background image

12 

 

 About This Manual 

 

 

This manual is intended for  multiple product models, and the photos, illustrations, 

descriptions, etc, in this manual may be different from the actual appearances, functions, 

features, etc, of the product. 

 

This manual is intended for multiple software versions, and the illustrations and descriptions 

in this manual may be different from the actual GUI and functions of the software. 

 

Despite our best efforts, technical or typographical errors may exist in this manual. Our 

company cannot be held responsible for any such errors and reserves the right to change the 

manual without prior notice. 

 

Users are fully responsible for the damages and losses that arise due to improper operation. 

 

Our company reserves the right to change any information in this manual without any prior 

notice or indication. Due to such reasons as product version upgrade or regulatory 

requirement of relevant regions, this manual will be periodically updated. 

 Disclaimer of Liability 

 

 

To the extent allowed by applicable law, in no event will our company be liable for any special, 

incidental, indirect, consequential damages, nor for any loss of profits, data, and documents. 

 

The product described in this manual is provided on an "as is" basis. Unless required by 

applicable law, this manual is only for informational purpose, and all statements, information, 

and recommendations in this manual are presented without warranty of any kind, expressed 

or implied, including, but not limited to, merchantability, satisfaction with quality, fitness for 

a particular purpose, and noninfringement. 

 

Users must assume total responsibility and all risks for connecting the product to the Internet, 

including, but not limited to, network attack, hacking, and virus. We strongly recommends 

that users take all necessary measures to enhance the protection of network, device, data 

and personal information. Our company disclaims any liability related thereto but will readily 

provide necessary security related support. 

 

To  the extent not prohibited by applicable law,  in no event will our company and its 

employees, licensors, subsidiary, affiliates be liable for results arising out of using or inability 

to use the product or service, including, not limited to, loss of profits and any other 

commercial damages or losses, loss of data, procurement of substitute goods or services; 

property damage, personal injury, business interruption, loss of business information, or any 

special, direct, indirect, incidental, consequential, pecuniary, coverage, exemplary, 

subsidiary losses, however caused and on any theory of liability, whether in contract, strict 

liability or tort (including negligence or otherwise) in any way out of the use of the product, 

even if our company  has been advised of the possibility of such damages (other than as may 

be required by applicable law in cases involving personal injury, incidental or subsidiary 

damage). 

 

To the extent allowed by applicable law, in no event shall our total liability to you for all 

damages  for  the product described in this manual (other than as may be required by 

applicable law in cases involving personal injury) exceed the amount of money that you have 

paid for the product. 

 Network Security 

 

Please take all necessary measures to enhance network security for your device. 

Summary of Contents for 2MTHFR-2M

Page 1: ...2M TECHNOLOGY Face Recognition Access Control Terminal with Digital Temperature Measurement Module 2MTHFR 2M Quick Guide Version 1 01 REV05182020...

Page 2: ...ement distance It can connect to a face recognition access control terminal through the RS485 interface The module supports temperature measurement and personnel information binding It is capable of r...

Page 3: ...lution of blackbody target Pollution degree 2 If the euipment is used in a manner not specified by the manufacturer the protection provided by the equipment may be impaired 2 Appearance and Size Appea...

Page 4: ...re sensor 2 4 pin cable 1 Temperature sensor 2 Indicator 3 4 pin cable 3 Structure and Cable Structures and cables vary with device type The actual product shall prevail Structure and Cable 1 Structur...

Page 5: ...M4x11 screws and two M4 wing nuts 3 Device Installation 3 1 Device Wiring 1 Cable layout description Before installing the digital detection module plan the layout of the power cable For the diameter...

Page 6: ...ws the wiring between the digital detection module and different devices For the wiring terminal of each device see the operation manual of the device or consult manufacturers Digital detection module...

Page 7: ...of the face recognition access control terminal face recognition terminal 1 Wall mount The figure below shows the process of installing the digital detection module on a wall when the module is to be...

Page 8: ...digital temperature measurement module on a standing pole when the module is to be used in combination with a face recognition terminal 1 Remove the black panel 2 Remove the four screws on the back an...

Page 9: ...uration When the digital detection module is used in combination with a face recognition access control terminal you can enable the temperature measurement function on the Authentication Scene interfa...

Page 10: ...oose Setup Intelligent Advanced Setting to enable the temperature measurement function 3 Device operations When the temperature needs to be measured a personneeds to getclose to occupy the human shape...

Page 11: ...from an outdoor low temperature environment to the measurement area the person needs to stay in this area for 5 min before the temperature is taken What should I do if the tempe rature measured by the...

Page 12: ...n any form by any means without prior consent in writing from our company referred toas us hereafter The product described in this manual may contain proprietary software owned by our company and its...

Page 13: ...lar purpose and noninfringement Users must assume total responsibility and all risks for connecting the product to the Internet including but not limited to network attack hacking and virus We strongl...

Page 14: ...id using the username and password of your social media bank email account etc as the username and password of your device in case your social media bank and email account information is leaked Restri...

Page 15: ...icalsafety regulations Use a UL certified power supply that meets LPS requirements if an adapter isused Use the recommended cordset power cord in accordance with the specified ratings Only use the pow...

Page 16: ...to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates...

Page 17: ...802 Greenview Dr Grand Prairie TX 75050 USA Toll Free 1 866 708 5401 Fax 1 972 999 4113 sales 2MTechnology net...

Reviews: