background image

20   

 

ProBio & ProFAC User Manual

 

 

        

        

 

 

Press [Wiegand Input] to enter 

Wiegand Input

 interface. 

Wiegand Format: 

User can choose among the following built-in Wiegand formats: Wiegand 26, 

Wiegand 26a, Wiegand 34, Wiegand 34a, Wiegand 36, Wiegand 36a, Wiegand 37, Wiegand 37a and 
Wiegand 50.   

Pulse Width (us): 

The width of pulse sent by Wiegand card reader. The default value is 100 

microseconds, which can be adjusted within the range of 20 to 100 microseconds. 

Pulse Interval (us): 

The default value is 1000 microseconds, which can be adjusted within the range of 

200 to 20000 microseconds. 

ID Type:

 

Input content included in Wiegand input signal. 

User ID

 or 

Badge Number

 can be chosen.

 

Definitions of Wiegand Formats: 

Wiegand Format 

Definition 

Wiegand26 

ECCCCCCCCCCCCCCCCCCCCCCCCO 
Consists of 26 bits of binary code. The 1

st

 bit is the even parity bit of the 

2

nd

 to 13

th

 bits, while the 26

th

 bit is the odd parity bit of the 14

th

 to 25

th

 

bits. The 2

nd

 to 25

th

 bits are the card number. 

Wiegand26a 

ESSSSSSSSCCCCCCCCCCCCCCCCO 
Consists of 26 bits of binary code. The 1

st

 bit is the even parity bit of the 

2

nd

 to 13

th

 bits, while the 26

th

 bit is the odd parity bit of the 14

th

 to 25

th

 

bits. The 2

nd

 to 9

th

 bits are the site code, while the 10

th

 to 25

th

 bits are the 

card number.

 

Wiegand34 

ECCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO 
Consists of 34 bits of binary code. The 1

st

 bit is the even parity bit of the 

2

nd

 to 17

th

 bits, while the 34

th

 bit is the odd parity bit of the 18

th

 to 33

rd

 

bits. The 2

nd

 to 25

th

 bits are the card number. 

Wiegand34a 

ESSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCO 
Consists of 34 bits of binary code. The 1

st

 bit is the even parity bit of the 

2

nd

 to 17

th

 bits, while the 34

th

 bit is the odd parity bit of the 18

th

 to 33

rd

 

bits. The 2

nd

 to 9

th

 bits are the site code, while the 10

th

 to 25

th

 bits are the 

card number. 

Wiegand36 

OFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCMME 
Consists of 36 bits of binary code. The 1

st

 bit is the odd parity bit of the 

Summary of Contents for Green Label ProBio

Page 1: ...Contents 1 USER MANUAL ProBio ProFAC Version 1 2 Date June 2016...

Page 2: ......

Page 3: ...nterfaces and menu functions of the facial Access Control terminal The pictures in this manual may not be exactly consistent with those of your product the actual product s display shall prevail Not a...

Page 4: ......

Page 5: ...e Settings 9 4 User Management 10 4 1 Adding a User 10 4 2 Setting Access Control 11 4 3 Searching User 11 4 4 Editing a User 12 4 5 Deleting a User 13 4 6 User Display Style 14 5 User Role 15 5 1 Ena...

Page 6: ...4 Combined Verification Settings 40 10 5 Anti passback Settings 43 11 USB Manager 44 11 1 USB Download 44 11 2 USB Upload 44 12 Records Search 46 12 1 Searching Access Records 46 12 2 Searching Attend...

Page 7: ...ngerprint 2 Wrong ways to press the fingerprint 10 Lux Larger than 1200 Lux 50 800 Lux Direct sunlight Outdoor Exposure to close range lamp light Indoor Direct sunlight through the window Indoor Obliq...

Page 8: ...For user heights between 1 5m to 1 8m it is recommended to install the device at 1 15m above ground may be modified according to user average height Slanted Too Low Please use the correct method of p...

Page 9: ...reen b During verification it is required to show your face in the center of the screen and fit your face into the green frame in the screen 1 4 Verification Modes 1 4 1 1 N Fingerprint Verification I...

Page 10: ...hen difficulty is encountered in 1 N fingerprint verification Press to Input the user ID and press fingerprint Successfully verified Failed to verify NOTES When the device displays please press your f...

Page 11: ...aptured by the camera is compared with all facial data in the device Conduct comparison in the correct way on the main interface Successfully verified 1 4 5 1 1 Face Verification Attendance In this me...

Page 12: ...ction is optional only products with a built in card module are equipped with card verification function Please contact our technical support as required 1 Swipe the card above the card reader the car...

Page 13: ...auxiliary input condition is triggered 6 Time The current time of the device is displayed The 12 hour and 24 hour are supported Users may customize the style of the main interface For details refer 8...

Page 14: ...tings Personalize This includes interface display voice and bell settings Data Mgt To delete data including access records admin role screen savers and so on to backup and restore data delete access r...

Page 15: ...e time 24 hour clock 12 hour clock date format and daylight saving time When resetting to factory settings the date format can be restored YYYY MM DD NOTE When resetting to factory settings the device...

Page 16: ...g access control role Add a Super Admin Choose Super Admin in User Role who is allowed to operate all the functions on the menu As shown below the user with User ID 1 is a super admin Add a Normal Use...

Page 17: ...r ranges from 1 to 99 Time Period Select time rules for the user Time rules are set under the Access Control menu and a maximum of 50 time rules are supported The effective door opening time period of...

Page 18: ...s the search interfaces of an user with user ID 1 4 4 Editing a User After a user is chosen through 4 3 Searching User press and Edit to enter user editing interface Or in the initial interface press...

Page 19: ...er user deleting interface Or in the initial interface press User Mgt All Users Search a user Delete to enter user deleting interface Select user information to be deleted or delete the whole user NOT...

Page 20: ...User Manual 4 6 User Display Style In the initial interface press User Mgt Display Style to enter Display Style setting interface Several Display Styles are shown as below Single Line Style Multiple...

Page 21: ...ferent permission levels in user management 5 1 Enabling User Role In the initial interface press User Role User Defined Role 1 2 3 Enable Defined Role to enable defined role After enabling the define...

Page 22: ...according to the actual network situation IP Address 192 168 1 201 Subnet Mask 255 255 255 0 Gateway 0 0 0 0 DNS 0 0 0 0 TCP COMM Port 4370 DHCP Dynamic Host Configuration Protocol which is to dynamic...

Page 23: ...ed as the function of master unit the device will act as master unit and it can be connected to RS485 fingerprint reader 6 3 PC Connection Comm key Settings To improve security of data Comm Key for co...

Page 24: ...D Settings If the communication method is RS232 RS485 inputting this device ID in the software communication interface is required In the initial interface press Comm PC Connection Device ID to enter...

Page 25: ...s off enter the IP address format in XXX Server Address IP address of the ADMS server Server Port Port used by the ADMS server Enable Proxy Server Method of enabling proxy To enable proxy please set t...

Page 26: ...e 26th bit is the odd parity bit of the 14th to 25th bits The 2nd to 25th bits are the card number Wiegand26a ESSSSSSSSCCCCCCCCCCCCCCCCO Consists of 26 bits of binary code The 1st bit is the even pari...

Page 27: ...e The 1st bit is the even parity bit of the 2nd to 18th bits while the 37th bit is the odd parity bit of the 19th to 35th bits The 2nd to 4th bits are the manufacturer code 5th to 14th bits are the de...

Page 28: ...If the 26 bit Wiegand26 34 bit Wiegand34a 36 bit Wiegand36 37 bit Wiegand37a and 50 bit Wiegand50 are chosen in Wiegand Format but 36 bits is selected in Wiegand output bits then the actual Wiegand f...

Page 29: ...ally detected Wiegand formats and the analyzed card numbers 2 Choose the item corresponding to the actual card number as the device s Wiegand format which is the Wiegand format for reading that type o...

Page 30: ...to disable it Access Logs Warning When the residual access record capacity is smaller than the preset value the device automatically generates a message indicating residual record capacity You can se...

Page 31: ...To set whether to detect the false face Enable Detect False Face the device will detect the false face during registration and verification so that it cannot be registered or verified successfully Qu...

Page 32: ...igh to raise the sensibility when the environment is humid making it hard to identify the fingerprint you can set the level to Low Live Detection To set whether to detect the false fingerprint Enable...

Page 33: ...r available time period 1 NO Time Period None Use as master In Aux output Lock open time 255 seconds Aux output type setting trigger door open Speaker Alarm OFF Anti passback Direction No anti passbac...

Page 34: ...Upgrade Insert the U disk with upgrade file into the device s USB port and in the initial interface press System USB Upgrade to complete firmware upgrade operation If upgrade file is needed please con...

Page 35: ...ng this function is not recommended due to great power used and insecurity Idle Time to Slide Show s When there is no operation in the initial interface and the time exceeds the set value a slide show...

Page 36: ...icating that touch prompt is disabled Volume Set the prompt volume of device The default value is 70 Press key to increase the volume press key to decrease the volume 8 3 Bell Settings Many companies...

Page 37: ...nging length The value ranges from 1 to 999 seconds 8 3 2 Editing a Bell In the initial interface press Personalize Bell Schedules All Bell Schedules choose a bell Edit to enter the bell editing inter...

Page 38: ...photos will be be saved in the device after successful verification 2 In the initial interface press System Access Logs Setting Camera Mode to select it as Take photo and save or Save on successful v...

Page 39: ...lpaper to enter Delete Wallpaper interface 2 Press to switch displayed wallpaper and Delete Selected Picture to delete the selected picture or press Delete All Pictures to delete all pictures Delete S...

Page 40: ...Notes Input backup notes Backup completely 9 3 Data Restoration To restore the data in the device or U disk to the device In the initial interface press Data Mgt Restore Data Restore from USB Disk to...

Page 41: ...lock the door In default settings new users are allocated into the first access group with the default group time rule 1 and access combo as 1 and set in unlocking state 10 1 Access Control Settings I...

Page 42: ...door for users NO Time Period To set time period for Normally Open so that the door is always unlocked during this period Use as master While configuring the master and slave devices you may set the...

Page 43: ...nsor Type Normal Open NO Verification Mode Password Fingerprint Badge Face Door Available Time Period 1 NO Time Period None Aux output Lock open time 255 s Aux output type setting Trigger door open Sp...

Page 44: ...e located automatically select a time schedule such as Monday Select Time Period 1 2 3 Set Start Time and End Time as required NOTES 1 When the end time is earlier than the start time for example 23 5...

Page 45: ...Control Holidays to enter Holidays setting interface 10 3 1 Adding a Holiday Press Add Holiday Press Date Set date The holiday parameters are set as follows No The device automatically assigns a numb...

Page 46: ...access control on January 1 is conducted according to the time period settings of holiday type 1 rather than the time period settings of Friday 10 3 2 All Holidays Press All Holidays Select a holiday...

Page 47: ...n the initial interface press Access Control Combined Verification to enter the Combined Verification setting interface For Example As the above figure Combined Verification 1 is made up of five membe...

Page 48: ...erification 4 is made up of three members coming from three different groups Access Group 3 5 8 respectively Deleting a Combined Verification To delete a Combined Verification set all access group num...

Page 49: ...the Anti passback Setup interface Select Anti passback Direction No Anti passback Anti Passback function is disabled which means passing verification of either master device or slave device can unloc...

Page 50: ...ss USB Manager Download to enter the USB Download interface Download Access Records To download access records in specified time period into USB disk User Data To download all user information and fin...

Page 51: ...raits please refer to 16 3 Image Uploading Rule Screen Saver To upload screen savers from USB disk into the device You can choose Upload Selected Picture or Upload All Pictures The images will be disp...

Page 52: ...ion enables users to check access records attendance photo and blacklisted photo 12 1 Searching Access Records Press and select Attendance Search Press Access Records Input user ID query all data with...

Page 53: ...ance photo Input user ID query all data without input Select time range to be searched The corresponding attendance photos will then be shown 12 3 Searching Blacklist ATT Photo Press Blacklist ATT pho...

Page 54: ...ice The device automatically tests whether the voice files stored in the device are complete and the voice quality is good Test Fingerprint Sensor To test the fingerprint sensor by pressing fingerprin...

Page 55: ...fingerprints face badges records attendance photos blacklist photos and user photos Device Info To display the device name serial number MAC address fingerprint algorithm face algorithm platform infor...

Page 56: ...verification Contact Administrator to check if the user has the privilege to gain access within that time Schedule Verification succeeds but the user cannot open door Check whether the lock wiring is...

Page 57: ...should be named as 154 jpg 3 Insert the USB disk into the USB port of the device and enter USB Manager Upload User Portrait to upload users photos The photo will then be shown after user verification...

Page 58: ...signals are high level greater than Voh until the card reader is ready to send a data stream The card reader send out asynchronous low level pulse less than vol transmitting data stream via Data1 or D...

Page 59: ...utput content is set to card number the Wiegand output of the system is as follows after the user passes the verification 1 1 1 0 0 1 1 0 0 0 0 1 0 0 0 1 1 1 1 0 1 0 0 0 0 0 Even parity check bit User...

Page 60: ...example A user with the user ID of 123456789 has the card number of 0013378512 and the failure ID is set to 1 1 When the output content is set to user ID the Wiegand output of the system is as follows...

Page 61: ...put advertising images into the file The capacity is 20 images with each of them not exceeding 30k Image name and format are not restricted 3 Wallpaper It is required to create a file named as wallpa...

Page 62: ...device supports the Wiegand In function and the slave device supports the Wiegand Out function After the Wigand output port of the slave device is connected to the Wiegand input port of the master dev...

Page 63: ...the user to check in out freely That is the check in record must match the check out record Operation description 1 Model selection Master device devices supporting the Wiegand In function except the...

Page 64: ...58 ProBio ProFAC User Manual Master device Slave device IWD0 WD0 IWD1 WD1 GND GND...

Page 65: ...gerprint products for police use or development tools support the collection of the original fingerprint images As for whether such a type of fingerprint collection constitutes an infringement of your...

Page 66: ...ts Name Toxic and Hazardous Substances or Elements Pb Hg Cd Cr6 PBB PBDE Chip resistor Chip capacitor Chip inductor Chip diode ESD components Buzzer Adapter Screws Indicates that this toxic or hazardo...

Page 67: ...tered trademark of ZKTeco or a related company All other product and company names mentioned are used for ZK Building Wuhe Road Gangtou Bantian Buji Town Longgang District Shenzhen China 518129 Tel 86...

Reviews: