background image

12 

Digital Detection Module - Quick Guide 

 

www.2MTechnology.net 

 

Users must assume total responsibility and all risks for connecting the product to the Internet, 
including, but not limited to, network attack, hacking, and virus. We strongly recommends 
that users take all necessary measures to enhance the protection of network, device, data 
and personal information. Our company disclaims any liability related thereto but will readily 
provide necessary security related support. 

 

To  the  extent  not  prohibited  by  applicable  law,  in  no  event  will  our  company  and  its 
employees, licensors, subsidiary, affiliates be liable for results arising out of using or inability 
to  use  the  product  or  service,  including,  not  limited  to,  loss  of  profits  and  any  other 
commercial damages or losses, loss of data, procurement of substitute goods or services; 
property damage, personal injury, business interruption, loss of business information, or any 
special,  direct,  indirect,  incidental,  consequential,  pecuniary,  coverage,  exemplary, 
subsidiary losses, however caused and on any theory of liability, whether in contract, strict 
liability or tort (including negligence or otherwise) in any way out of the use of the product, 
even if our company  has been advised of the possibility of such damages (other than as may 
be  required  by  applicable  law  in  cases  involving  personal  injury,  incidental  or  subsidiary 
damage). 

 

To the  extent  allowed  by  applicable  law, in  no  event  shall  our  total  liability  to  you  for all 
damages  for  the  product  described  in  this  manual  (other  than  as  may  be  required  by 
applicable law in cases involving personal injury) exceed the amount of money that you have 
paid for the product. 

 Network Security 

 

Please take all necessary measures to enhance network security for your device. 

The following are necessary measures for the network security of your device: 

 

Change  default  password  and  set  strong  password

:  You  are  strongly  recommended  to 

change the default password after your first login and set a strong password of at least nine 
characters including all three elements: digits, letters and special characters. 

 

Keep firmware up to date

: It is recommended that your device is always upgraded to the 

latest version for the latest functions and better security. Visit our official website or contact 
your local dealer for the latest firmware. 

The following are recommendations for enhancing network security of your device: 

 

Change password regularly

: Change your device password on a regular basis and keep the 

password safe. Make sure only the authorized user can log in to the device. 

 

Enable HTTPS/SSL

: Use SSL certificate to encrypt HTTP communications and ensure data 

security. 

 

Enable IP address filtering

: Allow access only from the specified IP addresses. 

 

Minimum port mapping

: Configure your router or firewall to open a minimum set of ports 

to the WAN and keep only the necessary port mappings. Never set the device as the DMZ 
host or configure a full cone NAT. 

 

Disable the automatic login and save password features

: If multiple users have access to 

your computer, it is recommended that you disable these features to prevent unauthorized 
access. 

 

Choose username and password discretely

: Avoid using the username and password of your 

social media, bank, email account, etc, as the username and password of your device, in case 
your social media, bank and email account information is leaked. 

Summary of Contents for 2MTHWT-HMD-II

Page 1: ...DIGITAL DETECTION MODULE Quick Guide Version 1 01 REV06122020 ...

Page 2: ...onnect to a face recognition access control terminal through the RS485 interface The module supports temperature measurement and personnel information binding It is capable of rapidly identifying personnel information taking the temperature and generating an alarm for people with abnormal temperature In addition it allows setting a temperature threshold so as to strictly control the access permiss...

Page 3: ...ded environment the operational environment should be with less dust to avoid the pollution of blackbody target Pollution degree 2 If the equipment is used in a manner not specified by the manufacturer the protection provided by the equipment may be impaired 2 Appearance and size The actual device appearance shall prevail The figure below shows the device size 3 Structure and cable ice The actual ...

Page 4: ...2V 2A and the lower limit of the operating voltage is DC 9V 12V 25 Wire Diameter mm 0 8mm 20 AWG 1mm 18 AWG 1 25mm 16 AWG 1 63mm 14 AWG Transmission Distance m 18 37 58 99 2 Wiring description The figure below shows the wiring between the digital detection module and different devices For the wiring terminal of each device see the operation manual of the device or consult manufacturers Digital det...

Page 5: ...nd a face recognition access control terminal face recognition terminal by referring to section Device Wiring and sections related to the wiring in the quick guide of the face recognition access control terminal face recognitionterminal 1 Wall mount The figure below shows the process of installing the digital detection module on a wall when the module is to be used in combination with a face recog...

Page 6: ...ation mode requires the 2WTK SZWB bracket which needs to be purchased separately 2 Standing pole mount The figure below shows the process of installing the digital detection module on a standing pole when the module is to be used in combination with a face recognition access control terminal face recognition terminal 3 Fix the temperature measurement module ...

Page 7: ...ice configuration Local configuration When the digital detection module is used in combination with a face recognition access control terminal you can enable the temperature measurement function on the Authentication Scene interface of the face recognition access control terminal Tap and hold the GUI for more than 3s Enter the correct activation password to go to the Activation Config interface Te...

Page 8: ...n to the Web interface of the terminal and choose Setup Intelligent Advanced Setting to enable the temperature measurement function 3 Device operations When the temperature needs to be measured aim the wrist at the temperature measurement point at a distance of 0 39 1 inch Normal temperature Abnormal temperature ...

Page 9: ... installed on a standing pole For details see Standing pole mount 2 This label is applicable when the temperature measurement module is mounted on the wall and the temperature measurement point is downward For details see installation mode 1 in Wall mount 3 This label is applicable when the temperature measurement module is mounted on the wall and the temperature measurement point is outward For d...

Page 10: ...om an outdoor low temperature environment to the measurement area the person needs to stay in this area for 5min before the temperature is taken What should I do if the temperature measured by the device is inaccurate 1 The device requires preheating after power on It enters the optimal temperature measurement state 15minutes later 2 Check whether the wrist is aimed at thetemperature measurement p...

Page 11: ...re for example getting out of a hotcar doing strenuous exercise or carrying hot drinks and hot food If yes the person needs to stay in the measurement area calmly and have the temperature taken 5 minutes later 2 Check whether the device is used in an overheated environment If yes deploy the device in an indoor windless environment with the temperature of 10 Cto 45 C 3 Use a medical grade temperatu...

Page 12: ... different from the actual appearances functions features etc of the product This manual is intended for multiple software versions and the illustrations and descriptions in this manual may be different from the actual GUI and functions of thesoftware Despite our best efforts technical or typographical errors may exist in this manual Our company cannot be held responsible for any such errors and r...

Page 13: ...ng personal injury exceed the amount of money that you have paid for the product Network Security Please take all necessary measures to enhance network security for your device The following are necessary measures for the network security of your device Change default password and set strong password You are strongly recommended to change the default password after your first login and set a stron...

Page 14: ...ll applicable requirements are met to avoid danger and loss of property Storage Transportation and Use Store or use the device in a proper environment that meets environmental requirements including and not limited to temperature humidity dust corrosive gases electromagnetic radiation etc Make sure the device is securely installed or placed on a flat surface to prevent falling Unless otherwise spe...

Page 15: ...de gaz inflammables Remplacer la batterie par un type incorrect Disposer d une batterie dans le feu ou un four chaud écraser mécaniquement ou couper la batterie Disposer la batterie utilisée conformément à vos règlements locaux ou aux instructions du fabricant de la batterie Regulatory Compliance FCC Statements This device complies with Part 15 of the FCC Rules Operation is subject to the followin...

Page 16: ...ective 2012 19 EU The product this manual refers to is covered by the Waste Electrical Electronic Equipment WEEE Directive and must be disposed of in a responsible manner Battery Directive 2013 56 EC Battery in the product complies with the European Battery Directive 2013 56 EC For proper recycling return the battery to your supplier or to a designated collection point ...

Page 17: ...802 Greenview Dr Grand Prairie TX 75050 USA Toll Free 1 866 708 5401 Fax 1 972 999 4113 sales 2MTechnology net ...

Reviews: