background image

View the default card reader authentication mode.

Fingerprint Capacity

View the maximum number of available fingerprints.

Existing Fingerprint Number

View the number of existed fingerprints in the device.

Score

The device will score the captured picture according to the

yaw angle, pitch angle, and pupillary distance. If the score is

less than the configured value, face recognition will be

failed.

Face Recognition Timeout Value

If the recognition time is more than the configured time, the

device will remind you.

Face Recognition Interval

The time interval between two continuous face recognitions

when authenticating. By default, it is 2s.

Face 1:1 Matching Threshold

Set the matching threshold when authenticating via 1:1

matching mode. The larger the value, the smaller the false

accept rate and the larger the false rejection rate when

authentication.

1:N Security Level

Set the matching security level when authenticating via 1:N

matching mode. The larger the value, the smaller the false

accept rate and the larger the false rejection rate when

authentication.

Live Face Detection

Enable or disable the live face detection function. If enabling

the function, the device can recognize whether the person is

a live one or not.

Live Face Detection Security Level

After enabling Live Face Detection function, you can set the

matching security level when performing live face

authentication.

Max. Failed Attempts for Face Auth.

Set the maximum live face detection failed attempts. The

system will lock the user's face for 5 minutes if the live face

detection is failed for more than the configured attempts.

The same user cannot authenticate via the fake face within 5

minutes. Within the 5 minutes, the user can authenticate via

the real face twice continuously to unlock.

Lock Authentication Failed Face

After enabling the Live Face Detection function, the system

will lock the user's face for 5 minutes if the live face

detection is failed for more than the configured attempts.

The same user cannot authenticate via the fake face within 5

minutes. Within the 5 minutes, the user can authenticate via

the real face twice continuously to unlock.

Application Mode

You can select indoor or others application modes according

to actual environment.

54

Содержание DS-K1T605 Series

Страница 1: ...Face Recognition Terminal UD07930B E...

Страница 2: ...FITNESS FOR A PARTICULAR PURPOSE REGARDING THIS MANUAL HIKVISION DOES NOT WARRANT GUARANTEE OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL OR THE CORRECTNESS ACCURACY OR RELIABILITY OF I...

Страница 3: ...ossible to reconstruct a fingerprint image As data controller you are advised to collect store process and transfer data in accordance with the applicable data protection laws and regulations includin...

Страница 4: ...uation which if not avoided will or could result in death or serious injury Caution Indicates a potentially hazardous situation which if not avoided could result in equipment damage data loss performa...

Страница 5: ...ing 10 6 1 Wire Device 10 6 2 Wire Secure Door Control Unit 11 7 Activation 11 7 1 Activate via Device 12 7 2 Activate via SADP 12 7 3 Activate Device via Client Software 13 8 Basic Operation 14 8 1 L...

Страница 6: ...tity Authentication 24 8 6 1 Authenticate via 1 1 Matching 25 8 6 2 Authenticate via Other Types 25 8 7 System Settings 25 8 7 1 Set Basic Parameters 26 8 7 2 Set Face Picture Parameters 27 8 7 3 Set...

Страница 7: ...Person Identify Information 41 9 1 14 Import Person Information 41 9 1 15 Import Person Pictures 42 9 1 16 Export Person Information 43 9 1 17 Export Person Pictures 43 9 1 18 Get Person Information...

Страница 8: ...ss Event 71 9 5 3 Configure Device Actions for Card Swiping 72 9 5 4 Configure Device Linkage for Mobile Terminal s MAC Address 73 9 5 5 Configure Device Actions for Person ID 74 9 6 Door Elevator Con...

Страница 9: ...B Tips When Collecting Comparing Face Picture 94 C Relationship between Device Height Person Height and Standing Distance 96 D Tips for Installation Environment 97 E Dimension 98 viii...

Страница 10: ...es Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is...

Страница 11: ...re intended to ensure that user can use the product correctly to avoid danger or property loss The precaution measure is divided into Dangers and Cautions Dangers Neglecting any of the warnings may ca...

Страница 12: ...use fire danger Do not aim the device at the sun or extra bright places A blooming or smear may occur otherwise which is not a malfunction however and affecting the endurance of sensor at the same tim...

Страница 13: ...interface etc Voice prompt Dual lens camera one camera for receiving visible light and the other one for receiving infrared light Standard definition Face picture recognition and face picture capture...

Страница 14: ...formation of the face recognition terminal Figure 4 1 Appearance of Face Recognition Terminal Table 4 1 Description of Face Recognition Terminal No Name Description 1 Indicator Solid Red Standby Flash...

Страница 15: ...nment is too dark the device will enable the supplement light automatically 4 Display Screen 5 inch LCD touch screen with the resolution of 800 480 5 Supplement Light Support white light and IR light...

Страница 16: ...ta 10 Wiring Terminals Connect to other external devices 11 Reset While the device is powering on hold the reset button and the device will restore to the factory settings 12 TAMPER When the tamper bu...

Страница 17: ...all Mounting You can install the terminal with gang box on the wall or other surfaces Steps 1 According to the baseline on the mounting template stick the mounting template on the wall or other surfac...

Страница 18: ...l without Gang Box Wall Mounting You can install the terminal without gang box on the wall or other surfaces Steps 1 According to the baseline on the mounting template stick the mounting template on t...

Страница 19: ...tput input devices and connect the WIEGAND terminal with the Wiegand card reader or the access controller You can also connect the DS_IN can with the power supply If connect the WIEGAND terminal with...

Страница 20: ...18 AWG The power cable s rated current is 3 A while other cable s rated current is 1 A 6 2 Wire Secure Door Control Unit You can connect the terminal with the secure door control unit The wiring diag...

Страница 21: ...via SADP SADP is a tool to detect activate and modify the IP address of the device over the LAN Before You Start Get the SADP software from the supplied disk or the official website http www hikvision...

Страница 22: ...he searched online devices are displayed in the list 4 Check the device status shown on Security Level column and select an inactive device 5 Click Activate to open the Activation dialog 6 Create a pa...

Страница 23: ...login type Follow the instructions and authenticate the permissions to enter the home page Note The device will be locked for 30 minutes after 5 failed password attempts For details about setting the...

Страница 24: ...he Wi Fi parameters settings page 5 Select an IP mode If selecting Static you should input the Wi Fi password IP address subnet mask and gateway If selecting Dynamic you should input the Wi Fi passwor...

Страница 25: ...ransmission direction and its mode Output A face recognition terminal can connect an external access controller And the two devices will transmit the card No via Wiegand 26 or Wiegand 34 mode Input A...

Страница 26: ...ce picture is in good quality and is accurate For details about the instructions of adding face pictures see Tips When Collecting Comparing Face Picture After completely adding the face picture a capt...

Страница 27: ...fingerprint module And follow the instructions on the screen to record the fingerprint 6 After adding the fingerprint completely tap Yes on the pop up dialog to save the fingerprint and continue to a...

Страница 28: ...Up to 20 characters are allowed in the card No By default the card No contains 10 characters The system will use 0 to supplement the 10 character card No For example 5 and 0000000005 are two different...

Страница 29: ...is the administrator Except for the normal attendance function the user can also enter the Home page to operate after authenticating the permission Disable Administrator Permission The User is the no...

Страница 30: ...Add User to edit the user parameters Tap to save the settings Note The employee ID cannot be edited 8 4 Import and Export Data On the Transfer page you can export the attendance data the user data the...

Страница 31: ...ile s name should be follow the rule below Card No _Name_Department_Employee ID_Gender jpg The employee ID should between 1 and 99999999 should not be duplicated and should not start with 0 Requiremen...

Страница 32: ...dule The system will auto change the attendance status according to the configured parameters Before You Start Add at least one user and set the user s authentication mode For details see User Managem...

Страница 33: ...tus will be valid within the configured schedule For example if set the break out s schedule as Monday 11 00 and break in s schedule as Monday 12 00 the valid user s authentication from Monday 11 00 t...

Страница 34: ...ode to authenticate 8 6 2 Authenticate via Other Types Steps 1 According to the configured authentication mode authenticate by comparing face pictures fingerprints or by swiping card Face Picture Auth...

Страница 35: ...ct one of the following formats MM DD YYYY MM DD YYYY DD MM YYYY DD MM YYYY DD MM YYYY YYYYMMDD YY MM DD YY MM DD and MM DD YYYY Keyboard Sound Tap or to disable or enable the keyboard sound Voice Pro...

Страница 36: ...enabled you can set the illumination threshold When the illumination is lower than the configured threshold the supplement light will turned on automatically 8 7 2 Set Face Picture Parameters You can...

Страница 37: ...n If enabling the function the device can recognize whether the person is a live one or not 8 7 3 Set Fingerprint Parameters You can set the fingerprint security level in this section Note Some device...

Страница 38: ...on this page and tap to save the settings Figure 8 13 Access Control Parameters The available parameters descriptions are as follows Table 8 2 Access Control Parameters Descriptions Parameter Descrip...

Страница 39: ...uthentication will be failed Door Locked Time Set the door unlocking duration If the door is not opened for the set time the door will be locked Available door locked time range 1 to 255s Door Open Ti...

Страница 40: ...s Tap Data Data Management to enter the Data Management page Tap the button on the page to manage the data Tap Yes on the pop up window to complete the settings The available button descriptions are a...

Страница 41: ...y 2 Tap Card on the left of the page and select a search type from the drop down list 3 Tap the input box and input the employee ID the card No or the user name for search 4 Select a time Note You can...

Страница 42: ...not support displaying the fingerprint capacity Tap Info System Information Capacity on the Home page to enter the Capacity page Figure 8 18 Capacity View Device Information You can view the device in...

Страница 43: ...organizations can be added 4 Optional Perform the following operation s Edit Organization Hover the mouse on an added organization and click to edit its name Delete Organization Hover the mouse on an...

Страница 44: ...to five cards can be issued to one person 1 Enter Person module 2 Select an organization in the organization list to add the person and click Add Note Enter the person s basic information first For d...

Страница 45: ...person and click Add Note Enter the person s basic information first For details about configuring person s basic information refer to Configure Basic Information 3 Click Add Face in the Basic Informa...

Страница 46: ...9 1 6 Collect Face via Access Control Device When adding person you can collect the person s face via access control device added to the client which supports facial recognition function Steps 1 Ente...

Страница 47: ...F you can click Settings to select the COM the fingerprint recorder connects to 6 Collect the fingerprint 1 Click Start 2 Place and lift your fingerprint on the fingerprint recorder to collect the fin...

Страница 48: ...ck Add Note Enter the person s basic information first For details about configuring person s basic information refer to Configure Basic Information 3 In the Access Control panel set the person s acce...

Страница 49: ...the person properties which are not pre defined in the client according to actual needs e g place of birth After customizing when add a person you can enter the custom information to make the person...

Страница 50: ...gure Additional Information When adding person you can configure the additional information for the person such as person s identity type identity No country etc according to actual needs Steps 1 Ente...

Страница 51: ...rt importing Note If a person No already exists in the client s database delete the existing information before importing You can import information of no more than 10 000 persons 9 1 15 Import Person...

Страница 52: ...be exported if you do not select any organization 3 Click Export to open the Export panel and check Person Information as the content to export 4 Check desired items to export 5 Click Export to save...

Страница 53: ...Device 4 Select the access control device from the drop down list 5 Click Get to start importing the person information to the client The person information including person details person s fingerpri...

Страница 54: ...ing this lost card 4 Optional If the lost card is found you can click to cancel the loss After cancelling card loss the access authorization of the person will be valid and active 5 If the lost card i...

Страница 55: ...M1 card and if you need to enable the M1 Card Encryption function you should enable this function and select the sector of the card to encrypt Remote Mode Issue Card by Card Reader Select an access co...

Страница 56: ...ick the time duration and directly edit the start end time in the appeared dialog Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration when the cu...

Страница 57: ...tions Move the cursor to the time duration and drag the time duration on the timeline bar to the desired position when the cursor turns to Click the time duration and directly edit the start end time...

Страница 58: ...indow 3 In the Name text field create a name for the access group as you want 4 Select a template for the access group Note You should configure the template before access group settings Refer to Conf...

Страница 59: ...the parameters of access control device access controller access control points door or floor alarm inputs alarm outputs card readers and lane controller Configure Parameters for Access Control Devic...

Страница 60: ...upload the MAC address to the system If the MAC address match the specified MAC address the system can trigger some linkage actions 3G 4G If you enable this function the device can communicate in 3G 4...

Страница 61: ...ting the duress code when there is duress At the same time the client can report the duress event Super Password The specific person can open the door by inputting the super password Dismiss Code Crea...

Страница 62: ...me card is less than the set value the card swiping is invalid You can set it as 0 to 255 Max Interval When Entering PWD When you inputting the password on the card reader if the interval between pres...

Страница 63: ...e false rejection rate when authentication Live Face Detection Enable or disable the live face detection function If enabling the function the device can recognize whether the person is a live one or...

Страница 64: ...gnal detected by the detector reaches the setting time the alarm input is triggered For example you have set the sensitivity as 10ms only when the duration of signal detected by the detector reach 10m...

Страница 65: ...barrier The DIP settings of the lane controller will be invalid Free Passing Authentication If you enable this function when both entrance and exit s barrier mode is Remain Open the pedestrians shoul...

Страница 66: ...ns to Click the time duration and directly edit the start end time in the appeared dialog Move the cursor to the start or the end of time duration and drag to lengthen or shorten the time duration whe...

Страница 67: ...he access group to the access control device For details refer to Set Access Group to Assign Access Authorization to Persons Perform this task when you want to set authentications for multiple cards o...

Страница 68: ...by the client When the person swipes the card on the device a window will pop up You can unlock the door via the client Figure 9 1 Remotely Open Door Note You can check Offline Authentication to enabl...

Страница 69: ...r the third party card readers Steps Note By default the device disables the custom wiegand function If the device enables the custom Wiegand function all wiegand interfaces in the device will use the...

Страница 70: ...ccording to your actual needs Perform this task if you need to configure the card reader s authentication mode and schedule Steps 1 Click Access Control Advanced Function Authentication to enter the a...

Страница 71: ...ct an access control device in the list on the left panel 3 Select the current mode as Enable Remaining Open after First Person Disable Remaining Open after First Person or Authorization by First Pers...

Страница 72: ...3 Select a card reader as the beginning of the path in the First Card Reader field 4 Click of the selected first card reader in the Card Reader Afterward column to open the select card reader dialog...

Страница 73: ...on will list on the Multi door Interlocking List panel 6 Optional Select an added multi door interlocking combination from the list and click Delete to delete the combination 7 Click Apply to apply th...

Страница 74: ...wn list 5 Check Enable to enable to set the uploading mode 6 Select the uploading mode from the drop down list Enable N1 or G1 for the main channel and the backup channel Select Close to disable the m...

Страница 75: ...P address and port number Note By default the port number for EHome is 7660 The port number of the wireless network and wired network should be consistent with the port number of EHome 8 Select the Pr...

Страница 76: ...king a button Before that you need to set the parameters for the capture such as picture quality Before You Start Before setting the capture parameters you should set the saving path first to define w...

Страница 77: ...will upload an alarm to the client If mismatched the person is not in the blacklist the access will be granted Save Authenticating Face Picture If enabled the captured face picture when authenticating...

Страница 78: ...r the device 5 Select the Wiegand channel No and the communication mode from the drop down list Note If you set Communication Direction as Sending you are required to set the Wiegand Mode as Wiegand 2...

Страница 79: ...event by setting up a rule For example when the event is detected an audible warning appears to notify the security personnel Steps Note The linkage actions here refer to the linkage of the client so...

Страница 80: ...he list on the left 3 Click Add button to add a new linkage 4 Select the event source as Event Linkage 5 select the event type and detailed event to set the linkage 6 In the Linkage Target area set th...

Страница 81: ...output host buzzer and other actions on the same device Steps Note It should be supported by the device 1 Click Access Control Linkage Configuration 2 Select the access control device from the list o...

Страница 82: ...event source parameters including event source and linkage target 9 5 4 Configure Device Linkage for Mobile Terminal s MAC Address You can set the access control device s linkage actions for the spec...

Страница 83: ...e settings in the device list and you can edit its event source parameters including event source and linkage target Delete Linkage Settings Select the configured linkage settings in the device list a...

Страница 84: ...to the configured play mode 8 Click Save 9 Optional After adding the device linkage you can do one or more of the following Delete Linkage Settings Select the configured linkage settings in the devic...

Страница 85: ...again automatically Close Door When the door is unlocked lock it and it will be closed The person who has the access authorization can access the door with credentials Remain Open The door will be un...

Страница 86: ...elected floor s button in the elevator will be valid all the time Disabled The selected floor s button in the elevator will be invalid and you cannot go to the target floor Result The icon of the door...

Страница 87: ...will be calculated in the statistics 9 7 1 Configure Attendance Parameters You can configure the attendance parameters including the general rule overtime parameters attendance check point holiday le...

Страница 88: ...rol devices are set as attendance checkpoint 1 Enter the Time Attendance module 2 Click Attendance Settings Attendance Check Point to enter the Attendance Check Point Settings page 3 Optional Set Set...

Страница 89: ...e 2 Click Attendance Settings Holiday to enter the Holiday Settings page 3 Click Add to open the Add Holiday page 4 Check Irregular Holiday as holiday type 5 Custom a name for the holiday 6 Set the st...

Страница 90: ...o delete the selected minor leave type s Synchronize Authentication Record to Third Party Database The attendance data recorded in client software can be used by other system for calculation or some o...

Страница 91: ...nding break Break Duration The duration from start time to end time of the break Calculation Auto Deduct The fixed break duration will be excluded from work hours Must Check The break duration will be...

Страница 92: ...check in time and check out time is valid and the sum of all periods between adjacent check in and check out time will be recorded as the valid working duration You need to set Valid Auth Interval for...

Страница 93: ...anel of the page At most 64 shifts can be added 7 Optional Assign the shift to organization or person for a quick shift schedule 1 Click Assign 2 Select Organization or Person tab and check the desire...

Страница 94: ...After checking Multiple Shift Schedules you can select the effective time period s from the added time periods for the persons in the department Multiple Shift Schedules It contains more than one tim...

Страница 95: ...of the three timetables If the person checks in at 07 50 it will apply the nearest timetable 08 00 to 15 00 to the person s attendance 6 Set the start date and end date 7 Set other parameters for the...

Страница 96: ...u ca also edit or delete the shift schedule Steps 1 Click Time Attendance Shift Schedule to enter the Shift Schedule Management page 2 Select the organization and corresponding person s 3 Click or to...

Страница 97: ...he person in one month Edit In calendar mode click the related label on date to edit the details In list mode double click the related filed in Date Handling Type Time or Remark column to edit the inf...

Страница 98: ...ng details to local PC Note The exported details are saved in CSV format 9 7 7 Calculate Attendance Data You need to calculate the attendance data before searching and viewing the overview of the atte...

Страница 99: ...t Original Attendance Record You can search the employee s attendance time attendance status check point etc in a time period to get an original record of the employees Before You Start You should add...

Страница 100: ...hedule so that the client can calculate the data automatically every day For details refer to Calculate Attendance Data Steps 1 Enter the Time Attendance module 2 Click Attendance Statistics Report 3...

Страница 101: ...ding time as 20 00 00 the client will send the report at 8 p m on Fridays during 2018 3 10 to 2018 4 10 Note Make sure the attendance records are calculated before the sending time You can calculate t...

Страница 102: ...f scanning fingerprint displayed below are incorrect Environment The scanner should avoid direct high light high temperature humid conditions and rain When it is dry the scanner may not recognize your...

Страница 103: ...st like the expression in the picture below Do not wear hat sunglasses or other accessories that can affect the facial recognition function Do not make your hair cover your eyes ears etc and heavy mak...

Страница 104: ...95...

Страница 105: ...C Relationship between Device Height Person Height and Standing Distance 96...

Страница 106: ...ce Illumination Reference Value Candle 10Lux Bulb 100 850Lux Sunlight More than 1200Lux 2 Install the device at least 2 meters away from the light and at least 3 meters away from the window or door 3...

Страница 107: ...E Dimension 98...

Отзывы: