User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Installation
- Chapter 3 Device Wiring
- Chapter 4 Basic Operation
- 4.1 Device Activation
- 4.2 Login
- 4.3 Parameters Configuration
- 4.4 User Management
- 4.5 Access Control System Configuration
- 4.6 Attendance Configuration
- 4.7 Other Management
- Chapter 5 Client Operation
- 5.1 Function Module
- 5.2 User Registration and Login
- 5.3 System Configuration
- 5.4 Access Control Management
- 5.4.1 Adding Access Control Device
- 5.4.2 Viewing Device Status
- 5.4.3 Editing Basic Information
- 5.4.4 Network Settings
- 5.4.5 RS-485 Settings
- 5.4.6 Wiegand Settings
- 5.4.7 M1 Card Encryption
- 5.4.8 Remote Configuration
- Checking Device Information
- Editing Device Name
- Editing Time
- Setting System Maintenance
- Managing User
- Setting Security
- Configuring Network Parameters
- Configuring Upload Method
- Configuring Network Center Parameters
- Configuring Advanced Network
- Configuring Wi-Fi
- Configuring Relay Parameters
- Configuring Access Control Parameters
- Uploading Background Picture
- Operating Relay
- Viewing Relay Status
- 5.5 Organization Management
- 5.6 Person Management
- 5.6.1 Adding Person
- Adding Person (Basic Information)
- Adding Person (Basic Information)
- Adding Person (Permission)
- Adding Person (Card)
- Adding Person (Fingerprint)
- Adding Person (Attendance Rule)
- Importing and Exporting Person Information
- Getting Person Information from Access Control Device
- Modifying and Deleting Person
- Changing Person to Other Organization
- Issuing Card in Batch
- 5.6.1 Adding Person
- 5.7 Schedule and Template
- 5.8 Permission Configuration
- 5.9 Advanced Functions
- 5.10 Searching Access Control Event
- 5.11 Access Control Event Configuration
- 5.12 Door Status Management
- 5.13 Arming Control
- 5.14 Time and Attendance
- Appendix A Tips for Scanning Fingerprint
- Appendix B Input Method Operation
- Appendix C Attendance Record Delete Rule
- Appendix D Overview of Device Parameters
- Appendix E Attendance Report Table
- Appendix F Custom Wiegand Rule Descriptions
Fingerprint Access Control Terminal·User Manual
2
Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm,
duress card alarm, and so on
Accurate data and time display provided by built-in electronic clock
Check the device running status via the Watchdog. When exception status occurs, the
system will reboot automatically
Data can be permanently saved after power-off
Remotely control via the iVMS-4200 client software
Collects fingerprint information locally or via fingerprint recorder
Note: Device with the model of DS-K1T803MF(L) supports collecting or applying fingerprint
pictures locally.
Supports the third party arming
Supports transmitting data via EHome to realize the whole network transmitting.
Activates via device
1.2.2 DS-K1T804F/MF/EF-1 Features
Doorbell ringtone settings function
2.4-inch LCD display screen
Transmission modes of wired network (TCP/IP)
Max. 3,000 users, 3,000 fingerprints and 100,000 access control events storage
Export the report and upgrade the device via the USB disk.
Adopts the optical fingerprint module, supporting 1:N mode (fingerprint, card + fingerprint)
and 1:1 mode (card + fingerprint) (DS-K1T804-1 does not support swiping card.)
Terminal authentication and user authentication
Multiple authentication modes: card, fingerprint, card + fingerprint, card + password,
fingerprint + password, card + fingerprint + password, and so on. (DS-K1T804-1 does not
support swiping card.)
EM card reading (DS-K1T804EF-1)
Mifare card reading, including card No. reading (DS-K1T804MF-1)
CPU card reading, including CPU card serial No.
Secure door control unit accessing via RS-485 connection
Tampering detection, unlocking overtime alarm, invalid card swiping over times alarm,
duress card alarm, and so on
Accurate data and time display provided by built-in electronic clock
Check the device running status via the Watchdog. When exception status occurs, the
system will reboot automatically
Data can be permanently saved after power-off
Remotely control via the iVMS-4200 client software
Collects fingerprint information locally or via fingerprint recorder
Supports the third party arming