background image

深圳罗克福斯特信息技术有限公司

 

User

 Manual

 

Shenzhen Hesibond IOT Technology Corp., Ltd.

IOT Lock

Summary of Contents for HB-WLK-01

Page 1: ...1 深圳罗克福斯特信息技术有限公司 User Manual Shenzhen Hesibond IOT Technology Corp Ltd IOT Lock ...

Page 2: ...ch IoT Lock Instructions Manual V2 0 0 Honor produced Shenzhen Rock Foster Information Technology Co Ltd Production address 4th floor Shenyi Industrial Building Nanshan Avenue Shenzhen Service Phone 400 016 1008 ...

Page 3: ...oduction to IoT Lock Parameters 2 a Introduction to parameters on the three type door 2 b Introduction of parameters on the five type door 4 c Introduction to gateway parameters 6 II Quick Guide to IoT Locks 8 ...

Page 4: ... Three type Lockstitch IoT lock appearance Figure 1 0 Three type HB WLK 01 IoT lock appearance Note When the door lock has no power you can use the external USB emergency power supply interface to unlock ...

Page 5: ...C card capacity 100 ID card capacity 4 High definition voice full navigation operation Standard mechanical key 2 3 RFID cards 5 Stainless steel lock body standard 24 240MM non standard can be customized Working temperature 25 C to 65 C 6 Stainless steel panel no fear of corrosion acid and alkali oxidation not easy to be affected by sweat and years Operating humidity 5 to 95 no condensation Storage...

Page 6: ...rm false lock alarm 9 Sensor anti destructive ability 4H pencil 20 cm continuous impact 1000 times without damage Outdoor panel size L 363 x W 83 x H 32 mm 10 Tesla black box impact without damage Tesla hit 100 times and the door lock is still in normal use Indoor panel size L 363 x W 83 x H 32 mm Net weight 6 75kg ...

Page 7: ...5 Five type Lockstitch IoT lock appearance ...

Page 8: ...g voltage DC 6V four AA alkaline batteries recommended Nanfu battery key capacity 100 IC card capacity 100 ID card capacity 100 fingerprint capacity 50 4 High definition voice full navigation operation Standard mechanical key 2 3 RFID cards 5 Stainless steel lock body standard 24 240MM non standard can be customized Working temperature 25 C to 65 C 6 Zinc alloy panel no fear of corrosion acid and ...

Page 9: ...key unlock alarm password input 5 times error alarm false lock alarm 9 Sensor anti destructive ability 4H pencil 20 cm continuous impact 1000 times without damage Outdoor panel size L 363 x W 83 x H 32 mm 10 Tesla black box impact without damage Tesla hit 100 times and the door lock is still in normal use Indoor panel size L 363 x W 83 x H 32 mm Net weight 6 75kg ...

Page 10: ...ves the information link data packet information of the Internet of Things to send the information to the server When the terminal receives an instruction from the server the terminal is responsible for delivering the information to the door lock and the door lock performs the door opening action The gateway terminal assumes the role of the information transfer station The TD LTE wireless data ter...

Page 11: ...t receive the data packet uploaded by the door lock At this point A communication exception has occurred The information packets of the IoT door lock are encrypted by AES to ensure the integrity and importance of the data Gateway and door lock pairing process Open the gateway power switch wait 3 5 seconds the LED red indicator flashes once every 5 seconds use the small screwdriver inside the acces...

Page 12: ...ve standard YD T 2575 2013 YD T 2576 2 2013 2 Modulation QPSK 16QAM 3 Frequency Range Upstream 2570 MHz 2620 MHz Downstream 2570 MHz 2620 MHz 4 Transmit power 23dBm 5 DC power adapter accessories Input 100 240VAC 50 60HZ 0 5A Output DC9 0V 2 0A 6 Power outage Lithium battery 1800mAh 3 7V rechargeable backup lithium battery to ensure normal standby after 24 hours of AC power failure ...

Page 13: ...door lock pairing process Open the gateway power switch wait 3 5 seconds the LED red indicator flashes once every 5 seconds use the small screwdriver inside the accessory kit to press the Link button 3 5 seconds then when the LED When the red indicator light flashes rapidly the door lock battery will be powered on again When the voice network is connected is heard the connection between the door l...

Page 14: ... 2 Bind the door lock pay attention to the Rock Foster WeChat public account open the User Center Bound Door Lock menu scan code door lock QR code fill in the door lock name detailed address Bind the door lock ...

Page 15: ...12 Step 3 When the mobile phone opens open the public number phone unlocking menu to verify whether the remote opening and scanning code opening is successful ...

Page 16: ...uick use guide makes it easy for users to quickly familiarize themselves with the operation of the public number and the operation of the door lock For more functions and operations please refer to the detailed description of the WeChat client at the back of the manual to help the user understand the door lock function and its features in more detail ...

Page 17: ...33 深圳罗克福斯特信息技术有限公司 Shenzhen Hesibond IOT Technology Corp Ltd Mailbox aftersales hesibond com URL www hesibond com ...

Page 18: ...nce with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the foll...

Reviews: