User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Installation
- Chapter 3 Device Wiring
- Chapter 4 Basic Operation
- 4.1 Device Activation
- 4.2 Login
- 4.3 Parameters Configuration
- 4.4 User Management
- 4.5 Access Control System Configuration
- 4.6 Attendance Configuration
- 4.7 Other Management
- Chapter 5 Client Operation
- 5.1 Function Module
- 5.2 User Registration and Login
- 5.3 System Configuration
- 5.4 Access Control Management
- 5.4.1 Adding Access Control Device
- 5.4.2 Viewing Device Status
- 5.4.3 Editing Basic Information
- 5.4.4 Network Settings
- 5.4.5 RS-485 Settings
- 5.4.6 Wiegand Settings
- 5.4.7 M1 Card Encryption
- 5.4.8 Remote Configuration
- Checking Device Information
- Editing Device Name
- Editing Time
- Setting System Maintenance
- Managing User
- Setting Security
- Configuring Network Parameters
- Configuring Upload Method
- Configuring Network Center Parameters
- Configuring Advanced Network
- Configuring Wi-Fi
- Configuring Relay Parameters
- Configuring Access Control Parameters
- Uploading Background Picture
- Operating Relay
- Viewing Relay Status
- 5.5 Organization Management
- 5.6 Person Management
- 5.6.1 Adding Person
- Adding Person (Basic Information)
- Adding Person (Basic Information)
- Adding Person (Permission)
- Adding Person (Card)
- Adding Person (Fingerprint)
- Adding Person (Attendance Rule)
- Importing and Exporting Person Information
- Getting Person Information from Access Control Device
- Modifying and Deleting Person
- Changing Person to Other Organization
- Issuing Card in Batch
- 5.6.1 Adding Person
- 5.7 Schedule and Template
- 5.8 Permission Configuration
- 5.9 Advanced Functions
- 5.10 Searching Access Control Event
- 5.11 Access Control Event Configuration
- 5.12 Door Status Management
- 5.13 Arming Control
- 5.14 Time and Attendance
- Appendix A Tips for Scanning Fingerprint
- Appendix B Input Method Operation
- Appendix C Attendance Record Delete Rule
- Appendix D Overview of Device Parameters
- Appendix E Attendance Report Table
- Appendix F Custom Wiegand Rule Descriptions
Fingerprint Access Control Terminal·User Manual
i
User Manual
© 2018 Hangzhou Hikvision Digital Technology Co., Ltd.
This manual is applied for fingerprint access control terminal.
Name
Model
Fingerprint Access
Control Terminal
DS-K1T803F
DS-K1T803MF
DS-K1T803MF(L)
DS-K1T803EF
DS-K1T804F
DS-K1T804F-1
DS-K1T804MF
DS-K1T804MF-1
DS-K1T804EF
DS-K1T804EF-1
It includes instructions on how to use the Product. The software embodied in the Product is
governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domestic and international copyright protection. Hangzhou Hikvision
Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, partially or wholly, by any means, without the
prior written permission of Hikvision.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered
trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other
trademarks mentioned in this manual are the properties of their respective owners. No right of
license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL.
HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE
USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION
CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE
WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY
AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL
OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER
ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY
WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS
THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS
USED WITH ILLEGITIMATE PURPOSES.