background image

PROFESSIONAL FIRMWARE VERSION 

 

2013

 

 

22

 

 

 

4.3 Pen drive Management  

 
 
 
 
 
 
 
 
 
 
 

 

 

4.3.1. Download 

 

Download user data  

Save all users’ information and fingerprint in the device to U disk.  

 

Download SMS 

Save SMS added to the device to U disk.  

 

Download user photo 

Save employee’s photo into U disk.  

 

4.3.2. Upload 

 

Upload user data  

Upload user information and fingerprint saved in U disk to device.  

 

Upload SMS 

Upload SMS in U disk to the device.  
 

 

Upload user defined picture 

 

Upload JPG picture started with “ad_” in U disk to the device. Then these pictures 
will be displayed on the initializing interface  
 

 

Upload user photo 

 

Upload JPG picture named with User ID in U disk to device. Then the employee’s photo will 
be displayed upon fingerprint verification. 

Summary of Contents for iClock 560

Page 1: ...uputstva http www clarionllc net cms index php kp erv uredjaji Professional Firmware Manual ver 1 0 Odnosi se na modele iClock 880 iClock 580 iClock 700 iClock S680 iClock S900 iClock S500 iClock 360...

Page 2: ...arance 5 2 3 Using the Fingerprint Terminal 5 2 4 Date Time Adjustment 6 2 5 Enroll Administrator User 6 2 6 Password Enrolment 7 2 7 RFID Card Enrolment 7 2 7 1 ID Technology 7 2 7 2 MF Technology On...

Page 3: ...ed options 18 3 7 System info 18 3 7 1 Record capacity 19 3 7 2 Device information 19 Terminal settings 20 4 1 Keypad 20 21 4 2 Barcode settings 21 4 3 Pen drive Management 22 4 3 1 Download 22 4 3 2...

Page 4: ...ng out of the degradation in verification performance due to improper user operations We shall reserve the right of final interpretation and revision of this document 1 2 Instruction for Card Swipe Th...

Page 5: ...ice damage arising out of live line working falls beyond the scope of our normal warranty For matters that are not covered in this document please refer to related materials including the installation...

Page 6: ...nt Terminal This chapter will guide on how to use the fingerprint terminal effectively To get a good reading every time initial fingerprint enrollment must be done properly The fingerprint terminal pr...

Page 7: ...he correct date and time Follow the steps shown to access the Date Time adjustment menu You can insert inputs into the terminals through the keypad It contains numbers from 0 9 an OK button an ESC Can...

Page 8: ...another kind of verification he can choose to use passwords Password may contain numbers ranging from 1 8 digits 2 7 RFID Card Enrolment 2 7 1 ID Technology If a user cannot enroll his fingerprint he...

Page 9: ...will be defined here MF cards are special and we can read and write data so we can set the cards as PIN Card or store the templates in the MF Card which is very useful to ensure data protection laws i...

Page 10: ...ess combined alarm and antipassback Time zones We ll define the time zones we want to assign to the users to give them access privileges for opening the door or denied the access Holidays It s the men...

Page 11: ...tions When the device and PC are used to transmit data it is necessary to use communication wire to set communication parameters in the device When the device is in communication communicating appears...

Page 12: ...mask It is 255 255 255 0 by default You can modify it if it is necessary Gateway address It is 0 0 0 0 by default If the device and PC are in different net segment it is necessary to set address Net...

Page 13: ...password is 0 by default Namely there is no password it can be set as other value After setting the password must be input if software is to communicate with device Or the connection will fail The pas...

Page 14: ...e output does not contain the information If there is site code the output is the set site code similar to device ID But this code is specified by the user and different devices can be repeated with r...

Page 15: ...rk model there are two models infrastructure model for star structure and ad hoc model for peer to peer network Authentication mode Infrastructure mode includes five authentication modes OPEN SHARED W...

Page 16: ...ether the user has permission to use this network Access Number The access number of GPRS CDMA business Redial interval The interval of automatic redial after the network is disconnected Redial times...

Page 17: ...dle Middle 35 35 Low High 25 45 Finger sensitivity control the reaction of the sensor with an external light the light can affect always to optical sensor with this parameter we can make lower this ef...

Page 18: ...ant to show the FP image when we are enrolling a finger or matching on the device Date Format YY MM DD YY MM DD YY MM DD MM DD YY MM DD YY MM DD YY DD MM YY DD MM YY DD MM YY and YYYYMMDD Select your...

Page 19: ...t during operation Lock Power To prevent hostile power off select whether to lock power off or not Disable the power is off 3 seconds after pressing power off Enable it is ineffective after pressing p...

Page 20: ...and password enrollment and the capacity of fingerprint the enrolled fingerprint attendance record and the current saved attendance record in the form of diagram as shown below 3 7 2 Device informatio...

Page 21: ...minal giving total flexibility as we will explain in the next point This menu has two sections we will detail below Functions keys settings From this menu you can define what function we want for each...

Page 22: ...h the function keys at will allowing all sorts of combinations to make it easier the use of the terminal for the end user We also have the ability to define the code you want to appear ATT and if a ke...

Page 23: ...nto U disk 4 3 2 Upload Upload user data Upload user information and fingerprint saved in U disk to device Upload SMS Upload SMS in U disk to the device Upload user defined picture Upload JPG picture...

Page 24: ...inal to another Within downloading records we can define a lot of parameters that will help us achieve further attendance reports in the way you want Definable parameters for downloading records File...

Page 25: ...top automatically when it is the end time If it s an external siren using the relay s device we have the connections to wire an external ring bell and the device will send the signal trough the relay...

Page 26: ...are able to make multiple modifications for many users at the same time 4 5 Reset Make device s communication option system option and so on reset to the state of factory Factory reset Make all the p...

Page 27: ...ct through playing voice files in the device to see if the files are complete and the voice effect are good or not Keyboard test The device can automatically test various keyboards to see if the keys...

Page 28: ...nvenience query record function is provided Data query Query attendance According to user s input query condition the records will be displayed on the screen for user selected Only shows log related w...

Reviews: