background image

 

Error! Use the Home tab to apply 

标题

  1 to the text that you want to appear here.

   

1 Guidance Notes 

1.1 Method of Pressing Fingerprint 

It is recommended to use the 

index finger, middle finger 

or 

ring finger

; avoid using the thumb or 

little finger. 

 

1. Correct way to press the fingerprint: 

  

 

 

 

2. Wrong ways to press the fingerprint: 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Press the finger horizontally onto the fingerprint sensor; the center 

of the fingerprint should be placed on that of the sensor. 

Vertical 

 

Sides

 

 

Slanted

 

Too Low

 

 

 

Please use the correct method of pressing fingerprint for registration and 

verification. Our company does not undertake the responsibility for the lowered 

verification performance caused by user’s improper operation. The rights to final 

interpretation and amendment are reserved. 

Summary of Contents for ProCapture-T

Page 1: ...Contents 1 USER MANUAL ProCapture T ProRF T Version 1 1 Date June 2016...

Page 2: ......

Page 3: ...aces and menu functions of ProCapture T ProRF T Access Control terminal The pictures in this manual may not be exactly consistent with those of your product the actual product s display shall prevail...

Page 4: ......

Page 5: ...terface 4 2 Main Menu 5 3 Date Time Settings 6 3 1 Daylight Saving Time 6 4 User Management 8 4 1 Adding User 8 4 2 Setting Access Control 9 4 3 Searching User 9 4 4 Editing User 10 4 5 Deleting a Use...

Page 6: ...e Settings 27 8 3 Bell Settings 27 8 3 1 Adding New Bell 27 8 3 2 Editing a Bell 28 8 3 3 Deleting a Bell 28 9 Data Mgt 29 9 1 Deleting Data 29 9 2 Data Backup 30 9 3 Data Restoration 31 10 Access Con...

Page 7: ...System Information 47 15 Troubleshooting 48 16 Appendices 49 16 1 Photo ID Function 49 16 2 Wiegand Introduction 50 16 2 1 Wiegand 26 Introduction 51 16 2 2 Wiegand 34 Introduction 52 16 3 Image Uplo...

Page 8: ......

Page 9: ...nt 2 Wrong ways to press the fingerprint Press the finger horizontally onto the fingerprint sensor the center of the fingerprint should be placed on that of the sensor Vertical Sides Slanted Too Low P...

Page 10: ...he same time figure 1 will be displayed on screen after successful verification Disable the Display User Photo option figure 2 will be displayed after successful verification 2 In the initial interfac...

Page 11: ...evice displays please press your finger again press your finger again onto the fingerprint sensor If verification still fails after 2 attempts it will exit to the initial interface 1 2 3 Password Veri...

Page 12: ...card verification function Please contact our technical support as required 1 Swipe the card above the card reader the card must be registered first 2 Verification succeeds 3 Verification fails 1 3 I...

Page 13: ...the system and upgrade firmware including setting date time access logs fingerprint parameters and resetting to factory settings Personalize This includes interface display voice and bell settings Dat...

Page 14: ...ight Saving Time DST which is also called Daylight Saving Time is a system adjusting local time in order to save energy The time adopted during the set dates is called DST Usually the time will be one...

Page 15: ...s 1 If the month when DST starts is later than that when DST ends DST spans two different years For example the DST start time is 2014 9 1 4 00 and the DST end time is 2015 4 1 4 00 2 Assume that the...

Page 16: ...Photo ID function display this optional and setting Access Control Role Add a Super Admin Choose Super Admin in User Role who is allowed to operate all the functions on the menu As shown below the use...

Page 17: ...ho can be reallocated to other groups A valid group number ranges from 1 to 99 Time Period Select time rules for the user Time rules are set under the Access Control menu and a maximum of 50 time rule...

Page 18: ...ing User After a user is chosen through 4 3 Searching User press and select Edit to enter user editing interface Or in the initial interface press User Mgt All User Search a user Press Edit to enter u...

Page 19: ...delete the whole user Note 1 Only when the user has registered fingerprint password badge and user photo will the corresponding to be deleted item be shown 2 Photo ID function and card function are o...

Page 20: ...ls in user management 5 1 Enabling User Role In the initial interface press User Role User Defined Role 1 2 3 Enable Defined Role Press to enable defined role After enable defined roles you can check...

Page 21: ...Error Use the Home tab to apply 1 to the text that you want to appear here 13 each menu for User Defined Role 1 2 3 After selection press back to User Defined Role 1 2 3 editing interface...

Page 22: ...ccording to the actual network situation IP Address 192 168 1 201 Subnet Mask 255 255 255 0 Gateway 0 0 0 0 DNS 0 0 0 0 TCP COMM Port 4370 DHCP Dynamic Host Configuration Protocol which is to dynamica...

Page 23: ...the device will act as master unit and it can be connected to RS485 fingerprint reader 6 3 PC Connection Comm key Settings To improve security of data Comm Key for communication between the device an...

Page 24: ...er such as IP address and port settings and whether to enable proxy server etc In the initial interface press Comm ADMS to enter the ADMS server setting interface When the Webserver is connected succe...

Page 25: ...nterface Wiegand Format User can choose among the following built in Wiegand formats Wiegand 26 Wiegand 26a Wiegand 34 Wiegand 34a Wiegand 36 Wiegand 36a Wiegand 37 Wiegand 37a and Wiegand 50 Pulse Wi...

Page 26: ...e card number Wiegand34a ESSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCO Consists of 34 bits of binary code The 1st bit is the even parity bit of the 2nd to 17th bits while the 34th bit is the odd parity bit of th...

Page 27: ...are the site code and the 21st to 36th bits are the card number Wiegand50 ESSSSSSSSSSSSSSSSCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCO Consists of 50 bits of binary code The 1st bit is the even parity bit of t...

Page 28: ...led ID It is defined as the output value of failed user verification The output format depends on the Wiegand Format setting The default value ranges from 0 to 65535 Site Code It is similar to device...

Page 29: ...will show the automatically detected Wiegand formats and the analyzed card numbers 2 Choose the item corresponding to the actual card number as the device s Wiegand format which is the Wiegand format...

Page 30: ...er Photo To set user photo to be displayed when a user passes verification Turn it ON to display user photo and OFF to disable it only products possessing Photo ID function display this optional Acces...

Page 31: ...ification succeed 1 N Match Threshold Under 1 N Verification Method only when the similarity between the verifying fingerprint and all registered fingerprints is greater than this value can the verifi...

Page 32: ...system settings to factory settings In the initial interface press System Reset OK to finish the reset setting Reset parameters include Access Control Options Anti passback Setup communication settin...

Page 33: ...econds Keyboard Prompt ON Voice Prompt ON Remarks When resetting to factory settings the date and time will not be affected For example if the device date and time are set to 18 30 on January 1 2020 t...

Page 34: ...s function is not recommended due to great power used and insecurity Idle Time to Slide Show s When there is no operation in the initial interface and the time exceeds the set value a slide show will...

Page 35: ...keyboard The default value is ON indicating that keyboard prompt is enabled You may press to switch between ON and OFF The icon OFF indicating that keyboard prompt is disabled Volume Set the prompt vo...

Page 36: ...Ringtone played for bell Interval bell delay s To set the ringing length The value ranges from 1 to 999 seconds 8 3 2 Editing a Bell Press to select Bell Schedules and press to enter Press to select...

Page 37: ...y if Camera Mode is selected as Take photo and save or Save on successful verification will attendance photos be saved in the device after successful verification 2 In the initial interface press Syst...

Page 38: ...ll wallpapers in the device Operating Procedure 1 Select Delete Wallpaper and press to enter 2 Press or to switch displayed wallpaper select Delete Selected Picture and press to delete the selected pi...

Page 39: ...rt After backup press to exit Remarks The operations of Backup to Device are the same as that of Backup to USB Disk 9 3 Data Restoration To restore the data in the device or U disk to the device Resto...

Page 40: ...anual Press to select Start Restore and press to start Press to select Yes and press to confirm After restoration press to restart device Remarks The operations of Restore from Device are the same as...

Page 41: ...when there are other groups in the same access combo verification of members of those groups are also required to unlock the door In default settings new users are allocated into the first access gro...

Page 42: ...e user ID fingerprint password fingerprint badge user ID Remarks 1 means or means and 2 In a combined verification mode the corresponding verification information must be registered first For example...

Page 43: ...ters Factory Default Door Lock Delay 5 s Door Sensor Delay 10 s Door Sensor Type Normal Open NO Verification Mode Password Fingerprint Badge Door Available Time Period 1 NO Time Period None Aux output...

Page 44: ...nday and press Select Time Period 1 2 3 and press to enter time period setting interface Set Start Time and End Time as required after setting press to save and exit Prompt You can set the Start Time...

Page 45: ...the access control on holidays according to the holiday settings In the initial interface press Access Control Holidays to enter Holidays setting interface 10 3 1 Adding Holiday Select Add Holiday and...

Page 46: ...ing or not can be set to ON for them For unfixed holidays every year for example the Mother s Day is the second Sunday of May the specific dates are uncertain and Looping or not can be set to OFF for...

Page 47: ...User Mgt New User Access Control Role Access Group to set the access group number to which the added user belongs the access group number ranges from 1 to 99 In the initial interface press Access Cont...

Page 48: ...n set all access group numbers to 0 For example to delete Combined Verification 3 please see the figures below If all access group numbers in Combined Verification 3 are set to 0 it will be deleted 10...

Page 49: ...ification of either master device or slave device can unlock the door Access records are not reserved Out Anti passback After a user checks out only if the last record is a check in record can the use...

Page 50: ...oad to enter the USB Download interface Download access records To download access records in specified time period into USB disk User Data To download all user information and fingerprints from the d...

Page 51: ...when uploading user portraits for details of uploading user portraits please refer to 16 3 Image Uploading Rule Screen Saver To upload screen savers from USB disk into the device You can choose Uploa...

Page 52: ...to 12 1 Searching Access Records In the initial interface press to enter main menu press to select Attendance Search and press Select Access records and press to enter Input user ID query all data wit...

Page 53: ...oto and press Input user ID query all data without input and press to enter Select time range and press to enter The corresponding attendance photos will then be shown 12 3 Searching Blacklist ATT Pho...

Page 54: ...ce quality is good During the test press to continue to the next test while press to exit the test Test Keyboard To test all keys to see if every key functions properly Press any key in the Keyboard t...

Page 55: ...attendance photos blacklist photos and user photos also to check the total storage of users fingerprints badges records attendance photos blacklist photos and user photos Device Info To display the d...

Page 56: ...Administrator to check if the user has the privilege to gain access within that time Schedule Verification succeeds but the user cannot open door Check whether the user privilege is set correctly Chec...

Page 57: ...rating Procedure If the user photo taken by the device is used the photo will be displayed right after user verification If the user photo in a USB disk is used the operating procedure is as below 1 C...

Page 58: ...ignal in bits to the access controller The Wiegand in this diagram follows the SIA access control standard protocol which targets at 26 bit Wiegand card reader with a pulse time within 20us to 100us a...

Page 59: ...ds Field Description Even parity check bit The even parity check bit is determined by bits 2 13 If there is an even number of 1 s the even parity check bit is 0 If there is an odd number of 1 s the ev...

Page 60: ...0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 Even parity check bit Failure ID 1 in binary system Odd parity check bit Note When output content is beyond the preset range of the Wiegand format...

Page 61: ...e odd parity check bit is 1 If there is an odd number of 1 s the odd parity check bit is 0 For example A user with the user ID of 123456789 has the card number of 0013378512 and the failure ID is set...

Page 62: ...USB disk file and put wallpapers into the file The capacity is 20 images with each of them not exceeding 30k Image name and format are not restricted Note When each user photo and attendance photo doe...

Page 63: ...ice supports out anti passback in anti passback and in out anti passback When Out Anti passback is set for a user on the master device the last record of the user must be a check in record if the user...

Page 64: ...After a user checks out only if the last record is a check in record can the user check out again In Anti passback After a user checks in only if the last record is a check out record can the user che...

Page 65: ...nt images and therefore no privacy issues are involved 3 We as the equipment provider shall not be held legally accountable directly or indirectly for any consequences arising due to the use of our pr...

Page 66: ...e protected by law At last we stress once again that biometrics as an advanced recognition technology will be applied in a lot of sectors including e commerce banking insurance and legal affairs Every...

Page 67: ...bstances or Elements Parts Name Toxic and Hazardous Substances or Elements Pb Hg Cd Cr6 PBB PBDE Chip resistor Chip capacitor Chip inductor Chip diode ESD components Buzzer Adapter Screws Indicates th...

Page 68: ......

Page 69: ...2014 ZKTeco Inc ZKTeco Logo is a registered trademark of ZKTeco or a related company All other product and company names mentioned are used for ZK Building Wuhe Road Gangtou Bantian Buji Town Longgang...

Reviews: