Face Recognition Terminal User’s Manual User’s Manual V1.0.
Foreword General This manual introduces the installation and basic operation of the Face Recognition Terminal (hereinafter referred to as "terminal"). Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning DANGER Indicates a high potential hazard which, if not avoided, will result in death or serious injury. WARNING Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurred when using the device. If there is any uncertainty or controversy, please refer to our final explanation.
Important Safeguards and Warnings This chapter describes the contents covering proper handling of the terminal, hazard prevention, and prevention of property damage. Read these contents carefully before using the terminal, comply with them when using, and keep them well for future reference. Operation Requirement Do not place or install the terminal in a place exposed to sunlight or near the heat source. Keep the terminal away from dampness, dust or soot.
Table of Contents Foreword .................................................................................................................................................... I Important Safeguards and Warnings .................................................................................................... III 1 Overview ................................................................................................................................................. 1 1.1 Introduction ...................
3.10.9 Reboot ............................................................................................................................ 29 3.11 USB ........................................................................................................................................... 29 3.11.1 USB Export ..................................................................................................................... 29 3.11.2 USB Import..............................................................
4.13 Configuration Management ...................................................................................................... 69 4.14 Upgrade .................................................................................................................................... 69 4.15 Version Information ................................................................................................................... 69 4.16 Online User ..................................................................
1 Overview 1.1 Introduction The terminal is an access control panel that supports unlock through faces, passwords, and supports unlock through their combinations. 1.
Figure 1-1 Networking 1.4 Dimension and Component Figure 1-2 Dimensions and components of model X (mm [inch]) Table 1-1 Component description (1) No. Name No.
Figure 1-3 Dimensions and components of model Y (mm [inch]) Table 1-2 Component description (2) No. Name No.
2 Connection and Installation 2.1 Cable Connections The cable connection of model X and model Y is the same. This section takes the model X as an example. Check whether the access control security module is enabled in Function > Security Module. If the security module is enabled, you need to purchase access control security module separately. The security module needs separate power supply to provide power.
No. Name 3 Ethernet port 4 Ethernet port (only supported by 7-inch model B access controllers) Table 2-2 Port description Port Cable color Cable name Description Black RD– Negative electrode of external card reader. Red RD+ Positive electrode of external card reader. Blue CASE Tamper alarm input of the external card reader. White D1 Wiegand D1 input (connected to external card reader)/output (connected to controller).
Port CON3 Cable color Cable name Description White purple and PUSH2 Door open button of door No.2 White green and GND Connected to the common GND port. White brown and ALARM1 Alarm 1 input port. Black blue and GND Connected to the common GND port. Black gray and SR1 Used for door contact detection. Black green and PUSH1 Door open button of door No.1 Black purple and DOOR1_NC Lock control normally closed port. Black brown and DOOR1_COM Lock control common port.
Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. If there is no suitable indoor environment (including areas directly facing indoor and outdoor areas, and outdoor doorways), set up a temporary passage with stable ambient temperature for temperature monitoring.
Places Not Recommended Figure 2-4 Places not recommended 2.3 Installation Drawings Figure 2-5 Installation drawings (mm [inch]) 2.4 Installation The installation of model X and model Y is the same. This section takes model X as an example.
Figure 2-6 Installation of the terminal Figure 2-7 Applying silicon sealant to the terminal Table 2-3 Component description No. Name 1 Terminal 2 Ornamental cover 3 M5 screw 4 Waterproof silica gel plug 5 Cable Installation Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Thread cable through the turnstile. Put the waterproof silica gel plug on the cable. Fix the terminal onto the turnstile with M5 screws. Connect cables for terminal. See "2.1 Cable Connections.
3 System Operations 3.1 Basic Configuration Procedure Figure 3-1 Basic configuration procedure 3.2 Common Icons Table 3-1 Icon description Icon Description Main menu icon. Confirm icon. Turn to the first page of the list. Turn to the last page of the list. Turn to the previous page of the list. Turn to the next page of the list. Return to the previous menu. Enable. Disable. 3.
Figure 3-2 Initialization Administrator and password set on this interface are used to log in to the web management platform. The administrator password can be reset through the email address you entered if the administrator forgets the administrator password. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). 3.
Figure 3-3 Homepage Table 3-2 Homepage description No. Description Unlock methods: Card, face, fingerprint, and password. 1 When card, face, fingerprint, and password are all set as unlock mode, the password icon will not be displayed at the upper-left corner of the access controller. 2 Date & Time: Current date and time. 3 Network status and USB status. Main menu. 4 Only administrators can enter the main menu. 5 Password unlock. 6 Administrator password unlock. 7 Tap to call other devices.
Figure 3-4 Administrator login Step 2 Select a main menu entering method.
Figure 3-5 Main menu 3.6 Unlocking Methods You can unlock the door through faces and passwords. 3.6.1 Face Make sure that your face is centered on the face recognition frame, and then you can unlock the door. 3.6.2 User Password Enter the user password, and then you can unlock the door. Step 1 Tap on the homepage. Step 2 Enter the user ID, and then tap . Step 3 Enter the user password, and then tap 14 .
3.6.3 Administrator Password Enter the administrator password, and then you can unlock the door. There is only one administrator password for one terminal. The administrator password can unlock the door without being subject to user levels, unlock modes, periods, holiday plans, and anti-passback. Administrator password cannot be used when NC is selected at "NC Period." Step 1 Tap on the homepage. Step 2 Tap Please Enter Administrator PWD. Step 3 Enter the administrator password, and then tap . 3.
Step 2 Configure parameters on the interface. Table 3-3 New user parameter description Parameter Description User ID Enter user IDs. The IDs can be numbers, letters, and their combinations, and the maximum length of the ID is 32 characters. Each ID is unique. Name Enter names with at most 32 characters (including numbers, symbols, and letters). Face Make sure that your face is centered on the picture capturing frame, and then a picture of your face will be automatically captured.
3.8 Access Management You can do access management on period, unlock mode, alarm, door status, and lock holding time. Tap Access to go to the access management interface. 3.8.1 Period Management You can set periods, holiday periods, holiday plan periods, door normally open periods, door normally closed periods, and remote verification periods. 3.8.1.1 Period Configuration You can configure 128 periods (weeks) whose number range is 0–127. You can set four periods on each day of a period (week).
3.8.1.6 Remote Verification Period If you configured the remote verification period, then when unlock doors during the period you configured, remote verification is required. To unlock the door in this period, a door unlock instruction sent by the management platform is needed. You need to enable the Remote Verification Period. means enabled. means not enabled. 3.8.2 Unlock There are three unlock modes: unlock mode, unlock by period, and group combination.
Figure 3-7 Element (multiple choice) Step 2 Select one or more unlock modes. Tap a selected unlock mode again, the unlock mode will be deleted. Step 3 Select a combination mode. + And means "and". For example, if you select card + PWD, it means, to unlock the door, you need to swipe your card first, and then get the password. / Or means "or". For example, if you select card/PWD, it means, to unlock the door, you can either swipe your card or enter the password. Step 4 Tap to save the settings.
Figure 3-8 Unlock by period Step 2 Set starting time and end time for a period, and then select an unlock mode. Step 3 Tap to save the settings. Step 4 Enable the Unlock by Period function. means enabled. means not enabled. 3.8.2.3 Group Combination Doors can only be unlocked by a group or groups that consist of more than two users if the Group Combination is enabled. Step 1 Select Access > Unlock Mode > Group Combination. Figure 3-9 Group combination Step 2 Tap to create a group.
Figure 3-10 Add a group Table 3-4 Group parameter Parameter User List Description Add users to the newly created group. 1. Tap User List. 2. Tap , and then enter a user ID. Tap to save the settings. There are two options: PWD and Face. 3. Unlock Mode Valid User Valid users are the ones that have unlock permission. Doors can be unlocked only when the number of users to unlock the doors equals the valid user number. Valid users cannot exceed the total number of users in a group.
means not enabled. Table 3-5 Parameters on the alarm interface Parameter Description Anti-passback After the anti-passback is enabled, users need to verify identities both for entry and exit; otherwise an alarm will be triggered. If a person enters with the identity checked and exits without the identity checked, an alarm will be triggered when the person tries to enter again and the person will have no permission to unlock the door any more.
Figure 3-12 IP address configuration Table 3-6 IP configuration parameters Parameter IP Address/Subnet Mask/Gateway IP Address Description The IP address, subnet mask, and gateway IP address should be on the same network segment. After configuration, tap to save the configurations. DHCP DHCP (Dynamic Host Configuration Protocol). When the DHCP is enabled, the IP address can be automatically acquired, and the IP address, subnet mask and gateway IP address cannot be manually configured.
Table 3-7 Active register parameter Parameter Description Server IP Address IP address of the managing platform. Port Port number of the managing platform. Device ID Subordinate device number on the managing platform. 3.9.1.3 Wi-Fi You can connect the terminal to the network through Wi-Fi if the terminal has Wi-Fi function. 3.9.2 Serial Port Settings Select serial input or serial output according to the use of the external devices. Select Connection > Serial Port.
3.9.3 Wiegand Configuration Select Wiegand Input or Wiegand Output accordingly. Select Connection > Wiegand. Figure 3-14 Wiegand Select Wiegand Input when an external card swipe mechanism is connected to the terminal. When Serial Input is selected to make the terminal be connected to the reader in the turnstile, you need to select Door 1 or Door 2 as needed. Door 1: If Door 1 is selected, then the reader and terminal control the same door opening direction.
3.10 System 3.10.1 Time You can do date format setting, date setting, time setting, DST setting, NTP check, time zone settings. When you select Network Time Protocol (NTP), you need to configure the following parameters. You need to enable the NTP Check function first. Server IP Address: enter the IP address of the time server, time of the terminal will be synchronized with the time server. Port: Enter the port number of the time server. Interval (min): NPT check interval. Tap the save icon to save.
Name Description Recognition is, the wider range of the profiles will be recognized. Pupillary Distance Pupillary distance is the pixel value of the image between the centers of the pupils in each eye. You need to set an appropriate value so that the access controller can recognize faces as needed. The value changes according to the face sizes and the distance between faces and the lens. The closer the face is to the lens, the greater the value should be. If an adult is 1.
Name Description person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed. Mask intercept: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is not allowed. 3.10.
3.10.8 Restore to Factory Settings Data will be lost if you restore the terminal to the factory settings. After the terminal is restored to the factory settings, IP address will not be changed. You can select whether to retained user information and logs. You can select to restore the terminal to the factory settings with all user information and device information deleted. You can select to restore the terminal to the factory settings with user information and device information retained. 3.10.
Figure 3-16 USB export Step 2 Select the data type that you want to export. Step 3 Tap OK. Data exported will be saved in the USB. 3.11.2 USB Import Only data in the USB flash drive that was exported from one terminal can be imported into another terminal. Step 1 Select USB > USB Import.
Figure 3-17 USB Import Step 2 Select the data type that you want to import. Step 3 Tap OK. Data in the USB flash drive will be imported into the terminal. 3.11.3 USB Update USB flash drive can be used to update the system. Step 1 Rename the updating file name to "update.bin", and save the "update.bin" file in the root directory of the USB. Step 2 Select USB > USB Update. Step 3 Tap OK. The update starts, and the terminal will restart after the update is finished. 3.11.
Figure 3-18 Features Table 3-10 Feature description Parameter Description Privacy Setting See Figure 3-19 for details. Card No. Reverse If the third-party card reader needs to be connected to the access controller through the wiegand output port, you need to enable the Card No. Reverse function; otherwise the communication between the access controller and the third party card reader might fail due to protocol discrepancy.
Privacy Setting Figure 3-19 Privacy setting Table 3-11 Features Parameter Description PWD Reset Enable If the PWD Reset Enable function is enabled, you can reset the password. The PWD Reset function is enabled by default. HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a protocol for secure communication over a computer network. When HTTPS is enabled, HTTPS will be used to access CGI commands; otherwise HTTP will be used. When HTTPS is enabled, the access controller will restart automatically.
Parameter Description FP If you select OFF for Fingerprint (FP), users’ fingerprint information will not be displayed when they get fingerprints recorded or when they use fingerprints to unlock the door. Capture Photo If you select ON, when a user unlocks the door, the user’s photo will be automatically taken. This function is ON by default. Clear All Captured Photos Tap the icon, and you can delete all captured photos. Face Privacy Set different levels to blur the standby interface.
User Photo & Name Figure 3-21 User photo & name Only Name Figure 3-22 Only name 35
Success or Failure Figure 3-23 Success or failure 3.12 Record You can query all unlocking records.
3.13 Auto Test When you use the terminal for the first time or when the terminal malfunctioned, you can use auto test function to check whether the terminal can work normally. Do actions according to the prompts. Figure 3-25 Auto test When you select Auto Test, the terminal will guide you to do all the auto tests. 3.14 System Info You can view data capacity, device version, and hardware version of the terminal on the System Info interface.
4 Web Operations The terminal can be configured and operated on the web. Through the web you can set parameters including network parameters, video parameters, and terminal parameters; and you can also maintain and update the system. 4.1 Initialization You need to set a password and an email address before logging in to the web for the first time. Step 1 Open IE web browser, and enter the IP address (the default address is 192.168.1.108) of the terminal in the address bar, and then press Enter.
When you need to reset the administrator password by scanning the QR code, you need an email address to receive the security code. Step 3 Click Next. Figure 4-2 Auto check Step 4 You can decide whether to select Auto Check or not. It is recommended that Auto Check be selected to get the latest program in time. Step 5 Click Next. Figure 4-3 Auto check completed Step 6 Click Complete, and the initialization is completed.
4.2 Login Step 1 Open IE web browser, enter the IP address of the terminal in the address bar, and press Enter. Use browser newer than IE 8, otherwise you might not log in to the web. Make sure that the IP address of computer used to log in to the web is in the same LAN with the terminal. 7-inch model X terminals have dual NICs. The default IP address for ETH1 is 192.168.1.108, and for ETH2 is 192.168.2.108. Figure 4-4 Login Step 2 Enter the username and password.
Figure 4-5 Tips Step 2 Read the tips. Step 3 Click OK. Figure 4-6 Reset password Step 4 Scan the QR code on the interface, and you will get the security code. At most two security codes will be generated by scanning the same QR code. To get more security code, refresh the QR code. You need to send the content you get after you scanned the QR code to the designated email address, and then you will get the security code. Please use the security code within 24 hours after you receive it.
Step 7 Reset and confirm the new password. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Step 8 Click OK, and the reset is completed. 4.4 Alarm Linkage 4.4.1 Setting Alarm Linkage Alarm input devices can be connected to the terminal, and you can modify the alarm linkage parameter as needed. Step 1 Select Alarm Linkage on the navigation bar.
Parameter Description If alarm input type of the alarm device you purchased is NO, then you should select NO; otherwise you should select NC. Fire Link Enable If fire link is enabled the terminal will output alarms when fire alarms are triggered. The alarm details will be displayed in the alarm log. Alarm output and access link are NO by default if fire link is enabled. Alarm Output Enable The relay can output alarm information (will be sent to the management platform) if the Alarm Output is enabled.
Figure 4-10 Query results 4.5 Call Configuration The access controller can work as a door station and call other devices. 4.5.1 Configuring the Access Controller Set the device type and number. 4.5.1.1 Access Controller as SIP Server Step 1 Log in to the web. Step 2 Select Talkback Setting > Local. Step 3 Configure the parameters. Figure 4-11 Local (1) Table 4-2 Parameter description Parameter Description Device Type The access controller can only work as a unit door station. Centre Call No.
4.5.1.2 Other Device as SIP Server Step 1 Log in to the web. Step 2 Select Talkback Setting > Local. Step 3 Configure the parameters. Figure 4-12 Local (2) Table 4-3 Parameter description Parameter Description Device Type The access controller can work as a unit door station or fence station. Centre Call No. Enter a number to be identified by the management center. It should be "888888" plus three numbers. Enter a number for the access controller. VTO No.
Figure 4-13 SIP server (1) Step 4 Click OK and the access controller will restart. 4.5.2.2 Other Device as SIP Server Step 1 Step 2 Step 3 Step 4 Log in to the web. Select Talkback Setting > SIP Server. Do not enable SIP Server and select Server Type as VTO. Configure the parameters.
Figure 4-14 SIP server (2) Table 4-4 SIP server parameter description (1) Parameter Description IP Address The IP address of the door station working as the SIP server. Port 5060 by default. Username Keep the default values. Password SIP Domain SIP Server Username SIP Server Password Must be VDP. SIP server login username and password. Step 5 Click OK. 4.5.3 Door Station Management When the access controller works as the SIP server, add other door stations to call them.
Figure 4-15 VTO No. management Step 4 Configure the parameters. Figure 4-16 Add a door station Table 4-5 Parameter description Parameter Description Rec No. Number of the door station. Register Password Keep the default value. Build No. Cannot be configured. Unit No. Cannot be configured. IP Address IP address of the door station.
Parameter Username Password Description Web login username and password for the door station. Step 5 Click OK. 4.5.4 Indoor Monitor Management When the access controller works as the SIP server, add all relevant indoor monitors to call them. When there are master and extension indoor monitors, you need to enable group call function first before adding them. 4.5.4.1 Add One Indoor Monitor Step 1 Log in to the web. Step 2 Select Talkback Setting > Room No. Management. Step 3 Click Add.
Figure 4-18 Add one indoor monitor Table 4-6 Parameter description Parameter Description First Name Last Name To differentiate each indoor monitor. Nick Name Room number of the indoor monitor. Room No. Register Type Register Password It can contain up to five digits and must be the same as the one configured on the indoor monitor.
Step 4 Click Add. Figure 4-19 Add indoor monitors in batches 4.5.5 Configuring the Managing Device When the access controller works as the SIP server, add other managing devices to call them. Step 1 Log in to the web. Step 2 Select Talkback Setting > VTS Management. Step 3 Click Add. Figure 4-20 Add managing devices Step 4 Enter the information. VTS No. can contain up to 9 digits. Login password for the managing device. Keep the default value. Step 5 Click OK.
Figure 4-21 Added a managing device Modify a managing device. You need to update the information when the register password or IP address of the managing device changes. Click and enter the new password or IP address, and then click OK. Delete a managing device. Click . 4.5.6 Online Status When the access controller works as the SIP server, administrators can log in to the web and check the information of online devices. Step 1 Log in to the web. Step 2 Select Talkback Setting > Status.
Figure 4-22 Status 4.5.7 Call Logs You can check up to 1024 call logs. Step 1 Log in to the web. Step 2 Select Talkback Setting > Call. Step 3 (Optional) Click Export Data to export all the logs.
4.6 Data Capacity You can see how many users, cards and face images the terminal can hold on the Data Capacity interface. Figure 4-24 Data capacity 4.7 Video Setting You can set parameters including data rate, image parameters (brightness, contrast, hue, saturation, etc.), and exposure on the Video Setting interface. 4.7.
Table 4-7 Data rate parameter description Parameter Description Video Standard There are two options: NTSC and PAL. Select a standard according to the video standard of your region. Channel There are two options: 1 and 2. 1 is white light camera and 2 is IR light camera. There are four options: D1, VGA, 720p and 1080p. Select an option according to the video quality you want. Video Format Main Format Extra Format 720p is set by default. If you need the call function, do not set it to 1080p.
Table 4-8 Image parameter description Parameter Description Brightness The larger the value is, the brighter the images will be. Contrast Contrast is the difference in luminance or color that makes an object distinguishable. The larger the contrast value is, the greater the brightness and color contrast will be. Hue The larger the value is, the deeper the color will be. The larger the value is, the brighter the colors will be. Saturation The value does not change image brightness.
Parameter Description stripes on images. Outdoor: When Outdoor is selected, the exposure mode can be switched. When you select Outdoor in the Anti-flicker drop-down list, you can select Shutter Priority as the exposure mode. Exposure modes of different devices might vary, and the actual product shall prevail. You can select from: Auto: The terminal will automatically adjust brightness of images. Shutter Priority: The terminal will adjust image brightness according to shutter exposure value range.
Figure 4-27 Motion detection Step 2 Press and hold the left mouse button, and then drag the mouse in the red area. The red rectangles are motion detection area. The default motion detection range is all the rectangles. To draw a motion detection area, you need to click Remove All first. The motion detection area you draw will be a non-motion detection area if you draw in the default motion detection area. Figure 4-28 Motion detection area Step 3 Set sensitivity and threshold.
When grid number is smaller than the threshold, green line will appear; when grid number is more than the threshold, red line will appear. See Figure 4-27. Step 4 Click OK to finish the setting. 4.7.5 Volume Setting You can adjust volume of the terminal speaker. Figure 4-29 Volume setting 4.7.6 Image Mode There are three options: indoor, outdoor and other.
Figure 4-31 Local coding Step 5 Click OK. 4.8 Face Detect You can configure human face related parameters on this interface to increase the accuracy of the face recognition. Step 1 Select Face Detect.
Figure 4-32 Face detect Step 2 Configure the parameters. Table 4-10 Face detect parameter description Parameter Description Face Recognition Threshold The larger the value is, the higher the accuracy will be. Max. Angle of Face Recognition The larger the angle is, the wider range of the profiles will be recognized. Anti-fake Threshold This function prevents people from unlocking by human face images or human face models. There are two options: Enable and Close.
Parameter Description Light value is greater than 19. Infrared Light Adjust IR brightnees by dragging the scroll bar. Recognition Timeout When a person who does not have the access permission stands in front of the terminal and gets the face recognized, the terminal will prompt that face recognition failed. The prompt interval is called recognition timeout.
Parameter Description higher than the actual temperature, the correction value is set to -0.5°C. Only the terminal with a temperature monitoring unit supports this parameter. Mask Mode No detect: Mask is not detected during face recognition. Mask reminder: Mask is detected during face recognition. If the person is detected without wearing a mask, the system will prompt mask reminder and passage is allowed. Mask intercept: Mask is detected during face recognition.
Table 4-11 TCP/IP Parameter Description Ethernet Card Select to configure parameters of the card. IP Version There is one option: IPv4. MAC MAC address of the terminal. Mode Static Set IP address, subnet mask, and gateway address manually. DHCP After DHCP is enabled, IP address, subnet mask, and gateway address cannot be configured.
HTTPS Port Default value is 443. RTSP Port Default value is 554. Step 3 Click OK to complete the setting. 4.9.3 Register When connected to external network, the terminal will report its address to the server that is designated by the user so that clients can get access to the terminal. Step 1 Select Network Setting > Auto Register. Step 2 Select Enable, and enter host IP, port, and sub device ID.
Figure 4-34 P2P Step 1 Select Network Setting > P2P. Step 2 Select Enable to enable P2P function. Step 3 Click OK to complete the setting. Scan the QR code on your web interface to get the serial number of the terminal. 4.10 Safety Management 4.10.1 IP Authority Select a cybersecurity mode as needed.
4.10.2 Systems 4.10.2.1 System Service There are four options: SSH, PWD Reset Enable, CGI, and HTTPS. Refer to "3.11.4 Features” to select one or more than one of them. The system service configuration done on the web page and the configuration on the Features interface of the terminal will be synchronized. Figure 4-36 System service 4.10.2.2 Creating Server Certificate Click Create Server Certificate, enter needed information, click Save, and then the terminal will reboot. 4.10.2.
4.11.1 Adding Users Click Add on the User Mgmt. interface to add users, and then enter username, password, confirmed password, and remark. Click OK to complete the user adding. 4.11.2 Modifying User Information You can modify user information by clicking on the User Mgmt. interface. Figure 4-37 User management 4.12 Maintenance You can make the terminal reboot itself in idle time to improve the running speed of the terminal. Figure 4-38 Maintenance Select the auto reboot date and time.
4.13 Configuration Management When more than one terminal needs the same configuration, you can configure parameters for them by importing or exporting configuration files. Figure 4-39 Configuration management 4.14 Upgrade You can select Auto Check to upgrade the system automatically. You can also select Manual Check to upgrade the system manually. Figure 4-40 Upgrade 4.
Figure 4-41 Online user 4.17 System Log You can view and backup the system log on the System Log interface. Figure 4-42 System log 4.17.1 Querying Logs Select a time range, type, click Query, and logs meet the conditions will be displayed.
4.17.2 Backing up Logs Click Backup to back up the logs displayed. 4.17.3 Admin Log Enter Admin ID on the Admin Log interface, click Query, and then you will see the administrator’s operation records. Figure 4-43 Admin log Hover the mouse cursor over , and then you can see detailed information of the current user. 4.18 Exit Click , click OK, and then you will log out the web interface.
5 FAQ 1 2 3 4 5 6 The terminal fails to start after power-on. Check whether the 12V power supply is correctly connected, and whether the power button is pressed. Faces cannot be recognized after the terminal powers on. Make sure that Face is selected in the unlock mode. See “3.8.2 Unlock”. Make sure that Face is selected as unlock mode in Access > Unlock Mode > Group Combination. See “3.8.2.3 Group Combination”.
Appendix 1 Notes of Temperature Monitoring Warm up the temperature monitoring unit for more than 20 minutes after power-on to enable the temperature monitoring unit to reach thermal equilibrium. Install the temperature monitoring unit in an indoor windless environment, and maintain the indoor ambient temperature at 15°C to 32°C. Avoid direct sunlight on the temperature monitoring unit. Avoid installing the temperature monitoring unit facing at the light source and glass.
Appendix 2 Notes of Face Recording/Comparison Before Registration Glasses, hats, and beards might influence face recognition performance. Do not cover your eye brows when wearing hats. Do not change your beard style greatly if you will use the device; otherwise face recognition might fail. Keep your face clean.
Do not shake your head or body, or the registration might fail. Avoid two faces appear in the capture frame at the same time. Face Position If your face is not at the appropriate position, face recognition effect might be influenced. Appendix Figure 2-2 Appropriate face position Requirements of Faces Make sure that the face is clean and forehead is not covered by hair. Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image recording.
too far from the camera. Appendix Figure 2-3 Head position Appendix Figure 2-4 Face distance When importing face images through the management platform, make sure that image resolution is within the range 150 × 300–600 × 1200; image pixels are more than 500 × 500; image size is less than 75 KB, and image name and person ID are the same. Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area, and the aspect ratio does not exceed 1:2.
Appendix 3 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic device network security: 1.
6. 7. 8. 9. 10. 11. 12. 13. We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.