background image

G4L 

   

 

 

 

 

 

 

 

         User Manual 

P a g e

 | 88 

 

Copyright©2020 ZKTECO CO., LTD. All rights reserved.

 

Appendix 1 Statement on the Right to Privacy 

Dear Customers: 

Thank you for choosing this hybrid biometric recognition product, which was designed and manufactured 
by ZKTeco. As a world-renowned provider of core biometric recognition technologies, we are constantly 
developing and researching new products, and strive to follow the privacy laws of each country in which 
our products are sold. 

We Declare That: 

1.

 

All of our civilian fingerprint recognition devices capture only characteristics, not fingerprint images, 
and do not involve privacy protection. 

2.

 

None of the fingerprint characteristics that we capture can be used to reconstruct an image of the 
original fingerprint, and do not involve privacy protection. 

3.

 

As the provider of this device, we will assume no direct or indirect responsibility for any consequences 
that may result from your use of this device. 

4.

 

If you would like to dispute human rights or privacy issues concerning your use of our product, please 
directly contact your dealer. 

Our other law-enforcement fingerprint devices or development tools can capture the original images of 
citizen's fingerprints. As to whether or not this constitutes an infringement of your rights, please contact 
your Government or the final supplier of the device. As the manufacturer of the device, we will assume no 
legal liability. 

Note: 

The Chinese law includes the following provisions on the personal freedom of its citizens: 

1.

 

There shall be no illegal arrest, detention, search, or infringement of persons; 

2.

 

Personal dignity is related to personal freedom and shall not be infringed upon; 

3.

 

A citizen's house may not be infringed upon; 

4.

 

A citizen's right to communication and the confidentiality of that communication is protected by the 
law. 

As a final point, we would like to further emphasize that biometric recognition is an advanced technology 
that  will be certainly used in E-commerce, banking, insurance, judicial, and other sectors in the future. 
Every year the world is subjected to major losses due to the insecure nature of passwords. The Biometric 
products serve to protect your identity in high-security environments. 

 

 

Содержание Green Label G4L

Страница 1: ...ion Follow these instructions to ensure that the product is functioning properly The images shown in this manual are for illustrative purposes only For further details please visit our Company s websi...

Страница 2: ...oduct It is an essential pre requisite for the satisfactory operation and maintenance that the operating and maintenance personnel are fully familiar with the design and that the said personnel have r...

Страница 3: ...tc for better operation and safety of the machine unit product The said additions or amendments are meant for improvement better operations of the machine unit product and such amendments shall not gi...

Страница 4: ...iometric verification procedures and the productization of biometric verification SDK which was initially widely applied in PC security and identity authentication fields With the continuous enhanceme...

Страница 5: ...Button or key names for devices For example press OK Window names menu items data table and field names are inside square brackets For example pop up the New User window Multi level menus are separat...

Страница 6: ...FINGERPRINT VERIFICATION 16 3 6 2 PASSWORD VERIFICATION 19 3 6 3 FACIAL VERIFICATION 21 3 6 4 COMBINED VERIFICATION 23 4 MAIN MENU 25 5 USER MANAGEMENT 26 5 1 USER REGISTRATION 26 5 1 1 USER ID AND N...

Страница 7: ...LIZE SETTINGS 55 9 1 INTERFACE SETTINGS 55 9 2VOICE SETTINGS 56 9 3 BELL SCHEDULES 57 9 4 PUNCH STATE OPTIONS 58 9 6 SHORTCUT KEY MAPPINGS 59 10 DATA MANAGEMENT 62 10 1 DELETE DATA 62 11 ACCESS CONTRO...

Страница 8: ...d 14 3VIEW THE PUBLIC MESSAGES AND PERSONAL MESSAGE 82 15 WORK CODE 83 15 1 ADD A WORK CODE 83 15 2 ALL WORK CODES LIST 85 15 3WORK CODE OPTIONS 85 16 AUTOTEST 86 17 SYSTEM INFORMATION 87 APPENDIX 1 S...

Страница 9: ...nd refer service personnel under the following conditions When cord or connection control is affected When the liquid was spilled or an item dropped into the system If exposed to water and or inclemen...

Страница 10: ...hardware and software services at a very low cost and at the same time support development by providing access via different platforms like mobile and web Scope Sync with Bio Cloud Software Easy Acces...

Страница 11: ...ommended Incorrect ways of pressing the finger on the Fingerprint Reader Finger Placement Description Not recommended to place the finger away from the center of the Scanning Area Not recommended to p...

Страница 12: ...result from incorrect usage of the product We reserve the right of final interpretation and modification concerning this point 3 2 Standing Position Facial Expression and Standing Posture Recommended...

Страница 13: ...nded Standing postures Note During enrollment and verification it is recommended to maintain natural facial expression and standing posture 3 3 Face Registration During registration it is recommended...

Страница 14: ...n button to go to the User ID input interface If the Super Administrator access is not set in the Device tap on button to go to the menu If the Super Administrator is set in the Device then it require...

Страница 15: ...ng the screen shortcut keys Tap anywhere on the screen without tapping on the icons to view the six punch state options as shown on the right image Press the corresponding shortcut key to select the c...

Страница 16: ...rtual Keyboard Note This device supports Chinese English numbers and symbols Tap EN to switch to the English keyboard Tap 123 to switch to the numbers and symbols keyboard Tap ABC to return to the alp...

Страница 17: ...1 1 Verification Process 1 1 biometric verification process authenticates a person s identity by comparing the captured biometric template with a biometric template of that person pre stored in the da...

Страница 18: ...to the fingerprint reader with the fingerprints that are linked to the specific User ID input via the virtual keyboard Users may try verifying their identities with 1 1 verification mode when they are...

Страница 19: ...password in addition to the fingerprint then the verification method is set to fingerprint password face verification and the below screen will appear in the Device Tap on fingerprint icon to go to th...

Страница 20: ...ll rights reserved 3 6 2 Password Verification This method compares the entered password with the registered User ID and password On the Menu screen tap on button to go to the 1 1 password verificatio...

Страница 21: ...nd fingerprint in addition to the password then the verification method is set to fingerprint password face verification and the below screen will appear in the Device Tap on the button to go to the p...

Страница 22: ...he acquired facial images with all the face data registered in the device The following is the prompt message of the comparison result 1 1 Face Verification This method compares the face captured by t...

Страница 23: ...t password face verification and the below screen will appear in the Device Tap on the button to go to the face verification mode If the user has registered face and fingerprint in addition to the pas...

Страница 24: ...vice provides the option of using multiple forms of verification mode In this Device a total of 11 different verification combinations can be used Combined Verification Symbol Definition Symbol Defini...

Страница 25: ...tered only the fingerprint data but the Device verification mode is set as Fingerprint Password the employee will not be able to complete the verification process successfully This is because the Devi...

Страница 26: ...tory and USB upgrade Personalize To customize settings of interface display voice bell punch state options and shortcut key Data Mgt To delete all relevantdatain the device Access Control To set the p...

Страница 27: ...User to add a new User 5 1 1 User ID and Name On the New User interface enter the User ID and Name Notes A user name can contain 17 characters The user ID can contain 1 9 digits bydefault During the...

Страница 28: ...registered in the Device then the Normal Users will not have the privileges to manage the system and can only access authentication verifications User Defined Roles The Normal User can also be set wi...

Страница 29: ...er interface tap on Fingerprint to go to the fingerprint registration page On the Enroll Fingerprint interface select the finger to be enrolled After the selecting the required finger press the same f...

Страница 30: ...egistration page During the Face registration process the user should look the camera and stay still as shown below 5 1 5 Badge Number On the New User interface tap on Badge Number to go to the badge...

Страница 31: ...registration page On the Password interface enter the required password and re enter to confirm it and tap OK If the re entered password is different from the initially entered password then the devi...

Страница 32: ...being clicked Note While registering for face the system will automatically capture the image of the user and set it as the user photo by default Hence even if the user did not want to register a user...

Страница 33: ...he Access Group On the Access Control Role tap on Access Group to assign the registered users to different groups for better management New users will be added to Group 1 by default which can be reass...

Страница 34: ...Mode interface select the required verification type from the list Duress Fingerprint On the Access Control Interface tap on Duress Fingerprint to go to the duress fingerprint page The user may specif...

Страница 35: ...or disable the group time period for each access group 5 2 Search for Users On the Main menu tap User Mgt and then tap All Users to search for a User On the All Users interface tap on the search bar o...

Страница 36: ...e User On All Users interface tap on the required user from the list and tap Delete to delete the user or a specific user information from the device On the Delete interface tap on the required operat...

Страница 37: ...e custom role can be set up to 3 roles that is the custom operating scope of the menu functions of the user On the User Defined Role interface toggle Enable Defined Role to enable or disable the user...

Страница 38: ...elect its required sub menus from the list Note If the User Role is enabled for the Device tap on User Mgt New User User Role to assign the created roles to the required users But if there is no super...

Страница 39: ...ork Settings When the device needs to communicate with a PC over the Ethernet you need to configure network settings and ensure that the device and the PC are connecting to the same network segment On...

Страница 40: ...l is to dynamically allocate IP addresses for clients via server Display in Status Bar Toggle to set whether to display the network icon on the status bar 7 2 Serial Comm Serial Comm function facilita...

Страница 41: ...re reliable 7 3 PC Connection Comm Key facilitates to improve the security of data by setting the communication between device and PC Once the Comm Key is set its connection password must be provided...

Страница 42: ...terface tap Wireless Network to configure WIFI settings Search the WIFI Network Once the Wi Fi is turned on the device will search for the available WIFI within the network range Tap on the appropriat...

Страница 43: ...Protocol which is to dynamically allocate IP address for clients via server If the DHCP is enabled then the IP cannot be set manually IP Address IP address for WIFI network the default is 0 0 0 0 Can...

Страница 44: ...Once this function is enabled the domain name mode http will be used such as http www XYZ com while XYZ denotes the domain name Disable Domain Name Server Address IP address of the ADMS server Server...

Страница 45: ...ven parity bit of the 2nd to 13th bits while the 26th bit is the odd parity bit of the 14th to 25th bits 2nd to 25th bits are the card numbers Wiegand26a ESSSSSSSSCCCCCCCCCCCCCCCCO Consists of 26 bits...

Страница 46: ...the even parity bit of the 19th to 36th bits 2nd to 4th bits are the manufacturer codes 5th to 16th bits are the site codes and the 21st to 36th bits are the card numbers Wiegand37a EMMMFFFFFFFFFFSSS...

Страница 47: ...s failed the system will send the failed ID to the device and replace the card number or personnel IDwith the new one Site Code It is similar to the device ID The difference is that a site code can be...

Страница 48: ...ed system parameters so as to optimize the performance of the device 8 1 Date and Time On the System Interface tap Date Time to set the date and time Tap Manual date and time to manually set the date...

Страница 49: ...mode When restoring to factory settings the time 24 hour and date format YYYY MM DD can be restored but the device date and time cannot be restored Note For example the user sets the time of the devi...

Страница 50: ...cord space of the attendance log access log reaches the maximum threshold value the device will automatically display the memory space warning You may either clear the logs or disable the function or...

Страница 51: ...mode the verification will only be successful when the similarity between the acquired facial image and all registered facial templates is greater than the set value The valid value ranges from 65 to...

Страница 52: ...for facial registration and comparison The higher the value the clearer the image requires Minimum Recognition Value Required for facial registration and comparison If the minimum size of the capture...

Страница 53: ...exposure and quality parameters may severely affect the performance of the device Please adjust the exposure parameter only under the guidance of the after sales service personnel of our company Proc...

Страница 54: ...gerprint detection you can set the level to High to raise the sensibility when the environment is humid making it hard to identify the fingerprint you can set the level to Low 1 1 Retry Attempts Users...

Страница 55: ...tion does not clear the registered user data On the System interface tap Reset and then tap OK to restore to default factory settings 8 6 USB Upgrade The device firmware program can be upgraded with t...

Страница 56: ...mize interface settings voice bell punch state options and shortcut key mappings 9 1 Interface Settings On the Personalize interface tap User Interface to customize the display style of the main inter...

Страница 57: ...nt images as a slide show process The function can be disabled or set the required time interval between 3 and 999 seconds Idle Time to Sleep m If the sleep mode is activated and when there is no oper...

Страница 58: ...to add a new bell schedule Function Description Function Name Description Bell Status Toggle to enable or disable the bell status Bell Time Once the required time is set the device will automatically...

Страница 59: ...hedules interface tap on the required bell schedule and tap Edit to edit the selected bell schedule The editing method is the same as the operations of adding a new bell schedule Delete a bell On the...

Страница 60: ...e manual switching punch state key will become auto switch punch state key Manual Fixed Mode After the punch state key is set manually to a particular punch status the function will remain unchanged u...

Страница 61: ...as New user All users etc the configuration is completed as shown in the image below If the Shortcut key is set as a punch state key such as check in check out etc then it is required to set the punch...

Страница 62: ...ZKTECO CO LTD All rights reserved Once the Switch cycle is selected set the switch time for each day and tap OK to confirm as shown in the image below Note When the function is set to Undefined the d...

Страница 63: ...On the Main Menu tap Data Mgt to delete the relevant data in the device 10 1 Delete Data On the Main Menu tap Delete Data to delete the required data Function Description Function Name Description De...

Страница 64: ...ges Delete Access Control Deletes all the access data Delete User Photo Deletes all the user photos in the device Delete Wallpaper Deletes all the wallpapers in the device Delete Screen Savers Deletes...

Страница 65: ...he user time period The corresponding user s group must be already set in the door unlock combination and if there are other user groups being set in the same access combo then the verification of tho...

Страница 66: ...nsor types None Normal Open and Normal Close None Itmeans the door sensor isnotin use Normal Open It means the door is always left opened when electric power is on Normal Close It means the door is al...

Страница 67: ...Alarm Transmits a sound alarm or disassembly alarm from the local When the door is closed or the verification is successful the system will cancel the alarm from the local Reset Access Setting The ac...

Страница 68: ...P a g e 67 Copyright 2020 ZKTECO CO LTD All rights reserved On the selected Time Zone number interface tap on the required day that is Monday Tuesday etc to set the time Specify the start and end time...

Страница 69: ...d also when the End Time is later than the Start Time such as 08 00 23 59 The default Time Zone 1 indicates that door is open all day long 11 3 Holiday Settings Whenever there is a holiday you may nee...

Страница 70: ...sily manage the different group of users in different access groups The configuration of access group such as access time zones are applicable to all the users in the group by default where the users...

Страница 71: ...access group item to be modified Tap Edit and modify the access group parameters Delete a Group On All Groups interface select the access group item to be deleted and click Delete Tap OK to confirm d...

Страница 72: ...r unlock combination 2 is set as 02 02 04 04 07 indicating that the unlock combination 2 consists of 5 people the first two are from AC group 2 the next two are from AC group 4 and the last person is...

Страница 73: ...Verification When a user uses any fingerprint to perform the 1 1 verification an alarm signal will be generated only when the 1 1 verification is successful otherwise there will be no alarm signal Ala...

Страница 74: ...hrough USB drive You can import user information access data and other data from a USB drive to computer or other devices Before uploading or downloading data from or to the USB drive insert the USB d...

Страница 75: ...user pictures from the device to the USB drive Attendance Photo Permits to either download attendance photos stored in the device within a specified time period or all attendance photos from the devi...

Страница 76: ...evice Before uploading you may select Upload selected picture or Upload all pictures Wallpaper Can upload wallpaper from the USB drive to the device Before uploading you may select Upload selected pic...

Страница 77: ...s to check their attendance access logs On the Main Menu tap Attendance Search to search for the required Access Attendance log The process of searching for attendance and blacklist photos is similar...

Страница 78: ...p the record in highlighted in green to view its details The above figure displays the details of the selected record Enter the user ID to be searched and tap OK If you want to search for records of a...

Страница 79: ...and make it into SMS and display on the screen SMS includes common SMS and individual SMS If common SMS is set the common SMS icon will be displayed on the information column at the top of standby int...

Страница 80: ...the content of the message and tap Confirm OK to save the content and quit from the Message interface Set the Start Date and Time On the New Message interface tap the Start date and Start time to set...

Страница 81: ...the validity period for the SMS This displays the SMS to appear within the effective time and the message will not be displayed beyond the expire time Note For public short messages the effective peri...

Страница 82: ...etting the Message Type Public Message will be seen by all person Personal Message will be seen by selected individuals only Draft Stores the text message that you wrote so far so you can add some mor...

Страница 83: ...on is displayed on the upper right of the main interface and the public short message content will be displayed in scroll mode below The content of a personal short message is displayed after successf...

Страница 84: ...rresponding work type for every attendance record to facilitate rapid understanding of different attendance status quo during the handling of attendance data On the Main Menu tap Work Code to configur...

Страница 85: ...G4L User Manual P a g e 84 Copyright 2020 ZKTECO CO LTD All rights reserved Editing a name On the New Work Code interface tap on the ID field to edit ID...

Страница 86: ...s the same as that of adding a work code except that the ID is not allowed to be modified On the Work Code interface tap All Work Code to view and edit the required work code 15 3 Work Code Options To...

Страница 87: ...ether the screen displays colors normally Test Voice To automatically test whether the audio files stored in the device are complete and the voice quality is good Test Fingerprint Sensor To test the f...

Страница 88: ...Device Capacity Displays the current device s user storage admin user password fingerprint face storage badge storage attendance records attendance and blacklist photos and user photos Device Info Di...

Страница 89: ...es concerning your use of our product please directly contact your dealer Our other law enforcement fingerprint devices or development tools can capture the original images of citizen s fingerprints A...

Страница 90: ...ponent Name Hazardous Toxic Substance Element Lead Pb Mercury Hg Cadmiu m Cd Hexavalent chromium Cr6 Polybrominate d Biphenyls PBB Polybrominated Diphenyl Ethers PBDE Chip Resistor Chip Capacitor Chip...

Страница 91: ...ZK Building Wuhe Road Gangtou Bantian Buji Town Longgang District Shenzhen China 518129 Tel 86 755 89602345 Fax 86 755 89602394...

Отзывы: