ATN Thermal Entry Wizard TOUCHLESS FEVER DETECTOR MANUAL AMERICAN TECHNOLOGIES NETWORK CORP.
TA B L E O F C O N T E N T S Legal Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 About this Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Disclaimer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TA B L E O F C O N T E N T S TA B L E O F C O N T E N T S 7.3.4. Remove Resources from Group . . . . . . . . . . . . . . . . . . . . . . . . . 62 7.4. Person Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 7.4.1. Add Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.4.2. Configure Basic Information. . . . . . . . . . . . . . . . . . .
L E G A L I N F O R M AT I O N ABOUT THIS MANUAL The Manual includes instructions for using and managing the Product. Pictures, charts, images, and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find the latest version of this Manual at the www.manual.atncorp.com.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. FCC CONDITIONS This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. This device may not cause harmful interference. 2.
• Biometric recognition products are not 100% applicable to anti-spoofing environments. If you require a higher security level, use multiple authentication modes. • Working temperature: 0°C to 50°C • Indoor use. The device should be at least 2 meters away from the light, and at least 3 meters away from the window. CHAPTER 2. APPEARANCE Refer to the following contents for detailed information of the face recognition terminal: C H A P T E R 1. OV E R V I E W 1.1.
Table 2-1. Description of Face Recognition Terminal No. Name 1 USB Interface 2 Card Swiping Area 3 Touch Screen 4 Camera 5 IR Light 6 White Light 7 Thermographic Module 8 IR Light 9 Camera 10 TAMPER 11 Thermographic Module Interface 12 Debugging Port 13 Power Interface 14 Wiring Terminals 15 PSAM Card Slot (Reserved) 16 Network Interface Figure 3-1. Connect Thermographic Module 3. Use 5 supplied screws (4_KA4×22-SUS) to secure the mounting plate on the gang box. 4.
6. Use 2 supplied screws (SC-M4×14.5TP10-SUS) to secure the device and the mounting plate. NOTE When the screw’s head is beneath the device surface, the device is secured. Figure 3-4. Mounting Template Figure 3-3. Secure Device 3. Insert the screw sockets of the setscrews in the drilled holes. NOTE The installation height here is the recommended height. You can change it according to your actual needs. For easy installation, drill holes on mounting surface according to the supplied mounting template. 3.
Figure 3-7. Secure Device NOTE The installation height here is the recommended height. You can change it according to your actual needs. For easy installation, drill holes on mounting surface according to the supplied mounting template. Figure 3-6. Install Device 7. Use 2 supplied screws (SC-M4×14.5TP10-SUS) to secure the device and the mounting plate. NOTE When the screw’s head is beneath the device surface, the device is secured. CHAPTER 4.
If the cable size is 12 AWG, you should use a 12 V power supply. And the distance between the power supply and the device should be no more than 40 m. 4.1. TERMINAL DESCRIPTION The terminals contains power input, alarm input, alarm output, RS-485, Wiegand output, and door lock. The terminal’s diagram is as follows: The descriptions of the terminals are as follows: Table 4-1. Terminal Descriptions Group Group A No.
NOTE You should set the face recognition terminal’s Wiegand direction to “Input” to connect to a Wiegand card reader. If connects to an access controller, you should set the Wiegand direction to “Output” to transmit authentication information to the access controller. For details about Wiegand direction settings, see Setting Wiegand Parameters in Communication Settings. The power supply for the device should be 12 V DC, 2 A. The suggested external power supply for door lock is 12 V, 1 A.
Figure 4-6. Wiring Device Figure 4-4. Wire Device Figure 4-7. Wiring Secure Door Control Unit Figure 4-5. Wire Secure Door Control Unit Type 2 4.4.2. Wing Diagram of Door Locked When Powering Off Lock Type: Cathode Lock, Electric Lock, and Electric Bolt (NC) Security Type: Door Locked When Powering Off Scenario: Installed in Entrance/Exit with Fire Linkage NOTE The Uninterpretable Power Supply (UPS) is required.
The default values of the device are as follows: • The default IP address: 192.0.0.64 • The default port No.: 8000 • The default user name: admin 5.1. ACTIVATE VIA DEVICE If the device is not activated, you can activate the device after it is powered on. On the Activate Device page, create a password and confirm the password. Tap Activate and the device will activated. Figure 4-8. Device Wiring Figure 5-1. Activation Page Figure 4-9. Wiring Diagram C H A P T E R 5 .
• After activation, if you need to add the device to the client software or other platforms, you should edit the device IP address. For details, see Communication Settings. 5.2. ACTIVATE VIA SADP SADP is a tool to detect, activate and modify the IP address of the device over LAN. Before You Start • Get the SADP software from the manual.atncorp.com select the Thermal Entry Wizard and download the SADP software from the provided link.
6.2.1. Login for First Time You should login into the system before other device operations. Steps 1. Long tap on the initial page for 3 s to enter password entering page. 2. Tap the Password field and enter the device activation password. 3. Tap OK to enter the home page. NOTE The device will be locked for 30 minutes after 5 failed password attempts. For details about setting the administrator authentication mode, see Adding User. Figure 6-1. Welcome Page 2. Tap OK to save.
6.2.2. Login by Administrator After you add the administrator for the device, only the administrator can login the device for device operation. Steps 1. Long tap on the initial page for 3 s to enter the admin login page. Figure 6-4. Home Page NOTE The device will be locked for 30 minutes after 5 failed face or card attempts. Figure 6-3. Admin Login 2. Authenticate the administrator’s face or card to enter the home page. 3. Optional: Tap login. and you can enter the device activation password for 4.
6.3.1. Set Network Parameters You can set the device network parameters, including the IP address, the subnet mask, and the gateway. Steps 1. Tap Comm. (Communication Settings) on the Home page to enter the Communication Settings page. 2. On the Communication Settings page, tap Network to enter the Network tab. 3. Select an peripheral type according to your actual needs. NOTE Controller represents the access controller; Unit represents the secure door control unit and Reader represents the card reader.
6.4. USER MANAGEMENT On the user management interface, you can add, edit, delete, and search the user. 6.4.1. Add Administrator The administrator can login the device backend and configure the device parameters. Steps 1. Long tap on the initial page and log in the backend. 2. Tap User → + to enter the Add User page. 3. Edit the employee ID. NOTE The employee ID should be less than 32 characters. And it can be a combination of lower letters, upper letters, and numbers.
NOTE Make sure your face picture is in the face picture outline when adding the face picture. Make sure the captured face picture is in good quality and is accurate. For details about the instructions of adding face pictures, see Tips When Collecting/Comparing Face Picture. After completely adding the face picture, a captured face picture will be displayed at the upper right corner of the page. 7. Tap Save to save the face picture. 8.
6.4.5. Set Authentication Mode After adding the user’s face picture, password, or other credentials, you should set the authentication mode and the user can authenticate his/her identity via the configured authentication mode. Steps 1. Long tap on the initial page and log in the backend. 2. Tap User → Add User/Edit User → Authentication Mode. 3. Select Device or Custom as the authentication mode.
6.6. IMPORT AND EXPORT DATA On the Transfer page, you can export the event, the user data, the user picture, and the captured picture to the USB flash drive. You can also import the user data and the user picture from the USB flash drive. 6.6.1. Export Data Steps 1. Tap Transfer on the Home page to enter the Transfer page. 2. On the Transfer page, tap Export Event, Export User Data, Export Profile Photo, and export captured picture. 3.
6.8. SYSTEM SETTINGS 6.8.2. Set Face Picture Parameters On the System Settings page, you can set the system basic parameters, the face parameters, and upgrade the firmware. 6.8.1. Set Basic Parameters You can set the community No., building No., the unit No., voice prompt, voice volume, application mode, and white light brightness. On the Home page, tap System (System Settings) to enter the System Settings page.
Table 6-3. Face Picture Parameters Parameter Description 1:N (Security) Level Set the matching threshold when authenticating via 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. By default, the value is 84. 1:1 (Security) Level Set the matching threshold when authenticating via 1:1 matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. By default, the value is 75.
The device can also be upgraded by unplugging the device, plugging in USB, and rebooting. The upgrade will occur automatically. NOTE Do not power off during the device upgrade. The upgrading file should be in the root directory. The upgrading file name should be digicap.dav. Figure 6-13. Access Control Parameters The available parameters descriptions are as follows: Table 6-4. Access Control Parameters Descriptions Parameter Description Select the face recognition terminal’s authentication mode.
6.10.3. Log Query You can search the authentication logs within a period of time by inputting employee ID, card No., or user name. Steps 1. On the Home page, tap Log (Log) to enter the Log page. Figure 6-16. Disable Attendance Mode . Set the Attendance Mode as Disable. And tap You will not view or configure the attendance status on the initial page. And the system will follow the attendance rule that configured on the platform. 6.11.2. Set Auto Attendance via Device Figure 6-15.
c) Select Monday, Tuesday, Wednesday, Thursday, Friday, Saturday, or Sunday. d) Tap the select date and set the selected attendance status’s start time. e) Tap Confirm. f) Repeat step 1 to 5 according to your actual needs. NOTE The attendance status will be valid within the configured schedule. 4. Tap Before You Start Add at least one user and set the user’s authentication mode. For details, see User Management. Steps 1. Tap T&A Status to enter the T&A Status page. 2.
6.12. VIEW SYSTEM INFORMATION View device capacity, device information, and the open source software license. View Capacity You can view the added user’s number, the face picture’s number, the face with mask’s number, the card’s number, and the event’s number. Tap Info. (System Information) → Capacity on the Home page to enter the Capacity page. View the Open Source License information. Tap Info. (System Information) → License to enter the Open Source Software Licenses page.
7.2. DEVICE MANAGEMENT The client supports managing access control devices. Example You can control entrance & exit and manage attendance after adding access control devices to the client. 7.2.1. Add Device The client provides three device adding modes including by IP/domain, IP segment, and ISUP protocol. The client also supports importing multiple devices in a batch when there are large amount of devices to be added.
CAUTION The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Password Enter the device password. CAUTION The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Password Enter the device password. CAUTION The password strength of the device can be automatically checked. We highly recommend you change the password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Before You Start Import the resources to group. Refer to Import Resources to Group. Steps 1. Enter the Device Management module. 2. Click Device Management → Group to enter the group management page. All the added groups are displayed on the left. 3. Select a group on the group list and click Access Point. The access points imported to the group will display. 4. Click in the Operation column to open the Edit Resource window. 5. Edit the resource name. 6. Click OK to save the new settings. 7.3.4.
5. Select Local as the card issuing mode. 7.4.4. Upload a Face Photo from Local PC When adding person, you can upload a face photo stored in local PC to the client as the person's profile. Steps 1. Enter Person module. 2. Select an organization in the organization list to add the person and click Add. NOTE Enter the person's basic information first. For details about configuring person's basic information, refer to Configure Basic Information. 3. Click Add Face in the Basic Information panel. 4.
6. Collect face. a) Face to the camera of the selected access control device and make sure your face is in the middle of the collecting window. b) Click to capture a photo. c) Click OK to save the captured photo. 7. Confirm to add the person. • Click Add to add the person and close the Add Person window. • Click Add and New to add the person and continue to add other persons. 7.4.7.
5. Check the person's operation permissions. Super User If the person is set as a super user, he/she will have authorization to access all the doors/floors and will be exempted from remaining closed restrictions, all anti-passback rules, and first person authorization. Extended Door Open Time Use this function for persons with reduced mobility. When accessing the door, the person will have more time than others to pass through doors.
• Click Add and New to add the person and continue to add other persons. 7.4.11. Import and Export Person Identify Information You can import the information and pictures of multiple persons to the client software in a batch. Meanwhile, you can also export the person information and pictures and save them in your PC. 7.4.12. Import Person Information You can enter the information of multiple persons in a predefined template (CSV/Excel file) to import the information to the client in a batch. Steps 1.
7.4.16. Get Person Information from Access Control Device If the added access control device has been configured with person information (including person details and issued card information), you can get the person information from the device and import them to the client for further operations. Steps NOTE If the person name stored in the device is empty, the person name will be filled with the issued card No. after importing to the client. The gender of the persons will be Male by default.
Local Mode: Issue Card by Card Enrollment Station Connect a card enrollment station to the PC running the client. You can place the card on the card enrollment station to get the card number. Card Enrollment Station Select the model of the connected card enrollment station NOTE Currently, the supported card enrollment station models include DS-K1F100-D8, DS-K1F100-M, DS-K1F100-D8E, and DS-K1F180-D8E. Card Type This field is only available when the model is DS-K1F100-D8E or DSK1F180-D8E.
d) View the applying status in the Status column or click Applying Status to view all the applied access group(s). NOTE You can check Display Failure Only to filter the applying results. The selected persons in the applied access groups will have the authorization to enter/exit the selected doors/door stations with their linked card(s). 9. Optional: Click to edit the access group if necessary.
Configure Parameters for Door After adding the access control device, you can configure its access point (door) parameters. Steps 1. Click Access Control → Advanced Function → Device Parameter. 2. Select an access control device on the left panel, and then click to show the doors or floors of the selected device. 3. Select a door or floor to show its parameters on the right page. 4. Edit the door or floor parameters. NOTE The displayed parameters may vary for different access control devices.
Face 1:N Matching Threshold Set the matching threshold when authenticating via 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate when authentication. Face Recognition Interval The time interval between two continuous face recognitions when authenticating. By default, it is 2s. Face Anti-spoofing Enable or disable the live face detection function. If enabling the function, the device can recognize whether the person is a live one or not.
Perform this task when you want to configure opening door with first person. Steps 1. Click Access Control → Advanced Function → First Person In to enter the First Person In page. 2. Select an access control device in the list on the left panel. 3. Select the current mode as Enable Remaining Open after First Person or Disable Remaining Open after First Person from the drop-down list for each access control point of the selected device. Figure 7-7.
2. Select a card reader as the beginning of the path in the First Card Reader field. 3. Click of the selected first card reader in the Card Reader Afterward column to open the select card reader dialog. 4. Select the afterward card readers for the first card reader. NOTE Up to four afterward card readers can be added as afterward card readers for one card reader. 5. Click OK in the dialog to save the selections. 6. Click Save in the Anti-Passback Settings page to save the settings and take effect.
Before setting the capture parameters, you should set the picture storage first to define where the event triggered pictures are saved. For details, refer to Set Picture Storage in the user manual of the client software. Set Triggered Capture Parameters When an event occurs, the camera of the access control device can be triggered to capture picture(s) to record what happens when the event occurs. You can view the captured pictures when checking the event details in Event Center.
1. Enter the Access Control module. 2. On the navigation bar on the left, enter Advanced Function → More Parameters. 3. Select an access control device in the device list and click M1 Card Encryption to enter the M1 Card Encryption page. 4. Set the switch to on to enable the M1 card encryption function. 5. Set the sector ID. NOTE The sector ID ranges from 1 to 100. By default, Sector 13 is encrypted. It is recommended to encrypt sector 13. 6. Click Save to save the settings.
a) Select the event(s) and click Edit Linkage to set the client actions when the events triggered. Audible Warning The client software gives an audible warning when alarm is triggered. You can select the alarm sound for audible warning. NOTE For setting the alarm sound, please refer to Set Alarm Sound in the user manual of client software. 7.7.2. Configure Device Actions for Access Event You can set the access control device's linkage actions for the access control device's triggered event.
7.8.1. Control Door Status Steps NOTE It should be supported by the device. 1. Click Access Control → Linkage Configuration. 2. Select the access control device from the list on the left. 3. Click Add to add a new linkage. 4. Select Person Linkage as the event source. 5. Enter the employee number or select the person from the drop-down list. 6. Select the card reader where the card swipes. 7. In the Linkage Target area, set the property target to enable this action.
2. Optional: Check the event type and event status so that these events will show in the list if the events are detected. The events of unchecked type or status will not be displayed in the list. 3. Optional: Check Show Latest Event and the latest access record will be selected and displayed at the top of the record list. 4. Optional: Click the event to view the accessed person details, including person pictures (captured picture and profile), person No.
7.9.3. Search Historical Events In the Event Search module of the event center page, you can search the historical events via time, device type, and other conditions according to the specified device type, and then process the events. Before You Start Enable receiving events from devices before the client can receive event information from the device,see Enable Receiving Event from Devices for details. Steps 1. Click Event Center → Event Search to enter the event search page.
NOTE After an event is handled, the Handle button will become Add Remark, click Add Remark to add more remarks for this handled event. 6. Optional: Click Export to export the event log or event pictures to the local PC in CSV format. You can set the saving path manually. 7. Hover the cursor on the related picture, and then click the download icon on the upper-right corner of the picture to download it to the local PC. You can set the saving path manually. 7.10.
DST On the Device for Management page, click Remote Configuration → System → Time → DST to enter the DST tab. Enable DST and you can edit the DST bias time, the DST start time, and end time. Click Save. 7.10.4. System Maintenance You can reboot the device remotely, restore the device to default settings, import configuration file, upgrade the device, etc. Reboot On the Device for Management page, click tenance to enter the System Maintenance tab. Click Reboot and the device starts rebooting.
DHCP If you disable the function, you should manually set the device's IPv4 address, IPv4 subnet mask, IPv4 default gateway, MTU, and port. If you enable the function, the system will automatically assign IPv4 address, IPv4 subnet mask, IPv4 default gateway for the device. HTTP Set the HTTP port, DNS1 server address, and DNS2 server address. 7.10.8. Report Strategy Settings You can set the center group for uploading the log via the EHome protocol.
Set the matching threshold when authenticating via ECO mode 1:N matching mode. The larger the value, the smaller the false accept rate and the larger the false rejection rate. ECO Mode Threshold When enabling the ECO mode, you can set the ECO mode’s threshold. The larger the value, the easier the device entering the ECO mode. Available range: 0 to 8. Click Save to save the settings. 7.10.14. Configure Face Picture Parameters Steps 1. Click Maintenance and Management → Device to enter the device list. 2.
7.10.19. Operate Relay Steps 1. Click Maintenance and Management → Device to enter the device list. 2. Click to enter the remote configuration page. 3. Click Operation → Relay. 4. Enable or disable the relay. 7.10.20. View Relay Status Click Maintenance and Management → Device to enter the device list. Size Make sure your face is in the middle of the collecting window. Click to enter the remote configuration page. Click Status → Relay and you can view the relay status. A.
3. Avoid backlight, direct and indirect sunlight. C.
For customer service and technical support, please contact American Technologies Network Corp. 1341 San Mateo Avenue, South San Francisco, CA 94080 phone: 800-910-2862, 650-989-5100 e-mail: service@atncorp.com www.atncorp.