, and avoid direct sunlight.
Appendix Figure 2-1 QR code scanning
97
Appendix 3 Important Points of Fingerprint
Registration Instructions
When you register the fingerprint, pay attention to the following points:
● Make sure that your fingers and the scanner surface are clean and dry.
● Press your finger on the center of the fingerprint scanner.
● Do not put the fingerprint sensor in a place with intense light, high temperature, and high
humidity.
● If your fingerprints are unclear, use other unlocking methods.
Fingers Recommended
Forefingers, middle fingers, and ring fingers are recommended. Thumbs and little fingers cannot be
put at the recording center easily.
Appendix Figure 3-1 Recommended fingers
98
How to Press Your Fingerprint on the Scanner
99
Appendix 4 Important Points of Face
Registration
Before Registration
During Registration
● You can register faces through the Device or through the platform. For registration through the
platform, see the platform user manual.
● Make your head center on the photo capture frame. The face image will be captured
automatically.
● Do not shake your head or body, otherwise the registration might fail.
● Avoid 2 faces appear in the capture frame at the same time.
Face Position
If your face is not at the appropriate position, face recognition accuracy might be affected.
The face position below is for reference only, and might differ from the actual situation.
100
Appendix Figure 4-1 Appropriate face position
Requirements of Faces
● Make sure that the face is clean and forehead is not covered by hair.
● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image
recording.
● With eyes open, without facial expressions, and make your face toward the center of camera.
● When recording your face or during face recognition, do not keep your face too close to or too
far from the camera.
Appendix Figure 4-2 Head position
101
Appendix Figure 4-3 Face distance
● When importing face images through the management platform, make sure that image
resolution is within the range from 150 × 300 pixels to 600 × 1200 pixels. It is recommended that
the resolution be greater than 500 × 500 pixels, the image size be less than 100 KB, and the
image name and person ID be the same.
● Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area,
and the aspect ratio does not exceed 1:2.
102
Appendix 5 Security Recommendation
Account Management
Service Configuration
1. Enable HTTPS
It is recommended that you enable HTTPS to access web services through secure channels.
2. Encrypted transmission of audio and video
If your audio and video data contents are very important or sensitive, it is recommended to use
encrypted transmission function in order to reduce the risk of your audio and video data being
eavesdropped during transmission.
3. Turn off non-essential services and use safe mode
If not needed, it is recommended to turn off some services such as SSH, SNMP, SMTP, UPnP, AP
hotspot etc., to reduce the attack surfaces.
If necessary, it is highly recommended to choose safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption and authentication passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up complex passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up complex passwords.
103
Network Configuration
Security Auditing
Software Security
Physical Protection
It is recommended that you carry out physical protection for devices (especially storage devices),
such as placing the device in a dedicated machine room and cabinet, and having access control
104
and key management in place to prevent unauthorized personnel from damaging hardware and
other peripheral equipment (e.g. USB flash disk, serial port).
105