Access Control Software User Manual
Access Control Software User Manual
Access Control Software User Manual
Version: 2.4.3.1038
Date: November 2010
Applicable Models: F7, F707, F708, F4vista, F702, F702-S, F8,
F8-H, F702-SH, SC103, SC403, SC503, LA2000,
LA2000-Mercury, SCR100
Important Claim
Firstly thank you for purchasing this access control management system,
before use, please read this manual carefully to avoid the unnecessary
damage! The company reminds you that the proper user will improve
the use affect and authentication speed.
The product described in the manual maybe includes the software which
copyrights are shared by the licensors including ZKSoftware. Except for
the permission of the relevant holder, any person can’t copy, distribute,
revise, modify, extract, decompile, disassemble, decrypt, reverse
engineering, leasing, transfer, sub-license the software, other acts of
copyright infringement, but the limitations applied to the law is
excluded.
Contents
1. Install and Uninstall Software.......................................................................... 1
1.1 Install Software .................................................................... 1
1.2 Uninstall Software................................................................ 4
2. Department Management ............................................................................... 5
3. User Management .......................................................................................... 8
3.1 User Fingerprint................................................................... 8
3.2 Statistic .............................................................................. 14
3.3 Upload and Download ....................................................... 18
4. Device Management ..................................................................................... 20
4.1 Device Information............................................................. 22
4.2 Communication ................................................................. 23
4.3 Wiegand ............................................................................ 24
4.4 Verification......................................................................... 27
4.5 Power Management .......................................................... 28
4.6 Access Control .................................................................. 29
4.7 Mifare ................................................................................ 30
4.8 Other Setup ....................................................................... 30
4.9 U disk Settings .................................................................. 31
5. U Disk Management ..................................................................................... 34
5.1 Import User Data ............................................................... 34
5.2 User Data Export ............................................................... 36
5.3 Record Data Import ........................................................... 36
5.4 Import Photos .................................................................... 37
6. SMS Management ........................................................................................ 39
6.1 SMS Content Management ............................................... 39
6.2 Employee SMS customization........................................... 41
7. System Management .................................................................................... 44
I
Access Control Software User Manual
II
Table of Contents
III
1. Install and Uninstall Software
" Note: The following screen may differ from what you see upon CD
2. Select the Language, click [OK], and enter the following interface.
3. Please read the Agreement carefully. If you want to install please select [I
1
Access Control Software User Manual
accept the agreement], and click [Next], enter the following interface.
4. Select the folder where to install the software. Click [Next] to enter the
following interface.
2
1. Install and Uninstall Software
6. Click [Install], the installing program will copy and write corresponding
information into hard disk. After finish installation, click [Finish] to complete the
process.
3
Access Control Software User Manual
4
2. Department Management
2. Department Management
Click [Department Management] in the [Basic Options] menu, popup the
department management interface, like as following figure.
Employ user to the department: First to select the name of company, then click
[User] button, popup following interface.
" Note: To shift a user can also directly process in the [User Management]
interface.
5
Access Control Software User Manual
[Department’s Users] box at right side is the users list of company, first choose
the user to shift, and then click the “<” button to move the user to the left side, or
click “<<” button to move all users to the left side.
6
2. Department Management
Select the user to employ, click “>” to move the user to the right side of related
department, or click “>>” button to move all users to the right side to complete
shifting the users.
7
3. User Management
3. User Management
User Management is the process to manage the user information, click
[User Management] in the [Basic Options] menu or the shortcut button, popup
the user management interface, as following.
Add User: Click button in the user management bar to add new user.
Cancel User: Choose the user you want to delete, and click button to delete
the user.
Photo: Click button to import user photo, or click button to delete.
8
3. User Management
(2) Click the finger image you want to enroll, and the system enter the interface
of enrollment, as shown below:
(3) After the finger finishes 3 times press on the FP sensor, the system prompt
[Succeed in fingerprint registration], shown as below.
9
Access Control Software User Manual
(4) Click [OK] after successful enrollment, save the fingerprint and return to user
management interface.
(5) Click [Verify], the following interface will appear to check if the fingerprint
enrollment is succeed or not.
(6) Press the enrolled finger on the sensor, the following dialog appear when the
sensor collect the fingerprint, that is, fingerprint enroll succeeds.
10
3. User Management
If the following dialog appears, then the enrollment failed, please return to enroll
once again.
(7) If you want to delete the fingerprint, please double click this finger, the system
prompts the following:
11
Access Control Software User Manual
(8) If you select [Duress Fingerprint], the enrolled fingerprint will be a duress
fingerprint for use.
Enroll with FP Device:
Use the FP device to enroll fingerprint. Select [Enroll with Device] in User
management interface, click [Connect Device], and the button will turn to
[Disconnect] when the connection completed. Click [Enroll] button, and enter
the fingerprint enrollment interface. The FP device enrollment is similar to FP
sensor, except there is no verification process for FP device.
2. Register Mifare Card:
Choose the user who needs to register the Mifare card. Click [Write Card by
Device], and swipe the card near to the card sensor area of the FP device when
the software reminds [Present Card]. If the device prompts [Write Card
Successfully], this user's ID and the fingerprint will be stored in the card. Click
[Empty Card by Device] to delete user's data in the Mifare, swipe the card near
to the card sensor area of the FP device when the software reminds [Present
Card]. The notice [Clear Card Successfully] means the operation completed.
" Note: This function is available only for the FP device that supports Mifare
12
3. User Management
card enrollment.
3. Fingerprints Enroll Status: Shows the detail of user information and
fingerprint enroll status.
4. User face Enroll Status: Shows the detail of user and face enroll status.
5. Sort Order:
13
Access Control Software User Manual
You can arrange the records according to the ascending or descending order in
the record list, directly click the head of rank to achieve. Choose a triangle
symbol, which is beside the field, according to ascending order to arrange when
the triangle symbol point upwards, otherwise that means the sort order follow the
descending order. You can click the triangle symbol to change the rise or down
rank.
As figure below, sort the users as the name order.
3.2 Statistic
The software can automatically count the total records and count the grouping
records.
1. Import
This function enables the user to import many formats of user’s data file, such as
MS Excel, MS Access, DBF, XML, Text File, CSV file. We recommend using the
CSV file to import. The following example is using text file to import user’s data.
14
3. User Management
On the left side, there is the field list, and the right side is the importing file rank.
The Skipcol(s) on the right-up part means how many columns to skip. The
Skiprow(s) means how many rows to skip. If the first line of the importing file is
not the material data, you can fill “1” in Skiprow(s) blank that shows to skip the
first line for importing data.
UserID: The ID is using for system internal, it is useless for file import, please do
15
Access Control Software User Manual
16
3. User Management
(2) Click [Start Export] button to export the file via default format. Otherwise, you
can configure exporting content through the following optional items.
Fields: Select the field to export, the default is all, otherwise it is only to export
the selected field’s content.
Formats: The exporting format that all kinds of defined field value.
17
Access Control Software User Manual
Header & Footer: It is indicates the start and the end of the file to export.
Caption & Width: It is indicates the title and width of the field.
Excel Options: Set font.
Upload: Based on your need, select the user and an uploading FP device, click
[Upload], it is able to upload user’s data to the defined FP device, it is better to
select [Fingerprint] and [User Face] in the normal condition. If the information
needs not to modify, it is no need to choose it.
" Note: User’s data include user information, fingerprint, and user face.
Delete: If you want to delete a user in a FP device, first choose the user and the
corresponding FP device, and then click [Delete] button.
Operation Log: Indicates the error log during operating process.
18
3. User Management
Batch: You can use this function to speed up communication when uploading
many of user’s data, it need not for a few users (such as less than 30 users).
2. From Device to PC:
Download the user data from the FP device to the local database. Click [Form
Device to PC] in the user management interface, or click the [Device to PC]
shortcut in the main interface, popup the following interface.
Select a FP device to download user’s information that is on the left side list, click
[Browse Users in Device], all users in the FP device displays. Select the user
need to download, click the [Download] button to download the user data from
FP device to local database.
View User in the Device: Display all users in the FP device.
Download: Download user data.
Delete: If you want to delete a user in a FP device, first choose user, and then
click [Delete] button.
Batch: You can use this function to speed up communication when downloading
many users, it need not for a few users.
Operation Log: Indicates the error log during operating process.
19
4. Device Management
4. Device Management
Open [Device Management] in the [Basic Options] menu, or click [Device
Management] shortcut on the main interface, and display the interface as
following.
RS232/RS485 Communication:
20
4. Device Management
Device ID: According to the device ID to fill, for example the FP device ID is 1.
Port: Properly select the communication port to connect PC, the default port is
COM1.
Baud Rate: Select the same Baud Rate as the FP device. The default value is
38400 at its original setup.
Communication key: It is not need to fill the password in the default condition, if
there is a setup password in the FP device, please input the correct password.
Device Name: According to the purpose of the device, input an observable
name.
Ethernet Communication:
21
Access Control Software User Manual
Device ID, Communication key and Device Name is the same configure as
RS232/RS485.
After setup, click [Connect] button under the window to test. If the system popup
[Successfully Connect], click [OK] button to save the connecting parameters of
this FP device. If the system popup [Fail Connect] dialog, please check the
parameters and try again. Add the other fingerprint device as this procedure.
If you want to delete a FP device, select this unit, and click [Delete] button on
underside.
22
4. Device Management
Click [Read Options], the basic information of FP device will display, as the
following figure.
4.2 Communication
Communication Setting: Click [Read Options]; it shows the communication
information of the current connecting device. Like as below figure.
Communication Parameter: It indicates all kinds of communication parameters
23
Access Control Software User Manual
Baud Rate, if you use RS485 to communicate, better to use 38400 Baud Rate.
4.3 Wiegand
Click [Wiegand] in the [Device Management], display the following interface.
24
4. Device Management
Click [Read Options] can obtain all the device wiegand parameters.
25
Access Control Software User Manual
26
4. Device Management
Pulse Interval Time: The default value is 900 µs, can adjust from 200 to 20000.
Input/Output contents: The options are ID and Card Number.
4.4 Verification
Click [Biometric] in the [Device Management] item. Click [Read Options], the
following interface displays.
27
Access Control Software User Manual
user use ID card to verify directly, and need not to press fingerprint. When you
choose it as [NO], you must verify fingerprint after present the card.
Must Register Mifare Card: There are two statuses to register a Mifare card, if
the card was configure to [Must Register], it is only to verify the user whose ID
has stored in the FP device. The user without ID number cannot verify. When you
choose the item as [NO], whether there is user’s ID information in the device or
not, it will export after the user and fingerprint template verified successfully.
Firstly, read the parameter of [Power], modify the state of [Idle Setup] and
minutes of [Idle Time], then click the [Set Options], and restart the device to
complete setting.
When the idle time is [0], then the idle setup function is invalid. When the value
more than [0], the device will enter the idle state after arrives at the defined time.
You can resume normal working state by press the button on the device.
28
4. Device Management
Lock Control Delay: Apply to determine unlock hour, the minimum measured
unit is 20 ms, in the normal condition that is 100-200 ms.
Anti-Pass Mode: It can be set to None, Out, In, InOut.
Master’s record state: It can be set to None, Out, In.
Sensor Mode: Set the door sensor mode. It can be set to None, NOpen,
NClose state.
Sensor Delay: Set the sensor delay time when the door is open. The sensor
detects the door state only after this defined time. If the door state is not
consistent with this parameter, it will trigger the alarm. Black and white screen
device range is 0-254. Color screen device range is 0-99.
Sensor Alarm: Set the alarm time delay after triggering the alarm. Range is
0-999 seconds.
Error times to alarm: Define the maximum error times to trigger alarm. When
the verification is not through, and exceed this defined times, it will trigger the
alarm signal automatically.
29
Access Control Software User Manual
4.7 Mifare
30
4. Device Management
31
Access Control Software User Manual
2. Select the U disk from the down drop menu, click [Read Options], the
interface display the following options, Record download, User download,
User upload, and Update firmware.
3. Select the needed operation, click [Set Options], the system will prompt
[Operation finished], as shown below.
32
4. Device Management
Open the U disk you can see the configuration file named operatemode.cfg.
The operation of execute the U disk configuration file please refer to the related
device user manual.
33
5. U Disk Management
5. U Disk Management
In general, you can use RS232, RS485, TCP/IP, and USB to exchange the user
data and attendance records with device.
If the communication method above is not available, you can use U disk to
download or upload the user information and fingerprint, or download the
attendance records.
2. Click [Import User Data]. The system will prompt [Select Device] dialog. The
imported user data format is different according to the device type, so you need
select the type first.
34
5. U Disk Management
3. After that, click [OK] button, the system will automatically search the user data
and load it into the system from the U disk. If there is a new use, the data will
show in green color. In the list, the records with red color indicate that these
records do not synchronization with the data in the software.
z Add New User in Computer: Import the new user in buffer area to the
computer.
z Overwrite Computer Data: Import the selected user in buffer area to the
computer.
z Delete data from U disk: Delete user data from U disk.
z Remove List: Clear the user list in buffer area.
z Refresh: Refresh the user data in buffer area.
35
Access Control Software User Manual
Double click user record or select user and click [Select to list], can add the user
information to the right side. If there are many of user records, you can query the
user information through the query function. The query condition such as Ac_No,
Name, CardNumber is available.
Click [Export User Data to U disk]. Then export all records shown in the buffer
area to the U disk.
36
5. U Disk Management
Click [Import the record from U disk], then the system import the data. When it
has finished, all records will move to the buffer area.
z Delete Data From U Disk: Delete the record data from U disk.
z Clear List: Clear the record list in buffer area.
z Refresh: Refresh the record data in buffer area.
37
Access Control Software User Manual
Click [Import Photos from U disk], then the system import the user photos.
After importing finished, all photos move to the buffer area.
z Delete Data From U disk: Delete the photo data from U disk.
38
6. SMS Management
6. SMS Management
In some models of device, we offer the function to send scheduled SMS to the
user or public. We just need to set the SMS in the software, and then upload to
the device. The public SMS will appear at the device for all users to view, and will
appear always. The user SMS will show after user verification, to reduce the user
workload and improve the work efficiency.
1. Communication Setting
There are three ways for device communication. Similar to the device connection
introduction in 4. Device Management. After complete setup, click [Connect Test]
button to test, if it is succeed, the system popup [Successfully Connect] dialog,
and the button turn to [Disconnect]. If it is fail, the system popup [Fail Connect]
dialog.
2. SMS Query
The system supports to query SMS by SMSid, SMS Content, Public SMS, User
39
Access Control Software User Manual
SMS, etc. Click [Condition] down-drop menu, select the condition and input the
information, then you can view the query result in the sms list table by click
[Browse] button.
3. SMS Management
The system supports to manage the SMS information, such as Add, Edit,
Refresh, Delete functions.
Add: Add a new SMS. Click [Add], the following interface appears:
Public SMS: Indicate the SMS for the public to view. The SMS will show after the
device start, and appear always.
User SMS: Indicate the SMS for the user to view; it will appear after user
verification.
Set Time Limit: Click this item, another line will show in the interface, as the
following figure. You can define the start time and time length of the SMS valid
time.
40
6. SMS Management
Delete: Select a SMS and click [Delete] button, the system will prompt [Are you
sure to delete selected short message?] click [OK] and another prompt will show:
[Whether delete all short messages in attendance device at the same time], click
[OK] to confirm deletion.
Edit: Select a SMS, and click [Edit] button, to modify the SMS information, such
as SMSid, valid time and SMS contents.
Refresh: After SMS querying, the SMS list will display all query results, click
[Refresh] to return to the entirely SMS list.
4. Send SMS
Select the SMS in the left SMS list, and click [Send SMS] button to send the
SMS.
41
Access Control Software User Manual
User Info: To list all users in the system, you can select multi user to send the
customized SMS.
SMS: To list all the SMS added in the system.
Operation Select: If the software has connected with the device, you can select
[Send immediately], otherwise, you can select [Not sent temporarily], and
return to the SMS management interface. Select the SMS you want to send and
click [Send SMS] to send the SMS. You can also send the SMS through U-disk.
Click [Employee SMS customization inquiry] and enter the query interface.
42
6. SMS Management
You can select the query condition from the drop-down menu: query by SMS id,
Department, Attendance ID and name.
If you do not need the SMS, you can also delete the SMS by click [Delete
employee SMS customization].
43
7. System Management
7. System Management
System management includes Administrator Management, System
Operation Logs, Backup Database, Clear Obsolete Data, System
Initialization, Database Connection, Set Password of Database, and System
Settings.
44
7. System Management
45
Access Control Software User Manual
Click the down-drop menu to select the end date, and click [Delete] button to
delete the operation logs to the defined previous date (not include the
selected date), as the following figure.
46
7. System Management
1. Backup Database
Click [Backup Database] in the [Data Management] menu, popup a
dialog-box to backup database, you can name it as your favor, and save it in
the defined location.
2. Compact the Database
Click [Compact the Database] in the [Data Management] menu, to compact
the database, it is only capable for Access database.
3. Clear Obsolete Data
You can use this function to clear old data that are useless, click [Clear
Obsolete Data] in the [Data Management].
Click the down drop menu to choose the date, and select the old record
backup directory, then click [OK] button to clear the old data.
" Note: The delete content does not include the ending date be selected.
7.4 System Initialization
Click [System Initialization] in the [System Management] menu, popup a
warning dialog box, execute the command to initialize the system. This
operation will clear all data of the system.
47
Access Control Software User Manual
Click button, can select the database file, the default name is
att200.mdb, according to real condition to renew setup of the database
connection.
2. SQL Server Database Connecting Setup
48
7. System Management
First, you should establish the empty database on the database server. You
can find a script file with the name of sqlserver.sql in the directory of installing
CD. The empty database establishes in the front of the searcher of SQL
Server, and then opens the sqlserver.sql script files, to run database that is to
create this software.
In the Provider Select Microsoft OLE DB Provider for SQL Server, click [Next]
or [Connection] to enter this following.
Confirm the server name for storing this database, information for logging on
this serve, and the database name. After run test connection successfully
Click [OK] button to complete settings
49
Access Control Software User Manual
50
7. System Management
51
Access Control Software User Manual
device. For example, record number to store is set to 30000, when record
number downloaded is 30001, all fingerprint records in fingerprint device will be
deleted, and record number downloaded resets to 0.
Times of reconnection due to failure:
Count for continuous failure retry (it is recommended to set to 3) that is
convenience to reconnect automatically under the condition of fingerprint device
recovers normal connection.。
Activate monitor in time zone:
Here, we can define one time zone to run monitoring. If run uninterrupted polling,
it will bring huge burthen to whole monitoring network. You can define one time
zone to run monitoring, in order to reduce burthen of monitoring network. Please
pay attention to time format, such as 06:00-22:00.
Download log time:
Set the cycle to download operation log automatically.
Synchronic time:
You can define a time to synchronize the time of all fingerprint devices with the
system. Please pay attention to time format, such as 10:00.
Set alarm sound:
Set all kinds of alarm sounds. Click [Set] button browse to select the desired
audio file, and then click [Open] to complete setting.
The system will use default privilege while it do not assign privilege for
user: Tick the box to confirm.
After assigning privilege for user, along with uploading user the system
upload user privilege: Tick the box to confirm.
In downloading attendance records process, whether to add the user when
there is no local user: Tick the box to confirm.
Company Name: Input the unit name using in the software.
Set Database connection:
Click [Set Database Connection], will popup the window of the defined path
52
7. System Management
53
8. Access Settings
8. Access Settings
Access setting is to set unlock time and assign privilege for registered users.
Settings of each user consist of three time zone settings and one group setting.
Relationship between time zones is OR. Group also consists of three time zone
settings, and the relationship between these three time zones is OR.
Simply put, if you want to keep a registered user in unlock status. Firstly the
group that this user is in should be defined in unlock combination (one group can
be defined in one combination together with other group, but these groups are
required to unlock door together). Second, current unlock time is in any
availability range of user time zone and time zone of its group.
Under system default, a new registered user is in Group 1 and group
combination is Group 1. So new registered user is in unlock status by default. If a
group that user is in is not defined in the group unlock combination setting, then
the user have no right to unlock the door.
54
8. Access Settings
2. Click [Add] button and system will pop up a timetable from Sunday to Saturday.
Here, you can define any time zone you may use.
4. If you want to use several time zones, continue to click [Add]. The system
supports up to 50 time zones.
In addition, you can edit or delete the time zone.
8.2 Group
1. Enter the interface: Through the system menu: [Access Settings] -> [Group],
or through shortcuts button options of the system: [Group], enter the group
settings interface.
55
Access Control Software User Manual
2. Left click item that need to edit with cursor to enter the editing state.
56
8. Access Settings
5. If you want the time zone in the group take effective on holiday, select it by
cursor clicks.
57
Access Control Software User Manual
2. Left click item that need to edit with cursor to enter the editing state.
58
8. Access Settings
4. If you forgot the group definition, click [Group Detail] to see the exist group,
and return to step 3 to select group.
5. You can set others unlock combination as step 3-4. After setting up, click
[Close] to save and quit.
59
Access Control Software User Manual
2. Click [Edit Access Levels] and enter the Access Levels interface to edit,
shown as following.
3. Users belong to Group 1 by default. If you need to assign the user to other
group, re-allocate the user as the following operation. No. 1 user is belonging to
Group 1 by default. First selected No. 1 user, shown as following.
60
8. Access Settings
4. Click on the [Set Group] button and enter the [Group Settings] interface,
select group 2.
5. Through the above steps, the user move to the group 2, shown as following.
61
Access Control Software User Manual
6. Follow the 3-5 steps, set up the group those users respective. After the setting
completed, through ">/>>" button, a single or all of users will be moved to the
right critical areas, waiting for the Levels setting, shown as following.
7. Choose the device that need to upload Privilege from the device list. Through
">/>>" button, single or all devices will be moved to the right the critical region,
waiting for Levels setting, like as the following interface.
62
8. Access Settings
8. After users and device selecting, click on [Access Allows] button, the group
time zone that using by user in the critical periods will be assign to the selected
devices. After distribution is successful, prompt will appear shown as following
9. Click [Exit] button, you will enter the [Access Levels] interface, synchronizes
set up information of user groups will display in the list, shown as following.
63
Access Control Software User Manual
Set up the user does not use the Access Levels of group time zone:
1. If a user do not use group time zone when she/he belong to a group, please
enter the [User Access Levels Settings] interface.
2. Select a user and the applied device, the using time zone and the verification
style, and click [Access Allow] button.
64
8. Access Settings
65
Access Control Software User Manual
2. Click [New] button to add a new one, the default date is the current day.
3. Move cursor to the [Begin date] and [End date] to modify the date.
4. Moved the cursor to the Time zone to be set, choose the valid Access Time
zone.
66
8. Access Settings
5. Set is completed, click on the [Save] button, the setting will be saved.
2. Enter the [Upload Settings] interface: Through the system menu: [Basic
67
Access Control Software User Manual
4. Upload success, the successful operation prompt display on the lower right
corner, shown as below.
68
9. Other Function
9. Other Function
9.1 Start Monitor
You can click the [Start Monitor] shortcut on the main interface to start system
polling and monitoring, and the button changes to [Stop].
When system is in the monitor status, the information about opening door and
fingerprint verification will show on the list field.
Select the device and click [OK] to finish the download process. If you select
[After download Finish, Cancel device record], the system will delete the device
record when downloading complete.
In monitoring state, if you want to download the device record, click [Download
Record] in [Basic operation] menu, the system will download all connected
devices’ record to system.
69
Access Control Software User Manual
" Note: Please do not upgrade the firmware at your discretion because it may
bring problems and affect the normal use of the device. Contact our distributors
for technical support or upgrade notification.
9.7 Property
Please right click the device, and click [Property] button in the prompt dialog.
70
9. Other Function
Enter the [Device Management] interface, the specific operation please refer to
4. Device Management.
71
10. Record Management
72
10. Record Management
3. Click [Query], the in/out access log within these date will show in the list.
73
Access Control Software User Manual
74
10. Record Management
3. Click [Yes] to delete the events before this date. After that, these events will
not show in the list.
75
11. Appendix
11. Appendix
11.1 Common Operation
1. The toolbar for datasheet operation:
The line where the blue bar is located is the current line. All operation for
datasheet is performing on the current line. Only black button is operational, it
cannot operate when it is gray.
Click button, put it to corresponded operate.
2. Filtrate Data
76
11. Appendix
Filtrate data is that select the record that meets defined condition from the
original table sheet, the current display window is following, the operation flow of
the filtration data’s command.
(1) Click down drop menu of the data rank, appear the following figure.
(3) Input condition, such as show all user whose name contain character D,
appear following figure.
77
Access Control Software User Manual
" Note: “%” must be English symbol. Chinese symbol is rejecting to know.
(4) Click [OK], to show the result of filtration.
78
11. Appendix
group that can draw the rank head to upper side empty part, as the following
figure.
79
11. Appendix
80
11. Appendix
" Note: There are only [Only verify ID card] and [Only 1:1 verify] to suit ID
card setup in the verification option, the [Register Mifare card only] is just used
for Mifare user. When you set to verify ID card, the [Only 1:1 verify] must be
remarked as [NO], the [Register Mifare card only] is set to read the default.
B. Only 1:1 verify
User must to wave the card near the front of the device before placing the finger
on the sensor to verify until it is positive answer. This verification way applies to
the higher security requirement area. It is optimized for a lot of user site, the set
process is that: Open [Device Management] → [Biometric] → [Read Options]
→ Remark on [Only verify ID card] item and [Only 1:1 verify] item to [Yes] →
[Apply Options].
We suggest adopt this verification method when the device store fingerprints up
to 500, because the more fingerprints there are, the more slowly is the device
matching speed, the FAR (False Acceptance Rate) will be much more, the Only
verify ID card can speed up to identify and keep away fingerprint false
acceptance.
2. Mifare Card User
(1) Enroll Mifare Card
Please refer to the [User Management] part of FP device user guide to enroll
user, the enroll process is that: Add User → Input User Basic Information →
Connect to the FP device with Mifare Card Reader → Use UareU Sensor or FP
device to enroll fingerprint → Write Card via FP device → Wave Card → Write
Card Successfully,
The fingerprint can store in the Mifare card, they have the same result and
efficacy of wave a card and place finger to verify. Select device with Mifare is
optimal option for user.
(2) Mifare Card Verification Model
81
Access Control Software User Manual
82
11. Appendix
83
11. Appendix
2. Enter the dialogue box of system properties, select [Hardware], and click
[Device Manager], as shown below:
84
11. Appendix
4. Right click the device, and select [Properties] in the menu, as shown
below:
85
Access Control Software User Manual
86
11. Appendix
87
Access Control Software User Manual
Copyright laws and international treaty provisions protect the software and its
documents.
You cannot delete the copyright announcement from the software, and
guarantee to replicate the copyright announcement for the duplications of the
software. You agree to stop any illegal duplicating actions for this SOFTWARE
and its documents.
LIMITED WARRANTY:
Our company warrants that if use the software in normal condition, there will be
no materials or craft defects in software in 90 days since the sell date. If there is
defect indeed after validation, our responsibility is to change good software for
you as the only compensation.
If the defects caused by accidents, or misuse or incorrect use, this warranty will
be of no effect.
The warranty days for the exchanged software are the rest of the warranty days
of the original software, or 30 days if the rest of days are less than 30 days.
NO OTHER WARRANTIES:
There are no any other warranties besides the above ones.
LIMITED LIABILITY:
The above warranty refers to all, both pointed content and implied content,
including, commodity and adaptability of special application purpose. Whether
both parties abide by this agreement or not, our company and our agent & seller
have no responsibility for the profit loss, lost availability, business interruption, or
any indirect, special, inevitable damage, or any compensation claim brought by
this system, even if our company is informed in advance that such things can
happen.
TERMINATION
Without prejudice to any other rights, our company may terminate this agreement
if you fail to comply with the terms and conditions of this agreement. In such
88
11. Appendix
event, you must destroy all copies of the software and all of its component parts,
or give them back to our company.
GOVERNING LAWS:
INTELLECTUAL PROPERTY RIGHTS PROTECTION , COPYRIGHT LAW,
and PATENT LAW and so on.
89