User's Guide
eNBioAccess-T9 user guide 5
NITGEN Co,. Ltd / #1208 ,641-4, Munjeong-dong, Songpa-gu, Seoul, Korea (138-050)
Tel: 02-6488-3232, Fax: 02-6488-3099, E-Mail: customer@nitgen.com
3.6.6.1. Deleting all users ................................................................................... 47
3.6.6.2. Setting delete ........................................................................................ 48
3.6.6.3. Log data delete ..................................................................................... 48
3.6.6.4. Image log delete .................................................................................... 48
3.6.6.5. Deleting all ............................................................................................ 49
3.7. Terminal setting ................................................................................................... 49
3.7.1. Sound ........................................................................................................... 49
3.7.2. Terminal option ............................................................................................. 50
3.7.3. Input setting .................................................................................................. 51
3.7.4. Lock setting .................................................................................................. 53
3.7.5. External terminal setup ................................................................................. 54
3.8. Screen setting ...................................................................................................... 55
3.8.1. Theme .......................................................................................................... 55
3.8.2. Camera......................................................................................................... 55
3.8.3. Language ..................................................................................................... 56
3.8.4. LCD option ................................................................................................... 56
3.8.5. Message time setting .................................................................................... 57
3.9. Terminal information ............................................................................................ 58
3.9.1. System information ....................................................................................... 58
3.9.2. Terminal information ..................................................................................... 58
3.9.3. Network information ...................................................................................... 59
3.9.4. User information ........................................................................................... 60
3.9.5. Log information ............................................................................................. 60
3.9.6. About ............................................................................................................ 61
3.10. SD card ............................................................................................................... 62
4. How to use terminal ........................................................................................... 65
4.1. Converting authentication mode ........................................................................ 65
4.2. ID input ................................................................................................................. 66
4.3. Authentication ...................................................................................................... 67
4.3.1. Face authentication ...................................................................................... 67
4.3.2. Fingerprint verification .................................................................................. 67
4.3.3. Card authentication ...................................................................................... 68
4.3.4. Password authentication ............................................................................... 68
4.3.5. Multi authentication ....................................................................................... 69