background image

ii 

PURPOSE,  AND  NON-INFRINGEMENT  OF  THIRD  PARTY.  IN  NO  EVENT  WILL 

HIKVISION,  ITS  DIRECTORS,  OFFICERS,  EMPLOYEES,  OR  AGENTS  BE  LIABLE 

TO  YOU  FOR  ANY  SPECIAL,  CONSEQUENTIAL,  INCIDENTAL,  OR  INDIRECT 

DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS 

PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, 

IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS 

BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 

REGARDING  TO  THE  PRODUCT  WITH  INTERNET  ACCESS,  THE  USE  OF 

PRODUCT  SHALL  BE  WHOLLY  AT  YOUR  OWN  RISKS.  HIKVISION  SHALL  NOT 

TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE 

OR  OTHER  DAMAGES  RESULTING  FROM  CYBER  ATTACK,  HACKER  ATTACK, 

VIRUS  INSPECTION,  OR  OTHER  INTERNET  SECURITY  RISKS;  HOWEVER, 

HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.   

SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT 

LAWS  IN  YOUR  JURISDICTION  BEFORE  USING  THIS  PRODUCT  IN  ORDER  TO 

ENSURE  THAT  YOUR  USE  CONFORMS  THE  APPLICABLE  LAW.  HIKVISION 

SHALL  NOT  BE  LIABLE  IN  THE  EVENT  THAT  THIS  PRODUCT  IS  USED  WITH 

ILLEGITIMATE PURPOSES.   

IN  THE  EVENT  OF  ANY  CONFLICTS  BETWEEN  THIS  MANUAL  AND  THE 

APPLICABLE LAW, THE LATER PREVAILS. 

 

 

0101011060229 

Summary of Contents for DS-K1106C

Page 1: ...DS K1106 Series Card Reader User Manual UD 6L0206D1175A01...

Page 2: ...using and managing the product Pictures charts images and all other information hereinafter are for description and explanation only The information contained in the Manual is subject to change witho...

Page 3: ...RODUCT SHALL BE WHOLLY AT YOUR OWN RISKS HIKVISION SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK HACKER ATTACK VIRUS INSPECTION...

Page 4: ...PTER 2 INTRODUCTION 3 2 1 FRONT VIEW 3 2 2 REAR VIEW 4 CHAPTER 3 INSTALLATION 4 3 1 INSTALLING PSAM CARD 4 3 2 INTRODUCTION FOR DIP SWITCH 5 3 3 DEFINITION OF CABLE 6 3 4 WIRING CABLES 7 3 5 INSTALLIN...

Page 5: ...range 10 10 DC power supply which is nonswitched and linear To guarantee the communication between the controller and the card reader you must use RVVP cable above 0 5 to connect them If the card rea...

Page 6: ...unicates with access controller via either RS 485 protocol or Wiegand protocol And a build in tamper proof module helps to protect card reader from malicious damage As to the physical appearance the P...

Page 7: ...available for CPU card reader 2 DIP Switch 3 Cable Interface of RS 485 Power LED Control etc 4 Serial Port Chapter 3 Installation 3 1 Installing PSAM Card PSAM card slot is only available for CPU card...

Page 8: ...of DIP switch from left to right is 1 8 Figure 3 2 DIP Switch Module Table 3 1 Description of DIP Switch Icon Description Represent 1 in binary mode Represent 0 in binary mode For example binary valu...

Page 9: ...f 34 bit 8 Matched Resistance available for RS 485 protocol 1 Enable 0 Disable 3 3 Definition of Cable The description of 10 cables is shown below Table 3 3 Description of Cable Color Description Yell...

Page 10: ...s to establish the communication between them Steps for RS 485 communication mode 1 Set the DIP switch of No 6 as 0 2 Set the DIP switch of No 1 5 for RS 485 address and reading card mode For details...

Page 11: ...Communication Mode Steps for Wiegand communication mode 1 Set the DIP switch of No 6 as 1 2 Set the DIP switch of No 5 and 7 for reading card mode and Wiegand protocol For details please refer to 3 2...

Page 12: ...ader Black Red Green White Purple Orange Brown der Card Reader Green Figure 3 5 Wiring for Wiegand Communication Mode 3 5 Installing Card Reader Before you start Set the DIP switch For details refer t...

Page 13: ...ten the screw to keep the components together 5 Fix the side cover onto the card reader press the cover to make it tightly fit the reader Chapter 4 Sound Prompt and Indicator After the card reader is...

Page 14: ...e slow beeps The operation of pressing keys or swiping card is invalid Rapidly continuous beeps Alarm of tamper proof Slowly continuous beeps The card reader is unencrypted Table 4 2 Description of LE...

Page 15: ...12...

Reviews: