*Thank you for purchasing our product.
To fully utilize the performance of this product, please read this manual carefully and use it correctly and safely.
All our products have undergone rigorous inspections before leaving the factory. Please ensure that the product packaging is undamaged before use.
If the product is damaged or malfunctions, please contact our after-sales personnel promptly.
Precautions:
■ Operating Environment:
- Do not use this product in places with strong vibrations or impacts, as it may affect the precision components, leading to performance degradation or malfunctions.
- Do not use or store this product in direct sunlight, high temperatures, extremely cold conditions, humid environments, or dusty areas.
- Please use within the specified temperature and humidity range.
- Do not subject the product to vibration or impact while writing data or during communication or turn off the power. Data loss may result in product malfunctions.
■ Installation:
- Do not install the product near corrosive chemicals or in places where corrosive gases are generated.
- Do not install the product in areas with low-melting substances or flammable materials.
- Before connecting or disconnecting modules and wires, be sure to turn off the power. Installing or removing modules and wires with the power on may cause damage.
- Do not tighten connectors by pulling or bending the wires. Doing so may damage the connectors.
■ Others:
- Before cleaning, please turn off the power of this product.
- Clean with a soft dry cloth. Wiping with alcohol, disinfectants, cleaning agents, glass cleaners, or similar substances may cause malfunctions.
- When transferring or disposing of this product, please delete all data. If data remains, there is a risk of malicious reading and leakage by third parties.
- If you encounter any issues with this product, please stop using it immediately, turn off the power, and contact us.
Declaration:
Due to product improvements or other reasons, the products and specifications described in this document are subject to change without prior notice.
Unauthorized copying or modification of any part or all of this document is prohibited.
Every effort has been made to ensure the accuracy of this document. However, if you find any unclear or incorrect information, please contact us.
All rights of interpretation belong to FaceSec.
Precautions:
1、 The installation height of the device (the height of the recognition camera from the ground) is 1.5m, and the recognizable distance is 25-90cm, recognizable height range is 110-220cm;
2、 Install the device at least 2 meters away from any direct light source
3、 In the Temperature Measurement Mode, the recognizable distance is 30-50cm and the recognizable height range is 120-190cm
4、 In the Temperature Measurement Mode, it requires an indoor environment, and there should be no high-temperature heat source within the frame of the thermal camera, which will affect the result of temperature measurement
5、 In the Temperature Measurement Mode, the temperature measurement camera needs to be warmed up for 20 minutes after the device is turned 1111on to achieve better detection accuracy
When the terminal is powered off, press and hold the power button to turn on the terminal.
When the terminal is powered on for the first time, it will enter the initialization page.
On the 'Language' setting interface, select the system language of the terminal.
Click on the arrow below to enter the 'Date and Time' setting interface.
▲ The system language of the terminal can be modified in the terminal or FaceOffice
▲ The language of some fields cannot be changed after initial selection. Such as the default recognition rules, default time rules, etc.
In the 'Date and Time' setting interface, it is recommended to turn on the automatic setting (default value).
Select the time zone for the terminal.
▲ The system provides four types of time formats. For example Apr.6, 1978 (default)、6 Apr, 1978、April 6, 1978、Thursday, April 6,
▲ Please make sure that the selected time zone is consistent with the time zone where you use FaceOffice.
To edit the time format, log in to Terminal Management > General > Date & Time.
Click on 'Next' to enter the 'Network Configuration' interface.
The network settings are used to set the network connection method of the terminal, 'WLAN' and 'LAN' options are provided.
For WLAN, select the corresponding network connection.
For LAN, after the device is connected to the network cable, it is recommended to turn on 'Auto Obtain' so that the device can automatically obtain network information.
▲During initialization, the device needs to be connected to the public network to activate the algorithm. The device cannot work properly if it is not connected to the public network.
On the 'Select Operation Mode' interface, select the mode you purchased.
Click on 'Next'.
For OA and Home modes, you can choose whether to enable the device group function.
The device group function is applicable to scenarios with multiple devices, and users can manage all devices in a unified manner.
Enable the device group function to select the role of the current device (maser or slave).
Role | Description |
---|---|
Master | Used for managing slave devices in a unified manner, including personnel and organization information and recognition records. |
Slave | It can work normally, but the personnel and organization information can only be obtained from the master device instead of editing the information on slave devices. The records on the slave devices are aggregated to the master device and cannot be viewed on the slave devices. |
▲ After using device group function, if you want to turn it off or change the device roles, you need to restore the factory settings for initialization, and all data will be deleted, please choose carefully.
For detailed functions and operations, see <3.11.4 Device Group>
Enter project description.
NO. | Project | Description |
---|---|---|
1 | Server address | Required |
2 | Activation code | Required |
3 | Device name | Optional |
4 | Device group | Optional |
Input method 1: Activate device by scanning QR code, which will automatically enter the server address, activation code, device name, and device group information. (recommended)
Input method 2: Manually input through the soft keyboard.
Click on 'Next' and it will display "Device activation successful"
Login to the platform
Step 1 Browser access to https://cloud.facesec.com or private cloud address.
Step 2 Enter the account number and password to log in. To log in to the public cloud account, you need to obtain an email verification code.
▲ After generating the administrator ID, you can use email or administrator ID to log in on the login page.
▲ If the administrator ID is not generated, please go to Step3. (Public cloud)
▲ If the administrator ID has been generated, please skip Step3 and go to Step4. (Public cloud)
▲ The email used for login is the email submitted when registering the cloud management platform. ▲ Email can be modified after login.
Step 3(Public Cloud)If the administrator ID is not generated, it will enter the administrator ID generation interface.
1. Enter the new administrator ID
2. Enter a new login password
3. Click "OK"
▲ Once the administrator ID is generated, it cannot be modified. The login password can be changed afterwards. ▲ The administrator ID has been generated and this page will not be displayed. ▲ The administrator ID must be a half-width characters, start with English, and can be a combination of English, numbers, and three special characters ( . _ - ). The length of the administrator ID is 6 to 100 characters.
Step4 (Public cloud) Enter the account password and 6-digit verification code, click on 'Login' to enter the home page of the Dashboard.
Get Terminal Activation Code
Step1 Open the device management interface.
Steps: menu on left hand side → device → device management
Step2 Click on 'Device Activation Code' to view the device activation code.
Record the platform IP address and activation code or print the QR code.
▲ When activating the device, scanning the QR code is more efficient than manually entering the platform IP address and activation code. ▲ After refreshing the activation code, a new activation code will be generated, and the old activation code will be invalid immediately.
On the 'Device Administrator' page, register the terminal administrator's information.
Click on the 'Next' button to complete the addition.
Options | Description | Description |
---|---|---|
<Photo> |
Tap the camera icon to scan the administrator's face. |
Required |
Name |
Enter the administrator’s name. |
Required |
Password |
Enter the administrator’s password. |
Optional |
Confirm password |
Confirm the administrator’s password. |
Optional |
▲ Up to 10 administrators can be add to each terminal. ▲ The administrator of the cloud version terminal administrator needs to be issued by the cloud platform.
After entering the welcome page, check the checkbox of 'Read the Service Agreement & Privacy Policy' and then click on 'Start to use'.
On the recognition interface of the terminal, swipe up from the bottom of the screen to view the operation icons.
Click on the icon in the red box in the picture above to open the terminal administrator login interface.
Registered administrator can log in to the terminal via two methods: 'Face Recognition' or 'Password'.
After logging in successfully, it will proceed to the settings interface.
Logging in to FaceOffice can assist users to remotely operate the terminal and view various data.
Step1: Enter the FaceOffice login address in the address bar of the browser: http(s)://DEVICE_IP:8081,
DEVICE_IP can be obtained from the terminal by viewing the running status, for example, http://192.168.189.198:8081
Step2: If the browser prompts 'Your Connection is Not Private', click on 'Advanced' > 'Continue to xxx.xxx.xxx.xxx'
(This prompt is normal, and users do not need to worry about the privacy and security issues)
Step3: Enter the administrator's name and password.
Step4: Click on 'Login'
For details, please refer to "6.1 Terminal Authorization Instructions".
Working mode settings are used to set the working mode of the terminal, you can choose 'Temperature Measurement Mode', 'Access mode' and 'Temperature Measurement + Access mode'.
Steps:Setting interface → Management → Mode
Project | Description |
---|---|
Smart Access | Applicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules. |
Privacy | When enabled, the face will not be displayed on the screen during face recognition. |
Temperature Measurement | Applicable to scenarios only require temperature measurement.Unnecessary to import people. |
Temperature Measurement + Smart Access | Applicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules. |
Prior Card/Fingerprint Verification | Non-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified. |
Please select the working mode according to the actual scenario.
Users can also set the working mode in FaceOffice, refer to "3.11.3.3 Working Mode" for details.
Recognition rule settings are used to set the recognition rules for login personnel, including the verification method and effective periods.
You can create, delete, and edit the recognition rules.
Multiple recognition rules can be created for different login personnel.
The terminal provides default recognition rules for quick use; the verification method of the default rule is 'face recognition', and the effective period is all periods.
For the description of the input items of the recognition rules, refer to "3.6 Recognition Rules" for details.
Steps: Settings -- General -- Recognition Rules
▲ When the working mode is 'Temperature Measurement Mode', there is no need to set recognition rules.
Users can also set it in FaceOffice, refer to "3.6 Recognition Rules" for details.
Personnel registration is used to register personnels' information during 1:N recognition into the personnel database.
Personnel registration can be performed through the terminal or FaceOffice.
Personnels can be registered individually or imported in batch.
Terminal operation | FaceOffice | |
---|---|---|
Individual login | Yes | Yes |
Batch login | Yes(not recommended) | Yes(recommended) |
▲ After the personnel is registered, the personnel number cannot be modified. If you need to edit the personnel number, you need to delete the personnel and register again. ▲ When the working mode is ‘Temperature Measurement Mode’ there is no need to register personnels.
Refer to the following content for details on input items for individual registration. '6.4 Project description for adding a single person'.
For details, refer to '2.7.4.1 Add Personnel'.
Steps: Settings → Personnel → Add in batch
▲ This operation needs to import the login file via USB, which is not recommended. It is recommended to use FaceOffice for batch login.
Refer to '3.5 Personnel' for details.
The terminal supports two working modes, including single host mode and cloud service mode.
In the single-host mode, the terminal does not need to cooperate with the cloud management platform, but it can be connected to the network, connected with the computers and mobile phones for terminal management. The network topology of single-host mode is as shown.
Both Home and OA are in single host mode.
Single host mode networking diagram
In the cloud service mode, the terminal needs to cooperate with the cloud management platform. The network topology of the cloud service mode is shown in the figure.
4.3''
5.5''
8.0''
10.1''
▲ Disconnect the power of the device when assembling or disassembling the modules
Type | Sample | Dimensions(unit:mm) |
---|---|---|
Temperature Measurement Module (BRD-SE-BFX3, BRD-SE-BFX4) | 159 * 55 * 50 | |
Temperature Measurement Module+Contactless IC Card Reader (BRD-SE-BFX5IC, BRD-SE-BFX6IC) | 159 * 55 * 50 | |
Fingerprint Module + Contactless IC Card Reader (BRD-SE-BF1) | 159 * 55 * 18.5 | |
Contactless IC Card Reader (BRD-SE-BF5S / BRD-SE-BF6S BRD-SE-BF5P / BRD-SE-BF6P) | 159 * 55 * 18.5 | |
Temperature Measurement Module + Contactless Card Reader (FRD-SE-CTB/FRD-SE-HTB FRD-SE-CTW/FRD-SE-HTW) | 159 * 55 * 50 | |
Fingerprint Module + Contactless Card Reader (FRD-SE-CFB/FRD-SE-HFB FRD-SE-CFW/FRD-SE-HFW) | 119.6 * 48 * 18 | |
Contactless Card Reader (FRD-SE-CW/FRD-SE-HW FRD-SE-CB/FRD-SE-HB) | 119.6 * 48 * 18 |
5.5'' & 8.0'' Devices
4.3''&10.1'' Devices
Since there is no RJ45 port on 4.3-inch devices, it is required to use the USB Type-C to Ethernet LAN RJ45 Adapter rather than using Ethernet LAN cable directly.
Recognizable Distance |
25-90cm |
|
Operating mode |
Temperature Measurement Mode, Access mode, Temperature Measurement +Access mode |
|
Verification Method |
1:1, 1/N, 1:1/1:N |
|
Recognition Speed |
Time for per recognition (under 1:N mode) ≤0.3 sec |
|
User Capacity |
10000 users |
|
Operating System |
Android 8.1 |
|
Camera |
Dual wide-angle camera (RGB + NIR) |
|
multi touch |
Support |
|
Tamper alarm |
Support |
|
Operating temperature |
–10° to 55° C |
|
Relative Humidity |
5% to 95% noncondensing |
|
Power Supply |
DC 12V 3A |
|
Communication Method |
Wi-Fi |
Support 2.4 GHz/5GHz, IEEE 802.11a/g/b/n, IEEE 802.11ac |
Bluetooth |
Support Bluetooth 4.1+BLE |
|
Ethernet |
Supported |
|
Power button |
Support |
1. Select the appropriate mounting location and attach the positioning sticker to the mounting location, make holes in the wall and install the switch box in the wall.
2. Fix the back plate bracket to the switch box with two screws (M4*40).
3. Connect the Cable A on the bracket to the corresponding interface of the device (see port description).
4. Attach the device from top to bottom on the bracket.
5. Fix the device and bracket from the bottom with two screws (M2*7, installation completed).
▲Disconnect the power of the device when assembling or disassembling the modules!
W(cm) | H(cm) | L(cm) |
---|---|---|
50 | 130 | 80〜200 |
140 | 90〜210 | |
150 | 100〜220 |
Note: In the Temperature Measurement Mode, the recognizable distance is 30-50cm and the height range is 120-190cm
The terminal has been installed and powered on. For detailed operationinstructions and precautions, please refer to the 'Quick Installation Guide'.
Step | Substep | Description |
---|---|---|
1、 Initialize the terminal | After the uninitialized terminal is turned on, it needs to be initialized before the function setting and use. ▲ The initialization operation only needs to be performed once, and there is no need to repeat the operation after starting up. ▲ The scenarios involving terminal uninitialization include turning on the new machine for the first time and restoring the factory. |
|
Activate the terminal | After the terminal is turned on for the first time, it is necessary to set the basic information of the system and confirm the service agreement and privacy terms. | |
Add terminal administrator. | The terminal administrator (referred to as "administrator") is a role with the highest configuration and management authority of the terminal. The default administrator is not set when the terminal is shipped from the factory, and it needs to be set after the terminal is activated. | |
2、Set up the terminal | Combined with the actual application scene of the terminal, perform function setting and personnel management, and put it into daily use after verification. | |
Setting function | Combined with the actual application scenario of the terminal, set the terminal function. | |
Manage personnel | Combined with the actual application scenarios of the terminal, manage personnel information and data. | |
Verification function | After the function setting and personnel management are completed, the terminal function is verified to ensure that the information displayed on the page and the logical relationship are correct. | |
3、Routine maintenance | After the terminal is put into daily use, daily maintenance is required in case there is an abnormal situation. | |
4、System upgrade | Upgrade the software version of the terminal. |
When the terminal is powered off, press and hold the power button to start the terminal. When the terminal is turned on for the first time, it will enter the activation page.
Step1 When the terminal is powered on, press and hold the power button to open the shortcut dialog box.
Step2 In the shortcut dialog box, click 'Shutdown' to open the "Enter Password" dialog box.
Step3 In the 'Enter Password' dialog box, enter the administrator's password and click on 'OK'.
Step1 When the terminal is powered on, press and hold the power button to open the shortcut dialog box.
Step2 In the shortcut dialog box, click on 'Save Log' to open the 'Log Export' dialog box.
▲ The file system of the USB flash drive must be in FAT32 format. The same below.
▲ The terminal log can be saved on the computer through FaceOffice. (Recommended).
Step3 In the 'Log Export' dialog box, select the export method and click on the 'Export' button.
After the uninitialized terminal is turned on, it needs to be initialized before the function can be set and used.
▲ The initialization operation only needs to be performed once, and there is no need to repeat the operation after powering on.
▲ The scenarios involved for uninitializated terminal include turning on the new machine for the first time and restoring the factory.
For details, refer to '1.3 Terminal Initialization'.
Combined with the actual application scenario of the terminal, perform function setting and personnel management, and put it into daily use after verification.
Registered administrators can log in to the terminal settings page through two methods: "face recognition" or "password".
Step1. On the recognition page, click on or slide the upward arrow at the bottom to view the operation icon.
▲ Operation icons can be customized. For details, please refer to '2.7.2 Set up the home button'.
The operation icons from left to right are
Icon | Description |
---|---|
Doors for opening controls. | |
Used to open the Settings page. | |
Used to open the Personnel page. | |
Used to open the Running Status page. |
Step2. Click on the icon to open the "Administrator Login" page.
The terminal supports two verification methods, "face verification" and "password verification", and the default is "face verification".
Step3. On the 'Administrator Login' page, click on 'Password Verification' at the upper right corner to switch the verification method.
▲ The terminal records the current selected verification method as the default method.
Step4. After the verification is successful, perform the assigned operation.
Step1. On the recognition page, click the extension button on the right side of the screen, or slide to the left to display the operation icon in the button area on the right column and the home screen button setting icon.
Step2. Click on the Home Button Settings icon to open the 'Configure Home Button' page.
Step3. On the 'Configure home screen button' page, adjust the display position of the operation icon on the recognition page, including
the bottom button area and the sidebar button area:
1) In the 'Unselected Button' area, select an icon, click on 'Add to Bottom Area' or 'Add to Sidebar Area' to add the specific button to the assigned area.
2) In 'Add to Bottom Area' or 'Add to Sidebar Area', ctlick on the '×' above the icon to move the specific icon out of the assigned area.
The Settings page of the terminal is shown in the figures below.
▲ For the basic settings of the terminal, it is recommended that you set them through FaceOffice. Refer to ‘3.11 Device Management’ for details
Network settings are used to set the network connection method of the terminal, you can choose 'WLAN' or 'Wired network'.
Steps: Terminal Settings interface → Network
Bluetooth settings are used to connect with external devices via Bluetooth such as a Bluetooth lock.
Steps: terminal settings interface → Bluetooth
▲If the user likes to connect the terminal to other Bluetooth products, please consult our company in advance.
Camera effect settings, which are used to set the lighting effect, fill light adjustment, recognizable distance, and exposure adjustment of the terminal's camera.
Steps: Terminal Settings page → Camera
Grouping | Parameters | Description |
---|---|---|
Face Recognition |
background image of facial recognition | Under the recognition interface, the background area (outside the frame area of face recognition) is displayed in different colors. Enabled by default. |
Face recognition frame | On the recognition interface, a detection frame is displayed around the face. Disabled by default. | |
Face tracking. | After the verification is successful, the registration photo will be displayed. When using this function, you need to set the display mode to media mode. Disabled by default. | |
Recognizable distance. |
Max distance | It is used to set the maximum distance between the face and the terminal in the face recognition scenario. Default value: 100% |
Photo size. |
Registration photo dimension | The minimum pixel limit of imported photos is used to set the minimum pixel allowed when the terminal imports photos to ensure the quality of photos. Including "32×32", "128×128", "320×320" 3 specifications, the default is "320×320". |
Image |
Thermal Image. | Under the recognition interface, a thermal image is displayed on the screen. Disabled by default. |
Near-infrared. |
Under the recognition interface, a near-infrared image is displayed on the screen. Disabled by default. | |
Forehead temperature mode. |
In the Temperature Measurement Mode, the temperature at the center of the forehead of the face is taken as the measured temperature. Disabled by default. | |
Fill lights. |
Brightness of fill light in standby | It is used to set the brightness of the fill light in standby mode. The larger the value, the brighter the fill light. The default is 3%. |
Brightness of recognition fill light |
It is used to set the brightness of the fill light in the face recognition state. The larger the value, the brighter the fill light. The default is 100%. |
|
Verify light duration | It is used to set the duration of the fill light in the face recognition state. The larger the value, the longer the lighting time of the fill light. The default is 3 seconds. |
General settings are used to set the general information, rules and personnel of the device.
Steps: Terminal settings interface → General settings
Options | Description | |
---|---|---|
About | It is used to view the basic information of the terminal.The device name supports customization. Enter the device name in the name column and click "Save" to change the device name. | |
Firmware Update | Used for system updates. See 3.11.2.4 for details | |
Date&Time | 24-Hour Time | The format of the time. When turned on, the time will be displayed in 24-hour format. Disabled by default. |
Date Format | Set the format for date display. | |
NTP Server Synchronization | Used to set whether to automatically synchronize system time through the time server.When it is turned on, the date and time are synchronized with the specified time server;When it is turned off, the date and time need to be set manually. | |
NTP Server | Set the address of the NTP server when ‘NTP Server Synchronization’ is enabled. | |
Time Zone | Used to set the time zone of where the terminal is located. | |
Date | Set the date when ‘NTP Server Synchronization’ is off. | |
Time | Set the time when ‘NTP server synchronization’ is off. | |
System Language | Used to set up the terminal system language.The terminal supports 18 languages, | |
Sound | Used to turn the terminal on/off is enabled by default | |
Volume | Used to set the volume level when ‘Sound’ is on. | |
Brightness | Used to set the brightness of the terminal screen. | |
Recognition Rules | It is used to set the verification method and authority of personnel in different time periods. Refer to ‘3.6 Recognition Rules’ for details. | |
Device Rules | Used to set the period for the terminal to grant or deny access. A single device rule can be set for multiple periods. | |
Personnel | Used to add and manage personnel information. For details, refer to ‘1.9.1 Logging in Personnel Using Terminal Operations’ | |
Administrators | Used to add and edit the administrator’s information. | |
restart | Used to reboot the device | |
Factory Reset | After factory reset, the device restarts and automatically enters the initialization process. ▲ After restoring the factory, all data will be cleared, including system logs, personnel data, etc. Please back up the data in advance. | |
Reset Device | Restore all settings and data to the state after initialization. |
Management, which includes three parts: user interaction, mode, and scenario
Grouping | Options | Description |
---|---|---|
Standby | Standby Message | It is used to set whether to display standby information. Face Mode: Enabled by default. Media mode: off by default |
Line1 Standby Message | It is used to set the welcome message displayed when the terminal is in standby. Display up to 20 characters or 10 full-width text. Default: welcome | |
Line2 Standby Message | It is used to set the welcome message displayed when the terminal is in standby. Display up to 20 characters or 10 full-width text. Default is blank | |
Others |
On-screen Date&Time | It is used to set the date and time display of the standby interface in media mode. Enabled by default. |
Standby Wallpaper | It is used to set the wallpaper displayed when the terminal is in standby. ▲ The file size of a single photo is recommended to be less than 10M. ▲ The image format must be jpg, jpeg, png, bmp. Loop play: It is used to set whether to play the standby wallpaper in a loop. Rotation time: When "Loop" is set to on, it is used to set the time interval of wallpaper rotation. Unit: second |
|
Standby Video | It is used to set the video displayed when the terminal is in standby. | |
Multimedia Mode |
Multimedia Mode |
After it is turned on, the terminal screen only displays the face of the person in the frame when the terminal is performing recognition,. |
Prompt Message |
Used to determine whether to display prompt information during face recognition. Open by default. | |
Window Opacity | Default: 100 (opaque) It is used to maintain the best presentation effect of the idle screen content, please make appropriate settings according to the actual situation. |
|
Window Size |
Adjust the diameter of the floating circular window | |
Prompt |
Text-Display Name |
When the "Smart Access" is turned on, the identified person’s name is displayed on the screen after the verification successful. Enabled by default. |
Text-Display Temperature |
When the ‘Temperature Measurement’ or ‘Temperature Measurement + Smart Access’ is turned on, the temperature is displayed on the screen. Enabled by default. | |
Verification Success Voice Prompt |
Used to determine whether there is a voice prompt when the verification is successful. Enabled by default. | |
Verification Failure Voice Prompt |
Whether there is a voice prompt when the verification fails. Enabled by default. | |
Voice Prompt Audio | The audio file of the voice prompt is the default system file, which can be customized and uploaded by the user. Upload steps: FaceOffice > "Configuration Management" > "Prompt Information" > "mp3 Import" |
Mode settings are used to set the mode of the terminal, you can choose 'Temperature Measurement Mode', 'Access mode' and 'Temperature Measurement + Access mode'.
Steps: terminal settings interface → access control → mode
Project | Description |
---|---|
Smart Access | Applicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules. |
Privacy | When enabled, the face will not be displayed on the screen during face recognition. |
Temperature Measurement | Applicable to scenarios only require temperature measurement.Unnecessary to import people. |
Temperature Measurement + Smart Access | Applicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules. |
Prior Card/Fingerprint Verification | Non-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified. |
To use the Temperature Measurement Mode, the device needs to be equipped with a Temperature Measurement Module.
Advanced Settings
It is used to set various parameters for face recognition and Temperature Measurement.
Steps: Terminal Settings interface → Management → Scenario→ Advanced
|
Parameter | Description | |
---|---|---|---|
Facial Recognition |
1: N Threshold | For details, refer to ‘3.11.3.5 Facial Recognition’ | |
1: 1 Threshold | |||
Repeat Recognition Intervals(s) | |||
Verification Success Display Time(s) | |||
Verification Success Display Time(s) | |||
Temperature Detection Settings |
Temperature Reading | For details, refer to ‘3.11.3.6 Temperature Detection Settings’ | |
Temperature Alarm Threshold | |||
Body Overheating Settings | Access Denied | ||
Access Granted and Record Event |
|||
Dual-camera | |||
Ambient Temperature Compensation | |||
Emissivity | |||
Full Face |
Verification Mode
Steps: terminal settings interface → Management → Scenario →verification mode
The terminal supports three verification modes: "1:1 mode", "1:Nmode" and "mixed mode", and the default is "mixed mode".
Options | Description |
---|---|
1:N Mode | Used to compare the captured face with all registered persons. |
1:1 Mode | It is used to compare the captured face with the corresponding ID photo. |
Hybrid Mode | At the same time, it supports "1:1 mode" and "1:N mode" two verification modes. Default. |
System Extension
Grouping | Parameter | Description |
---|---|---|
Access Records | Refer to ‘3.11.3.16 Access Record’ for details. | |
Verification Sequence | Refer to ‘3.11.3.2 Verification Sequence’ for details. | |
Additional Verification | Refer to ‘3.11.3.9 Addition Verification’ for details. | |
ODSL Settings | ODSL Settings | Used to import configuration file. To import a configuration ;file, it is required to insert a USB flash drive behind the device in advance. |
Delete Configuration | Used to delete ODSL configuration file. | |
Third Party Application | It is used to view third-party apps installed on the terminal and is used with ODSL. It is an advanced function for system expansion. | |
Web-client Management | Refer to ‘3.11.3.16 Web-client Management’ for details. |
Used to set up the connection between the terminal and the Bluetooth lock.
When the terminal links to a Bluetooth lock, the Bluetooth lock will be unlocked after the terminal is successfully identified.
Turn on the Bluetooth of the Bluetooth lock.
Import the lock configuration file into FaceOffice. FaceOffice > Device Management > Configuration Management > Lock pairing file import
▲ The lock configuration file is not imported to the terminal, and which cannot be paired with the Bluetooth door lock.
▲ Wrong configuration file, outdated lock configuration file, or wrong verification password will cause the operation of importing lock configuration to fail.
▲ Importing lock configuration files multiple times will overwrite/void the previous imported lock configuration files.
▲ After factory reset, the imported lock configuration files will be erased.
Select 'Settings' > 'Bluetooth', open the 'Bluetooth' page, and confirm that it is turned on.
On the 'Settings' > 'Bluetooth Lock' page, a list of the MAC addresses of all Bluetooth locks within 2 meters is displayed.
Select the MAC address of the designated Bluetooth lock for pairing.
▲ When the terminal is linked with the Bluetooth lock sold by our company, it is required to import the key file issued by our company.
▲ When the user wants the terminal to be linked with other manufacturers' Bluetooth locks, it needs to be integrated with the Bluetooth lock in advance, please consult our company in that case. It is possible that the integration cannot be performed, so please take note in advance.
Fingerprint Capture is used to collect the fingerprints of new personnel.
Existing personnel needs to add fingerprints in personnel management.
Users who purchase fingerprint modules can use this function.
Click on the fingerprint symbol above.
After the prompt page appears, press your finger vertically on the fingerprint collection module, and move your finger out of the fingerprint collection module after hearing the beep sound.
Enter the personnel's number and name.
Click on the 'photograph' symbol below, and facing the camera for face collection.
Click on 'Save'
▲ To add the second fingerprint, please repeat Step1 and Step2. Each person can register up to two fingerprints.
Dry contact is used to set the control type of the dry contact interface.
Options |
Suboption |
Description |
---|---|---|
Relay |
Open Door | Dry contacts are connected to the access control controller or door lock for controlling the opening of the door |
Alert | The dry contact is connected to the warning light, and the staff can be reminded by lighting the warning light when the verification fails, the temperature is abnormal, and there is no access authority. | |
Signal Duration | It is used to set the time of dry contact signal output. Value range: 200~10000 ms; default value: 2000 ms |
After clicking on 'Open door', the door lock controlled by the device will open for 5 seconds.
▲ For the relevant parameters set by the card reader, the configuration information is provided by the corresponding IC card manufacturer.
Grouping | Parameter | Description |
---|---|---|
Card Reader |
HID Module | Used to choose whether to enable the HID Module ▲ After the HID Module switch is changed, it needs to restart the device to take effect. |
Card Reader Option | Select the card reader type. Support Mifare Classic and Mifare Ultralight | |
KEY MODE | Select a key type. | |
KEY | IC card key. The key is provided by the corresponding manufacturer. | |
Sector | Enter the area code where the data in the IC card is located, the value is 0~15 | |
Block | Enter the segment number of the data segment where the data in the IC card is located. | |
Card Number Length | Enter the card number length. The maximum value is 32. |
For the settings of the HID module, refer to the appendix '6.6 HID module settings' for details.
It is used to control whether the access control connected to the device is in the always open state.
▲ Terminal administrators need to have a basic understanding of the Wiegand protocol.
▲ When the terminal uses the ‘face + access control card’ verification method, it is required to set the access control signal.
Options | Suboption | Description |
---|---|---|
Wiegand |
Used to set the Wiegand type. | |
General |
Used to select a general Wiegand type. Include: 26-bit, H10302 37-bit, H10304 37-bit, Corporate 1000 35-bit, Corporate 1000 48-bit |
|
Customized |
It is used to customize the Wiegand type, including parity, total number of digits, data digits, first even check, and last odd check. | |
Facility Code | Used to choose whether to use the facility code | |
Facility Code | Used to identify facilities. | |
Output |
It is used to customize the encoding of the Wiegand signal output by the terminal in the case of a specific verification result and is used for subsequent targeted secondary development. | |
Pulse Interval |
Used to set the pulse interval of the Wiegand signal. Value range: 100~2000; default value: 1000 us |
|
Pulse Width |
Used to set the pulse width of the Wiegand signal. Value range: 20~400; Default value: 100 us |
|
Invalid Card |
It is used to set the encoding of the output Wiegand signal when the card number is too long. It is limited to scenarios where the verification mode is ‘1:1 Mode’ or ‘Hybrid Mode’. |
|
1:1 Verification Failed |
It is used to set the encoding of the output Wiegand signal when the card number is in the library, but the verification fails. It is limited to scenarios where the verification mode is "1:1 Mode" or "Hybrid Mode". |
|
1:N Verification Successful | It is used to set the encoding of the Wiegand signal output when the face verification is successful. Only applicable to scenarios where the verification mode is ‘1:N Mode’ or ‘Hybrid Mode’. |
|
Card Settings | Mifare Classic and FeliCa are optional. Among them, Mifare Classic provides six types of UID formats: 16-BIT MSB, 16-BIT LSB, 32-BIT MSB, 32-BIT LSB, 40-BIT MSB, and 40-BIT LSB. |
|
Beacon | Settings for linkage with warning lights via terminal RS485 interface Access Granted:Set the time for the warning light to turn on when access granted Access Denied:Set the time for the warning light to be on when access denied |
|
Alarm Interface |
It is used to switch the hardware alarm interface through the software interface. The alarm interface provides two interfaces. Interface 1 defaults to ‘Door Magnetic Status Detection’, and interface 2 defaults to ‘None’. |
▲ To edit the ‘Alarm Interface’, click on ‘Dashboard’ in the menu list on the left, and click on ‘Restart’ to restart the terminal to make the settings take effect.
Select ‘Custom Wiegand Type’ to support editing the following parameters:
Options | Description |
---|---|
Total Bits | Used to set the total number of bits for the Wiegand signal. Value range: 26~80; default value: 80. |
Start of Personnel Code | Default 9 |
End of Personnel Code | Default 24 |
Facility Code | The code used to describe the facility can be defined by the user. |
Start of Facility Code | Used to set the location where the facility code starts. Default 1. |
End of Facility Code | Used to set where the facility code ends. |
Parity Check | It is used to set whether the encoding of the Wiegand signal adopts parity. |
Even parity position | According to the selected parity range, the position of the generated even parity bit |
Even parity start | Used to set the starting position of the even parity bit |
Even parity end | Used to set the end position of the even parity bit |
Odd test position | The position of the generated odd parity bit according to the selected parity range |
Odd parity starts | It is used to set the starting position of sending check digit |
End of odd parity | Used to set the end position of the odd parity bit |
Used to sound an alarm when a terminal is tampered. Enabled by default.
Step1 On the recognition page, select 'Personnel', or select 'Settings'> 'General' > 'Personnel', open the 'Personnel' page, and view the list of existing personnel.
Step2 On the 'Personnel' page, click 'Add Personnel' to open the 'Add Personnel' page.
Step3 Enter the number, name, and other information.
Step4 Click on to collect face.
If the user wants to use fingerprints as one of the verification methods, click on 'Add Fingerprint's below to collect fingerprints.
Fingerprint Capture
Step1 Click on the fingerprint symbol on the top.
Step2 After the prompt page appears, press your finger vertically on the fingerprint collection module, and move your finger out of the fingerprint collection module after hearing the successful prompt sound of "di------".
▲ To add the second fingerprint, please repeat Step1 and Step2. Each person can register up to two fingerprints.
Please refer to the following for the input items when adding a person individually. '6.4 Project description for adding a single person'.
Step1 Select the person to edit from the person list to open the 'Personnel Details' screen.
Step2 Edit related items on the 'Personnel Details' screen and click on 'Save' to complete the editing.
▲ Once the personnel are added, the personnel number cannot be edited.
If you want to edit the personnel number, you need to delete the personnel and register again.
Step1 Select the person to edit from the person list to open the 'Personnel Details' screen.
Step2 Click on the 'Delete' button on the upper right corner of the 'Personnel Details' screen to delete the personnel information.
▲ Recognition rules will not be deleted when personnel are deleted.
▲ It is recommended to use FaceOffice to add personnel in batch, refer to '3.5.2 Add in Batch' for details.
Step1 Copy the personnel list to a USB flash drive for backup.
▲ The personnel list file only supports Excel files, and the file size must be less than 50M. ▲ The maximum number of personnel imported at a time must be less than 10,000.
Step2 On the recognition page, select 'Personnel', or select 'Settings' > 'General' > 'Personnel' to open the 'Personnel' page.
Step3 On the 'Personnel' page, select 'Add in Batch' to open the 'Select Recognition Rules' page.
Step4 On the 'Select Recognition Rules' page, set the recognition rules uniformly for the personnel added in batch, and click on 'Next' to open the 'Import Personnel List' page.
Step5 On the 'Import Personnel List' page, specify the file and click on 'Next' to open the 'Select the folder where the photos are located' page.
Step6 On the 'Choose Folder for Photos' page, specify the folder where the photos of the person are located.
▲ If you do not want to upload personnel photos, you can choose an empty folder.
▲ The name of the photo in the personnel list template needs to be in one-to-one correspondence with the file name of the picture.
Step1 On the recognition page, select 'Personnel', or select 'Settings' > 'Personnel' to open the 'Personnel' page.
Step2 On the 'Personnel' page, click the 'Delete' button to delete all personnel.
▲ The recognition rules will not be deleted when clearing personnel.
Step1 On the recognition page, select 'Personnel', or select 'Settings' > 'General' > 'Personnel' to open the 'Personnel' page.
Step2 On the 'Personnel' page, slide the page up and down to browse the personnel list.
Step3 In the personnel list, click on a person to view the detailed information of the specified person.
Step4 On the 'Personnel' page, click the 'Search' button to open the search page.
Step5 Select search criteria, enter information, and click on Search.
After completion of setting up the terminal and personnel management, a verification on functions is required to ensure that the information displayed on the page and the logical relationship are correct.
After the terminal is put into daily use, daily maintenance is required in case there is an abnormal situation.
The terminal abnormal alarm information is shown in the following table:
Alarm Information | Alarm Description |
---|---|
Storage exception. | When the available space of the terminal local storage is less than 15%, a prompt icon will be displayed in the upper right corner of the terminal screen, and the recognition records will be automatically scrolled and cleared. |
The camera is damaged. | When the camera fails, a prompt message will be displayed on the upper left of the standby page: camera not found, please check the terminal. |
Tamper Alarm | When the hanging terminal is tampered, an alarm will sound. On the recognition page, select ‘Settings’ > ‘Advanced’, turn off the ‘Tamper Alarm’ switch, and turn off the alert. ▲ Only applicable to hanging terminals |
Network failure. | When the terminal is not connected to the cloud management platform due to network failure, the disconnection icon will be displayed in the upper right corner of the standby page. ▲ Only applicable to cloud service model. |
Personnel issued. | When importing data from the cloud management platform, the upper left corner of the standby page displays the percentage of the download progress. ▲ Only applicable to cloud service model. |
On the recognition page, select 'Running Status' to open the 'Running Status' dialog box.
In the 'Running Status' dialog box, you can view the terminal's 'CPU usage', 'Memory usage', 'CPU temperature', 'Light brightness', the IP address used to log in to FaceOffice on the PC, and the QR code used to log in web management on mobile phone.
Options | Description | |
---|---|---|
View terminal information | ‘2.7.3.4 General’ | |
Reboot | ‘2.7.3.4 General’ | |
Factory Reset | ‘2.7.3.4 General’ | |
Restore default settings | ‘2.7.3.4 General’ | |
Data |
Export personnel data | ‘2.7.5.1 Export Personnel Data’ |
Import personnel data | ‘2.7.5.2 Import Personnel Data’ | |
Export access records | ‘2.7.5.3 Exporting Access Records’ | |
Clear recognition records | ‘2.7.5.4 Clearing Authentication Records’ |
Step 1 Enter the FaceOffice login address in the address bar of the browser: http(s)://DEVICE_IP:8081,
DEVICE_IP can be obtained in the terminal to view the running status, for example https://192.168.189.198:8081
Step 2 If the browser prompts 'Not a private connection', click on 'Advanced' > 'Continue to xxx.xxx.xxx.xxx'
(This prompt is normal, and users do not need to worry about privacy and security issues)
Step 3 Enter the administrator's name and password.
Step 4 Click on 'Login'
OA
HOME
Cloud
After logging in, the left menu bar is in the 'closed' state by default. Click on the '' icon on the left side of 'Dashboard' to control the contraction of the left menu bar.
Different versions of FaceOffice have different functions available. See the table below for details. Among them, '×' indicates that there is no such function, and '√' indicates that this function is available.
Main menu | Secondary menu | Description | Home | Cloud | OA |
---|---|---|---|---|---|
Dashboard |
Dashboard |
View attendance data, document application, equipment status, operating equipment restart, etc. |
√(Only device status) |
√(Only device status) |
√ |
Calendar |
View records according to different time dimensions |
× |
× |
√ |
|
Personnel&Organization | Personnel | View, edit, add and delete personnel information | √ | √(Read Only) |
√ |
Organization | Edit, add or delete organizational structure | √ | √(Read Only) | √ | |
Recognition Rule | Recognition Rule | Set verification methods and permissions for different periods | √ | × | √ |
Record |
Access | View the records of successful and failed permission verification | √ | × | √ |
Attendance | View and manage attendance records | × | × | √ | |
Submission | Process leaves and overtime applications, view document records | × | × | √ | |
Leave | View leave records | × | × | √ | |
Attendance |
Shift | View, edit, add and delete shift information | × | × | √ |
Overtime | Select the type of overtime that employees are allowed to apply for | × | × | √ | |
Leave | View and manage public holidays and holiday types | × | × | √ | |
TV | Add, delete, view sign-in panel | × | × | √ | |
FaceRing |
FaceRing | Check FaceRing's online status | × | × | √ |
FcaeUI |
FaceUI | Change your device's wallpaper, UI mode, etc. | × | × | √ |
Device | Administrator | Add and delete administrators | √ | × | √ |
Configuration |
Upload various configuration files and download logs, etc. |
√ | √ | √ | |
Device | Manage basic information of devices and parameters of various functions | √ | √ | √ | |
Device Group | Unified management of other devices on one device. | √ | × | √ |
For a device with the device group function enabled, there are only Dashboard, Personnel and Organizations, Recognition Rule, and Device if the role is a slave device.
When the main menu is in the collapsed state, the second-level menu will be displayed when the mouse moves and hovers over the first-level menu icon.
After login successfully, the dashboard is displayed by default.
The Dashboard of normal device, master device, and slave device are different.
Click the number under 'Today' to jump to the "Attendance" page.
Click under 'Pending Application' to jump to the 'submission' page.
Device status bar, check the basic information of the device, and control the device to 'open door', 'restore', 'always open' and 'restart'. For master devices, you can view and select slave devices.
Today's event is used to visually display the attendance data of the day.
The 'calendar' is used to view various records, which can be viewed from four dimensions: day, week, month, and year. Click on the icon on the calendar to view the corresponding records.
Click on the corresponding icon to display specific information. Click on 'Export Data' to generate the data as an Excel file.
The terminal has one and only one root organization by default, whose name is 'FaceSec'; it can be changed to your root organization's name, and it is recommended to use the company abbreviation.
Under the root organization, you can add more sub-organizations without limitation; click on 'Add' after an organization name, and the new organization will be a sub-organization of this organization.
Step 1 Click on at the far right of the organization name.
Step 2 Enter the organization's name.
Step 3 Click on 'OK'
Step 1 Move the mouse over the name of the organization and click on the '' that appears on the right
Step 2 Edit the organization name
Step 3 Click on 'OK'
Click on '' after the organization name to delete the organization (except the root organization)
Note: If there are personnel in the organization you plan to delete, those people will be moved to the root organization after the organization is deleted.
For details on inputting items for adding a single person, refer to the following content:
'6.4 Project description for adding a single person'.
Step1 Click on 'Add Personnel'
Step2 Upload photos and fill in required information. The personnel number, personnel name, and organization are required to enter. Single personnel can belong to multiple organizations. If no organization is selected, the personnel will be assigned to the root organization by default.
Step3 Click on 'Submit'
▲ The personnel number cannot be edited later, please fill in carefully. The personnel number can be used again after the personnel is deleted.
Please refer to '6.5 Photo Quality Requirements' for requirements of uploading photo.
Step 1 Click on 'Add in Batch', click on 'Download Template' to download the file to the local. Fill in the personnel information according to the format requirements in the file. Among them, the personnel name, personnel number, and department are required to be filled in.
Step 2 Import personnel information file as Excel.
Step 3 Import personnel's photos file. The file name and file format of a single person's photo must be consistent with those filled in the personnel information file. The format of the person's photo supports JPG and JPEG formats. Compress all personnel photos directly into a ZIP format file.
Step 4 Select the recognition rule and click on 'import'
Step 1 Click on the 'Personnel Export' button, and the system will generate a file named 'export.zip'.
Step 2 Download and decompress the file, where person.xlsx is the exported personnel information table. The time of exporting the file increases as the number of personnel increases.
If you need to edit personnel information, click on the 'Edit' button to make the changes. Note that the personnel number cannot be changed.
Recognition rules are used to set the verification methods and permissions of personnel in different periods.
Option | Description |
---|---|
Rule name | Name the rule. |
Description | Describe the rule. |
verification method. | How people are verified when they pass through the device. |
Time Rules. | Set the period for the rule to take effect. |
Verification Method.
For details, refer to '6.2 Verification Method Description'
Time Rules
Options | Description |
---|---|
Name. | Name the time rule. |
Weekdays. | Choose which days of the week the rule will be effective. |
Effective time. | Choose which periods during the day the rule will be effective. |
Access / Print | Choose whether Personnel are granted access or printing during the effective time of the rule. |
Step 1 Click on 'Add Recognition Rules'
Step 2 Fill in the rule name, description, verification method, and add time rules. Multiple time rules can be added to one recognition rule.
Step 3 Click on 'Confirm'
In the permission record, you can query the personnel access record, clear the access record, and export the access record
Search:
Step1 Enter the search conditions at the top of the page. You can search by name, recognition result, time individually, or in combination.
Step2 Click on 'Search'. The search results will be displayed on the page.
Clear records:
Step1 Click on 'Clear Records'
Step2 Click on 'Confirm'
Export:
Step1 Click on 'Export' to download the zip file.
Step2 Unzip the zip file, which includes the file .(as an excel table) of authority records, personnel registration photos, snapshot photos, and near-infrared photos (the "Near-Infrared Photo" must be enabled in "Device Management->Recognition Records")
Automatic Refresh
Click on the ''icon at the upper right corner to set an automatic refresh interval.
Configure the header
Click on the ''icon at the upper right corner to hide/show or re-order the columns.
Attendance Records show personnel's attendance records, attendance status, overtime status, and leave status.
Search record:
Step1 Enter query conditions at the top of the page. You can search by name, personnel number, shift type, and shift name. Click on the '' symbol at the upper right corner to filter attendance status and check-in date. Click on 'Reset' to clear all query conditions.
Step 2: Click on 'Search'. The results will be displayed on the page.
Step 3: View the search results. Scroll the bar at the bottom of the table to view more information or click on the 'Details' button to view details.
Edit attendance record:
Click on 'Edit' button to edit the clock in / clock out time of the personnel, and click on 'OK' to save.
Export Attendance Report
Click on 'Export' button to download the Excel file.
Search record:
Step1 Enter the query condition at the top of the page. You can filter by personnel number, name, organization, and attendance options, and click on the symbol '' at the upper right corner to filter thedate. Click on 'Reset' to clear all query conditions.
Step2 Click on 'Search'. The search results will be displayed on the page.
Delete Record:
Click on 'Delete' > 'OK' after each record.
If an application is deleted, the application will be invalid.
pending application:
Administrators can click on 'Edit' to edit application information or click on 'Approved' or 'Reject' to process applications. The processed applications cannot be edited.
Leave Records show personnel's leave status and number of days of leaving.
Search leave records
Step1 Enter the query conditions at the top of the page. You can filter by name, personnel number, organization, and click on the symbol'' at the upper right corner to filter the holiday type and date. Click on 'Reset' to clear all query conditions.
Step2 Click on 'Search'.
Query shift:
Enter the shift name or select whether it is an overtime shift and then click on 'Search'.
Edit shift:
Click on 'edit' button after the shift, edit the parameters, and click on 'Confirm'.
Delete shift:
Click on 'Delete' button after the shift and click on 'Confirm'.
Create shift:
Step 1: Click on 'Create Shift'.
Step 2: Enter the shift name and other information, and then click on 'Confirm'.
Step 3: The shift is created successfully.
Standard Shift
Flexible Shift
|
Standard | Flexible |
---|---|---|
Shifted Name | Fill in the shift name. | |
Shift Type | Standard:Required to clock in and out under the restricted timing. Flexible:Do not required clock in and out under the restricted timing and calculating total attendance duration weekly supported. |
|
Weekdays | Select the days of the week to work | |
Working Period from |
Set start time for shifts | ‘The earliest clocking in time’ - extra duration does not count in the attendance duration if clocking in time is earlier than the earliest clocking in time. |
Working Period to |
Set end time for shifts | ‘The latest clocking out time’ - extra duration does not count in the attendance duration if clocking out time is later than the latest clocking out time. |
Public Holiday |
Set public holidays as weekdays or off days | |
Organization |
Select the organizations corresponding to this shift. | |
Break Time | Set daily break time. (Break time is not counted in working hours); | ---------------------------------------------------------- |
Overtime | Whether to allow overtime for that shift. The overtime hours can be set as fixed or flexible. Flexible overtime means that the time is calculated according to the time applied on the overtime application form, or according to the actual time of clocking out from work. | ---------------------------------------------------------- |
Segment clock in | Need to clock in every period, and then set clock in interval. | ---------------------------------------------------------- |
Attendance Time | The total hours of attendance per day. |
---------------------------------------------------------- |
Weekly Working Hours | ----------------------------------------------------------------------------------------- |
The total attendance duration needs to be satisfied for every week. |
Daily Working Hours | ---------------------------------------------------------------------------------------- |
The minimum or maximum attendance duration for every day. |
▲ The regarding attendance records will be displayed on the last working day after setting up the total attendance duration for every week. The daily attendance records will not be generated if clocking in / out on off days.
Step 1: Click on 'Attendance Settings'.
Step 2: Enter the parameters.
Step 3: Click on 'Submit'.
Options | Description |
---|---|
Flexible Clock in & out | Refers to allowing employees to clock in late or clock out early outside of their required working hours. For example, if a shift's working hours are from 9:00 to 10:00, with a flexible clock in / out time of 10 minutes, clocking in before 9:10 and after 8:50 are both considered as valid and will not be counted as late or leaving early. |
Late clock in as absence | After checking this option, it is required to set a duration for late clocking in, which can be set to be half-day or full-day absence. |
Early clock out as absence | After checking this option, it is required to set a duration for early clocking out, which can be set to be half-day or full-day absence. |
Overtime on weekdays, off days, public holidays option is enabled by default, it is not allowed to apply for this type of overtime after the option is disabled.
Set weekly working days and off days and select public holidays according to specific country / region; it is also allowed to manually set off days and public holidays.
Off Day Management
Step1 Check the off days for each week.
Step2 If there are special dates, click on 'Add Adjustment'.
Step3 Select the date and choose to set it to an off day or workday.
▲ After an off day is selected, it is not allowed to choose that day as a workday in a shift. The newly set off day will not affect past shifts.
Public Holiday Settings
Step 1: Click on 'Select' and choose country / region. The public holidays for the country / region will be displayed below.
Step 2: Delete unnecessary holidays. Click on 'Add Public Holiday' to set dates and name for the holiday if it is needed to add other holidays.
Step 3: Click on 'Submit'.
In this page, it is possible to manage the holiday types.
To enable a type of holiday, click on the seventh column of the table to enable it.
To edit an existing holiday, click on 'Edit', edit the information, and click on 'Submit'.
To delete an existing holiday, click on 'Delete' > 'OK'
Add a new type of holiday:
Step 1: Click on 'Add', enter the information.
Step 2: Click on 'Submit'.
Step 3: Choose whether to enable the holiday type.
Parameters of holiday type:
Options | Description |
---|---|
Type | Holiday name |
Minimum Duration | The minimum duration of each holiday. |
Include Off Days | Determine whether to include off days. |
Attendance Calculation | Determine Whether to included holiday in attendance. |
Step 1 Click on 'Add TV' > 'Dashboard'.
Step 2 Enter the dashboard theme and select 'Attendance Dashboard' as the dashboard type.
Step 3 Select the dashboard background or click on '' to upload a local image.
Step 4 Click on 'Create'.
Click on 'Open Dashboard' to display all personnel's face recognition records for the day, which are displayed as the registration photos of personnels who clock in via face recognition. Click on the full-screen icon at the upper left corner of the logo to enter full-screen mode.
Click on 'Copy Link' and anyone can view the content of the dashboard through the link.
Used to display the online status of personnel of FaceRing.
Double-click on the .exe file and follow the prompts to install it step by step until the installation is complete.
After installation, the desktop icon will be displayed.
▲ If the device changes the network protocol, such as changing from HTTP to HTTPS, it is required to restart FaceRing before using it.
Step 1 Launch FaceRing and enter the terminal's IP.
Step 2 Enter the ID of personnel on the terminal and FaceRing password, then click on 'Login'.
Step3 After log in successfully, you can use FaceRing on the terminal to video intercom with personnel.
When logging in FaceRing for the first time, you will be recommended to change the password. You can choose whether to change it or not.
Click on 'Call log' on the home page to view the call log, including answered and missed calls.
Click on 'Configuration' to enter the configuration page, on which you can edit the IP address, enable automatic login, and verify the password when opening the door.
Click on 'Attendance' to view attendance status
Apply for overtime:
Step1 Click on 'Attendance' > 'Overtime' > 'Apply for overtime.
Step2 Fill in overtime hours, shifts, overtime type, start and end time, reason for overtime.
Step3 Click on 'Apply'
After the applied successfully, the status of the application will be displayed, and the administrator can approve it in 'FaceOffice' > 'Records' > 'Document Record'.
Yellow icon indicates that the application is waiting for approval, green icon indicates that the application has been approved, and red icon indicates that the application has been rejected.
Apply for leave:
Step1 Click on 'Attendance' > 'Overtime' > 'Apply for leave'.
Step2 Fill in the leave type, start and end time, reason for leave.
Step3 Click on 'Apply'.
After the applied successfully, the status of the application will be displayed, and the administrator can approve it in 'FaceOffice' > 'Records' > 'Document Record'. Yellow icon indicates that the application is waiting for approval, green icon indicates that the application has been approved, and red icon indicates that the application has been rejected.
Step1 Click on 'Change Password'
Step2 Enter the current password.
Step3 Enter the new password.
Step4 Click on 'Submit'
▲ Changing the login password can also be done in 'FacesecOffice' →'Organization Management' → 'Personnel' →'Edit Personnel Information'.
Logo Change Logo
Click on 'Upload Image' and select a file.
Change Wallpaper
Click on another wallpaper image on the page and the wallpaper of terminal will automatically switch to it. To use other wallpapers, click on the "+" at the end of the wallpaper list and upload a new wallpaper, click on it.
The UI Function Mode is used to set the functions of the terminal's home page UI, including 'application mode' and 'access mode'.
In 'application mode', applications can be displayed directly in forms of icons.
On the left side, you can choose which applications to display and configure them.
Attendance, there are four sub-functions that can be enabled or not, including clock-in, clock-out, going out, and returning.
Visitor, used to perform video intercom between terminals and personnel via FaceRing.
Access / Print, used to verify whether the personnel have access / print permission.
Doorbell, used to make a one-click call on the terminal.
Device Setting, used to open the door, open the Setting page or Personnel page, and check the device status.
▲ Only one of Access and Print can be enabled. When you are editing the recognition rules, please confirm which function is enabled on the terminal.
For detailed instructions on using the applications, please refer to "4 Interactive".
Face recognition / card reader, as the default access mode, automatically sensing personnel to initiate the comparison process.
This page is used to display administrator's information. You can add, edit, and delete the administrator.
Add new administrator:
Step1 Click on the 'Add Administrator' to enter the 'Add Administrator' interface.
Step2 Upload a portrait of the administrator, enter the administrator's name, and set a password (4 digits only).
Step3 Click on 'Submit'
Delete administrator:
Step1 Click on 'Delete'
Step2 Click on 'Confirm'
Options | Description |
---|---|
Photo | Click on the camera icon to scan the administrator's face. |
Name | Enter the administrator’s name. |
Password | Enter the four-digit password. |
▲ Up to 10 terminal administrators can be registered in one terminal.
Configuration management is used to import and export various files of the terminal, including:
Operation | Scenario |
---|---|
Import/Backup Settings File | Used to set multiple terminals with the same parameters: 1) Pre-set a terminal, such as terminal A. 2) Export the setting file (XML) of terminal A. 3) Import the setting file (XML) to other terminals. |
Import/Export Prompt Message | Used to modify the prompt message of the terminal: 1) Export the prompt information (JSON) of the terminal. 2) Edit the prompt information (JSON). 3) Import the prompt information (JSON) to the terminal and overwrite the original prompt information. |
Import MP3 | Used to import user-owned MP3 audio files to the terminal when the prompt information is set to "MP3 Prompt" to replace the default audio. |
Export/Clear Logs | Used to export and clear terminal logs to release storage space. |
Import Upgrade Package | Used to upgrade the terminal system version and import upgrade packages to the terminal. |
Export/Clear Test Logs | Used to export and clear test logs to release storage space. This function is not usually used by users. |
Import Authorization File | Used to import authorization files to upgrade the number limitation of terminal personnel or enable Temperature Measurement Mode. ▲ For detailed information about terminal authorization files, please refer to ‘6.1 Terminal Authorization Instruction’ |
Import Resource Files | Advanced function, rarely used by users. |
Import Pictures/Videos | Used to import advertising pictures/videos with brand information to be played when the terminal is in standby mode or during recognition. To play during recognition, the terminal must be set to media mode. |
Import Process Customization Files | Used to customize the recognition process of the terminal. An advanced function for system expansion. |
Import Bluetooth Lock Pairing Files | Used to control the Bluetooth locks when the terminal and Bluetooth locks are connected. |
▲ When importing and exporting large files such as upgrade packages, videos, and logs, the waiting time may be too long. It is recommended to use a computer to import.
Export Setting file
Prerequisites: Setup for Terminal A has been completed.
Click on 'Backup Device Settings', and the browser will prompt you to download 'bbox_settings.xml' to local device.
▲ The terminal settings file can be edited by using a text editor.
Import setting file
Prerequisites:
The settings file of Terminal A has been exported to the computer.
Login to Terminal B's web management page.
Step 1 Click on 'Device Management' > 'Configuration Management' > 'Import Settings File' to open the 'Import Settings File' page.
Step 2 On the 'Import Settings File' page, click on 'Choose File' to specify Terminal A's exported settings file.
Step 3 Click on 'Import' to import Terminal A's settings to Terminal B.
Export prompt information
Prerequisite: Smart prompt information has been importe
▲ The default prompt information cannot be exported.
Click on 'Device Management' > 'Configuration Management' > 'Export Prompt Messages' to automatically download the terminal's prompt message file to local device.
Import prompt message
Step 1: Click on 'Device Management' > 'Configuration Management' > 'Import Prompt Messages' to open the 'Prompt Messages' page.
Step 2: On the 'Prompt Messages' page, click on 'Choose File' to specify the prompt message file.
▲ The prompt information file is in JSON format.
voice export
Click on 'Voice export' to download the voice file.
▲ The default prompt voice cannot be exported.
voice import
Step 1: Click on 'Device Management' > 'Configuration Management' > 'Voice Import' to open the 'Voice Import' page.
Step 2: On the 'Voice Import' page, click on 'Choose File' to specify the MP3 files for the following three scenarios:
Verification successful prompt message;
Verification failed prompt message;
'Please place your ID in the sensing area' prompt message;
'Normal temperature' prompt message;
'Abnormal temperature' prompt message;
'Please aim at the camera to re-measure temperature' prompt message;
'Current time prohibits passage' prompt message;
'You do not have access permissions' prompt message.
Export logs
Click on 'Download Logs' to pack and download the terminal logs to local device.
▲ The download process may take time according to the log size.
Clear logs
Prerequisite: Terminal logs have been exported to the local device.
▲ Clearing logs is irreversible, please be careful.
▲ Before clearing the logs, export a backup of the logs.
▲ Logs will also be cleared when restoring the terminal to factory settings.
Clicking on 'Clear Logs' will delete the existing logs directly.
Prerequisites: Contact technical support to obtain the upgrade package, whouse name is "software_version_number.zip".
Click on 'Import Upgrade Package' and select the upgrade package.
Step 1 Click on 'Device Management' > 'Configuration Management' > 'Software Update'.
Step 2 Click on 'Import Upgrade Package' > 'Choose File' and select the zip upgrade package that has been obtained in advance.
Step 3 Wait for the system to read and verify, then the package will be imported automatically.
Step 4 After the upgrade package is successfully imported, the terminal will automatically upgrade and restart.
▲ As the upgrade package file size may be large, it is recommended to import it from a computer.
▲ During the terminal upgrade process, the terminal web management tool will be disconnected from the terminal, and it will not be accessible temporarily. After the terminal upgrade is completed, the connection will be restored, and the webpage can be accessed again after refreshing.
Functions that are not for users, the description is omitted.
Prerequisites: Authorization services and authorization file are purchased and obtained respectively. This mainly aims to authorize the maximum number of registered photos of personnel in the terminal.
Click on 'Import license' and select the license file.
Step 1 Click on 'Device Management' > 'Configuration Management' > 'License'.
Step 2 Click on 'Import license' and select license file.
Step 3 Wait for the system to import the file automatically.
Functions that are not for users, the description is omitted.
Import Image
Step 1: Click on 'Device Management' > 'Configuration Management' > 'Standby Page'.
Step 2: Click on 'Image Import' > 'Choose File' to specify the image or image's zip package.
Step 3: Wait for the system to read the file automatically.
▲ The file size of a single image should be less than 30M.
▲ The number of images uploaded for one time should be less than 30.
▲ Image formats in jpg, jpeg, png, and bmp are supported.
Import Video
Step 1: Click on 'Device Management' > 'Configuration Management' > 'Standby Page'.
Step 2: Click on 'Video Import' > 'Choose File' to specify the video or video's zip package.
Step 3: Wait for the system to import the file automatically.
▲The total capacity of video files that the terminal can import is 1GB.
▲ The file size of a single video should be less than 1GB.
▲ The video format supported is mp4.
▲ The recommended aspect ratio for materials is 9:16.
Click on 'Process Customize File Import' > 'Select File' and specify the process customization file.
Step 1 Click on 'Device Management' > 'Configuration Management' > 'Custom Verification Sequence'.
Step 2 Click on 'Process Customization File Import' > 'Select File' to specify the process customization file.
Step 3 Wait for the system to import the file automatically.
Click on 'Lock Pair File', 'Select File' to select the Bluetooth lock pairing file and enter the Verification password.
Step 1: Click on 'Device Management' > 'Configuration Management' > 'Lock Pair File'.
Step 2: Click on 'Import Lock Pair File' > 'Select File' to select the Bluetooth lock pairing file and enter the Verification password.
Step 3: Click on 'Import'.
▲If the verification password is incorrect, the file cannot be imported.
▲ The Bluetooth lock pairing file and verification password are provided as accessories when the user purchases the Bluetooth lock.
In the 'Device Management', various functions of the device can be configured.
'About' is used to view basic information of the terminal.
The device name can be customized. Enter the device name in the name column and click on 'Save' to change the device name.
Options | Description | |
---|---|---|
Date & Time |
24-Hour Time | The format of the time. When turned on, the time will be displayed in 24-hour format. Disabled by default. |
Date Format | Sets the format for date display. | |
NTP Server Synchronization | Used to determine whether to automatically synchronize system time through NTP server. When enabled, the date and time are synchronized with NTP server; When disabled, the date and time need to be set manually. |
|
NTP Server | Set the address of the NTP server when ‘NTP Server Synchronization’ is enabled. | |
Time Zone | Used to set the time zone of terminal located. | |
Date | Set the date when ‘NTP Server Synchronization’ is disabled. | |
Time | Set the time when ‘NTP server synchronization’ is enabled. |
Grouping | Options | Description |
---|---|---|
Multimedia Mode |
Face Mode | Set by default. When person detected, the interaction of the comparison is displayed in full screen. |
Media Mode | When person detected, a small circular window hangs on screen to display the interaction of the comparison. | |
Standby |
Standby Message | It is used to set whether to display standby information. Enabled by default. |
Line 1 Standby Message | It is used to set the welcome message displayed on screen when the terminal is in standby mode. Display up to 20 characters or 10 full-width text. Set as ‘Welcome’ by default. | |
Line 2 Standby Message | It is used to set the welcome message displayed on screen when the terminal is in standby mode. Display up to 20 characters or 10 full-width text. Set as blank by default. | |
On-screen Date & Time | It is used to set the date and time display of the standby interface. Enabled by default. | |
Multimedia Mode |
Prompt Message | It is used to determine whether to display prompt message during face recognition. Enabled by default. |
Window Opacity |
Default: 100 (opaque) It is used to maintain the best presentation effect of the idle screen content, please make appropriate settings according to the actual situation. |
|
Window Size | Adjust the diameter of the floating circular window | |
Prompt |
Display Name | When the "Smart Access" is turned on, the identified person’s name is displayed on the screen after the verification successful. Enabled by default. |
Display Temperature | When the ‘Temperature Measurement’ or ‘Temperature Measurement + Smart Access’ is turned on, the temperature is displayed on the screen. Enabled by default. | |
Verification Success Voice Prompt | Used to determine whether there is a voice prompt when the verification is successful. Enabled by default. | |
Verification Failure Voice Prompt | Whether there is a voice prompt when the verification fails. Enabled by default. | |
Voice Prompt Audio | The audio file of the voice prompt is the default system file, which can be customized and uploaded by the user.Upload steps: FaceOffice > "Configuration Management" > "Prompt Information" > "mp3 Import" |
Working mode is used to set the working mode of the terminal.
Project | Description |
---|---|
Smart Access | Applicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules. |
Temperature Measurement | Applicable to scenarios only require temperature measurement.Unnecessary to import people. |
Temperature Measurement + Smart Access | Applicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules. |
Privacy | When enabled, the face will not be displayed on the screen during face recognition. |
Prior Card/Fingerprint Verification | Non-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified. |
▲ To use the temperature detection function, it needs to be equipped with a Temperature Measurement module.
Access records are used to set the storage and transmission of recognition records, making it easier for testers to obtain necessary information.
Options | Description |
---|---|
Near-infrared Photos | Used to determine whether to enable near-infrared photos. Enabled by default. When enabled, recognition records include near-infrared photos. |
Image File Format | Used to set the size of the recognition image. Available options: Standard, Economy ▲ Restart the terminal to apply changes. ▲ The size of the snapshots affects the consumption speed of the terminal storage, choose the best option based on actual scenario. |
Record Transfer | Interface for setting up the transfer of access records to third parties. Disabled by default. |
Record Tranfer is one of the ways to link with other systems. When a recognition record is generated, it will be pushed to a pre-configured receiving server. After the server receives the pushed information, it will proceed with the next step of customized business processing.
Options | Description |
---|---|
Record Transfer | It is used to determine whether to enable access record transmission. Enabled by default. |
Communication Protocols | When ‘Recognition Record Transmission’ is enabled, it is used to display the communication protocols ws (WebSocket) and http used for recognition records transmission. WebSocket is set by default. ▲ When http is selected, both http and https are supported. |
Re-push | It is used to determine whether to repeat the transmission of recognition records. |
IP Address | IP When ‘Recognition Record Transmission’ is enabled, it is used to set the IP address of the transmission destination. |
Port Number | ws(WebSocket) When ‘Recognition Record Transmission’ is enabled, it is used to set the communication protocol as the port of the transmission destination under ws (WebSocket). |
Alert Port Number | Set the port number used for the alert when an exception occurs. |
Serial Interface Transfer | It is used to determine whether to transmit through the serial interface. |
▲ For the relevant parameters set by the card reader, the configuration information is provided by the corresponding IC card manufacturer.
Grouping | Parameter | Description |
---|---|---|
Card Reader |
HID Module | Used to choose whether to enable the HID Module ▲ After the HID Module switch is changed, it needs to restart the device to take effect. |
Card Reader Option | Select the card reader type. Support Mifare Classic and Mifare Ultralight | |
KEY MODE | Select a key type. | |
KEY | IC card key. The key is provided by the corresponding manufacturer. | |
Sector | Enter the area code where the data in the IC card is located, the value is 0~15 | |
Block | Enter the segment number of the data segment where the data in the IC card is located. | |
Card Number Length | Enter the card number length. The maximum value is 32. |
For the settings of the HID module, refer to the appendix '6.6 HID module settings' for details.
Options | Suboption | Description |
---|---|---|
Wiegand |
Used to set the Wiegand type. | |
General |
Used to select a general Wiegand type. Include: 26-bit, H10302 37-bit, H10304 37-bit, Corporate 1000 35-bit, Corporate 1000 48-bit |
|
Customized |
It is used to customize the Wiegand type, including parity, total number of digits, data digits, first even check, and last odd check. | |
Facility Code | Used to choose whether to use the facility code | |
Facility Code | Used to identify facilities. | |
Output |
It is used to customize the encoding of the Wiegand signal output by the terminal in the case of a specific verification result and is used for subsequent targeted secondary development. | |
Pulse Interval |
Used to set the pulse interval of the Wiegand signal. Value range: 100~2000; default value: 1000 us |
|
Pulse Width |
Used to set the pulse width of the Wiegand signal. Value range: 20~400; Default value: 100 us |
|
Invalid Card |
It is used to set the encoding of the output Wiegand signal when the card number is too long. It is limited to scenarios where the verification mode is ‘1:1 Mode’ or ‘Hybrid Mode’. |
|
1:1 Verification Failed |
It is used to set the encoding of the output Wiegand signal when the card number is in the library, but the verification fails. It is limited to scenarios where the verification mode is "1:1 Mode" or "Hybrid Mode". |
|
1:N Verification Successful | It is used to set the encoding of the Wiegand signal output when the face verification is successful. Only applicable to scenarios where the verification mode is ‘1:N Mode’ or ‘Hybrid Mode’. |
|
Beacon | Settings for linkage with warning lights via terminal RS485 interface Access Granted:Set the time for the warning light to turn on when access granted Access Denied:Set the time for the warning light to be on when access denied |
|
Alarm Interface |
It is used to switch the hardware alarm interface through the software interface. The alarm interface provides two interfaces. Interface 1 defaults to ‘Door Magnetic Status Detection’, and interface 2 defaults to ‘None’. |
Select ‘Custom Wiegand Type’ to support editing the following parameters:
Options | Description |
---|---|
Total Bits | Used to set the total number of bits for the Wiegand signal. Value range: 26~80; default value: 80. |
Start of Personnel Code | Default 9 |
End of Personnel Code | Default 24 |
Facility Code | The code used to describe the facility can be defined by the user. |
Start of Facility Code | Used to set the location where the facility code starts. Default 1. |
End of Facility Code | Used to set where the facility code ends. |
Parity Check | It is used to set whether the encoding of the Wiegand signal adopts parity. |
Even parity position | According to the selected parity range, the position of the generated even parity bit |
Even parity start | Used to set the starting position of the even parity bit |
Even parity end | Used to set the end position of the even parity bit |
Odd test position | The position of the generated odd parity bit according to the selected parity range |
Odd parity starts | It is used to set the starting position of sending check digit |
End of odd parity | Used to set the end position of the odd parity bit |
Method 1: Scan Local Area Network (LAN) to add devices.
Step 1: Click on 'Scan LAN' and wait for the results
Step 2: Select the desired devices and click on 'link'
Method 2: Manually add devices
Step 1: Click on 'Add Device'
Step 2: Enter the IP address and S/N of the desired slave devices, name it, and click on 'Confirm'
Step 3: After adding slave devices successfully, click on 'Finish' to complete the addition, or click on 'Continue Adding' to repeat Step 2. If the addition fails, click on 'Back' to edit the input information, or click on 'Retry' to add the device again.
▲ To replace the master device to which the slave device belongs, you need to restore the factory settings of the slave device before connecting and before restoring the factory, it is recommended to export the records stored in the slave device.
▲ In the current version,a master device can connect up to 7 slave devices.
Click on 'Delete Device' on the right side of the device list to delete the corresponding device.
After deletion, the master and slave devices will be unlinked, and the data from the slave device will no longer be uploaded to the master device.
Click on 'Synchronize Personnel Information' to send personnel and organization information to the slave devices.
▲ After changing the personnel or organization information, please synchronize the information to the slave device in time.
The slave devices automatically transfer recognition and attendance records to the master device.
Click on 'Jump' to go to the corresponding slave device's FaceOffice page.
Use face recognition or other verification methods for verification whentesters pass through the terminal and check the verification results.
1) No standby page setting: the page displays a static system default standby wallpaper;
2) Standby page settings applied: The page displays information, plays standby images, or videos according to the settings.
Verifying:
When the tester's face is facing the screen or the touch screen is tapped three times, the recognition page opens and displays the prompt: Verifying, please wait...
Face is not facing the screen:
When the tester's face is not facing the screen, or the quality of face recognition is not good, a prompt message will be displayed on the recognition page: Please face the screen.
Verification succeeded
When the tester uses the specified verification method and the identity verification is successful, a prompt message will be displayed on the recognition page: Verification successful, XXX, Hello
Verification failed
When the tester uses the specified verification method and the identity verification is failed, the recognition page displays a prompt message: verification failed, try it again.
When the terminal switches on the 'Temperature Measurement' or' Temperature Measurement + Access' mode and the tester passes through the terminal, the tester should use the face verification method for verification and checks the verification result.
When the 'Full Face' is turned on for Temperature Measurement, a white dotted face frame will appear on the screen when the temperature is measured.
:Temperature Measurement mode is not turned on:
When the device is not connected to the thermal camera, a prompt message is displayed: IT camera not found, please check the device.
The face is not in the Temperature Measurement area:
When the tester's face does not appear in the Temperature Measurement area, the recognition page will display a prompt message: Please aim at the camera to measure the temperature again.
The temperature is normal:
When the tester's temperature is normal, the recognition page will display a prompt message: Normal temperature: temperature value
Unusual Temperature:
When the tester's temperature is abnormal, a prompt message will be displayed on the recognition page: Unusual Temperature: temperature value.
Normal Temperature Verification Successful
When the tester's temperature is normal and the identity verification is successful, a prompt message will be displayed on the recognition page: Normal Temperature:temperature value, hello,XXX
Unusual Temperature&Verification successful
When the tester's temperature is unusual and the verification is successful, the recognition page will display a prompt message: Unusual Temperature: temperature value, XXX, hello.
Unusual Temperature & Verification Failed
When the tester's temperature is unusual and the identity verification is failed, the recognition page displays a prompt message: Unusual Temperature: temperature value, verification failed, please try again.
Normal Temperature & verification failed
When the tester's temperature is normal and identity verification is successful, the recognition page displays a prompt message: Normal Temperature: temperature value, verification failed, please try again.
When the device is in the application mode and the attendance application is enabled, you can click the application to clock in on the terminal.
Step1 Click on the 'Attendance' button on the screen.
Step2 Select the type of clock in.
Step3 Perform face recognition verification.
When the device is in the application mode and the visitor application is enabled, you can click on the application to select a person to have video intercom on the terminal.
When using the visitors application to make a call for the first time, a prompt window as shown in the figure below will appear. Click on 'Advanced' > 'Proceed to facing.facesec.com'
For first-time use, the system will request camera permission; click on 'agree' to proceed.
When the device is in the application mode and the 'Permission/Print' application is enabled, you can click on the application on the terminal to enter the verification process. The specific verification method can be set in the recognition rules.
When the device is in the application mode and the 'Doorbell' application is enabled, you can click on the doorbell application on the terminal to one-touch call a fixed person.
Category | Extension | Description |
---|---|---|
Terminal customization | Text and voice of prompt message | You can customize your own text and voice of prompt message. |
Digital sign |
Terminal | Import images or videos to the terminal to play on the standby screen. |
Cloud Management Platform | Upload images or videos to the extension app on the cloud management platform for uniformed management of multi-play schedules and multi-device play tasks. | |
Function extension |
Terminal WebAPI | Integrate with third-party business systems, such as ERP, OA, MES, etc., by directly accessing and controlling the terminal through the WebAPI. eg. Integration with business systems such as ERP, OA, and MES. |
Cloud management platform WebAPI | Integrate with third-party business systems, such as ERP, OA, MES, etc., by accessing user-specific data on the cloud through the WebAPI. eg. Integration with business systems such as ERP, OA, and MES. | |
Terminal PUSH | Real-time push of recognition records from the terminal to the user's server. Suitable for applications with high real-time response requirements, such as CRM systems, meeting check-ins, and visitors. | |
Cloud management platform PUSH | Real-time push of recognition records from the cloud management platform to the user's server. Suitable for applications with high real-time response requirements, such as CRM systems, meeting check-ins, and visitors. | |
Terminal ODSL | Embed third-party apps into the terminal workflow using ODSL to customize the workflow. Application Example 1: Perform secondary verification for valid tickets, conference attendees, or daily attendance after identity verification for intelligent scene applications. Application Example 2: Embed the terminal as an identity recognition step within the actual business process. |
|
Terminal Android JavaSDK | Third-party developers can use the provided Android JavaSDK for secondary development. | |
Hardware I/F | Link with other manufacturers' security systems, fire systems, card readers, electric locks, access control controllers, elevator controllers, speed gates, warning lights, and other devices. |
▲ For details on system extension, please contact us or a certified distributor.
The built-in FaceOffice service in the terminal provides a way to remotely access and manage terminal devices through a web page on a PC.
The WebAPI provided by the built-in FaceOffice enables third-party developers / ISVs to quickly integrate their own business development with the system.
By using the WebAPI provided by the built-in FaceOffice, the applications on third-party platform can flexibly and easily perform personnel management, rule customization, data management, and device management on the terminal and integrate the clients' application system with the terminal, achieving the intellectualization and automazation of the business scenarios.
After API integration, the following functions can be done: CRUD of personnel and personnel's affiliated organizations; obtain device information and recognition records; management of recognition rules, perform 1:1 face comparison, and other functions.
For more details, please refer to the 'Terminal WebAPI Developer Guide'.
Through the Cloud WebAPI, the third-party developers / ISVs to quickly integrate their own business development with the system.
WebAPI is offered by both public and private cloud.
For details, please refer to the 'Cloud WebAPI Developer Guide'.
ODSL (Open Domain Specific Language) is a business process customization development framework provided by the terminal.
Third-party developers can embed their own applications into the existing face recognition process without editing the original code.
By writing an ODSL configuration file -> importing the configuration file -> installing the third-party application specified in the configuration file, the secondary customization development of the facial recognition process is completed.
For details, please refer to 'Terminal ODSL Developer's Guide'.
FaceSec facial recognition terminal open platform is based on a deeply customized Android system, and third parties can carry out secondary development based on the SDK provided by FaceSec. The development platform supports facial recognition process customization, personnel management, rule management, recognition record management, configuration management, and other functions.
For details, please refer to 'Device Android SDK Developer Guide'.
When using Facesec's terminal products, relevant authorizations need to be imported into the terminal.:
NO. | Authorization number(ppl) | Description |
---|---|---|
1 | 100 | default value, free. |
2 | 1,000 | One terminal can support up to 1,000 people, payment required. |
3 | 5,000 | One terminal can support up to 5,000 people, payment required. |
4 | 10,000 | One terminal can support up to 10,0000 people, payment required. |
5 | 20,000 | One terminal can support up to 20,000 people, payment required. |
6 | 50,000 | One terminal can support up to 50,000 people, payment required. |
7 | 100,000 | One terminal can support up to 100,000 people, payment required. |
▲ In Home and OA operation modes, terminal authorization needs to be imported manually. For terminal authorization, please contact Facesec or distributors for more detail.
Single verification method, including face, card, fingerprint, ID card, passport.
A+B verification method (Multiple Verification Method)
A+B |
---|
Face + Password |
Face + ID Card |
Face + Passport |
▲ Different verification methods may require additional extension modules or reading devices from other companies.
Verification methods from the perspective of usage scenarios
Single Verification | A+B Verification Methods | |
---|---|---|
Combination of single verification methods | Support | Support |
Combination of dual verification methods | Method 1: Face recognition Method 2: Other single verification method | Method 1: Face recognition Method 2: A+B verification methods |
▲ The combination of dual verification methods is the scenario where method 1 and method 2 are required at the same time.
The verification methods can be in various combinations, the detailed description is as follows:
Combination of single verification method:
Options | Description |
---|---|
Face | Operation: Check the ‘Face’ multi-select botton. Input: face. Verification: 1:N verification of [face] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’ |
Fingerprint | Operation: Check the ‘Fingerprint’ radio button. Input: fingerprint. Verification: [fingerprint] and the personnel database information. |
Card | Operation: Check the ‘Card’ radio button. Input: card. Verification: 1:1 verification of [card] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’. |
Face + Card | Operation: Check the ‘Face + Card’ radio button. Input: face and card. Verification: 1:1 verification of [face and card] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’. |
Face+Password | Operation: Check the ‘Face + Password’ radio button. Input: face and password. Verification: 1) 1:N verification of [face] and the personnel database information; 2) After the verification for face recognition is successful, the input password will be verified with the preset password of the person in the personnel database. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’. |
Face+ID Card | Operation: Check the ‘Face + ID card’ radio button. Input: Face and ID. Verification: 1:1 verification of [face and ID card] information. Note: 1) In the scenario of using an ID card for verification, apart from comparing the face with the photo on the ID card, it supports ‘authorization list’ and ‘ID card fingerprint comparison ’ at the same time to further improve security level. 2) In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’. |
Face+Passport | Operation: Check the ‘Face + Passport’ radio button. Input: face and passport. Verification: 1:1 verification of [face and passport] information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’. |
Combination of dual verification methods:
Options | Description |
---|---|
Face OR Face + ID Card | Operation: Check the ‘Face’ multi-select button and the ‘Face + ID card’ radio button at the same time. Input: face (and ID). Verification: 1) Face + ID card: 1:1 verification of [face and ID card]; 2) Face only: 1:N verification of [face] and the personnel database information. Illustrate: 1) In the scenario of using an ID card for verification, apart from [face and ID card] verification, it also supports two higher-level verification methods of ‘authorization list’ and ‘ID card fingerprint’. 2) In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’. |
Face OR Face + Passport | Operation: Check the ‘Face’ multi-select button and the ‘Face + Passport’ radio button at the same time. Input: face (and passport). Verification: 1) Face + passport: 1:1 verification of [face and passport] information; 2) Face only: 1:N verification of [face] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’. |
Face OR Face + Card | Operation: Check the ‘Face’ multi-select button and the ‘Face+Card’ radio button at the same time. Input: faces (and cards). Verification: 1) Face + card: 1:1 verification of [face and card] information; 2) Face only: 1:N verification of [face] and personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’. |
Face OR Face+Password | Operation: Check the ‘Face’ multi-select button and the ‘Face + Password’ radio button at the same time. Input: face (and password). Verification: 1) Face + password: ①1:N verification of [face] and the personnel database information; ② After the verification for face recognition is successful, the input password will be verified with the preset password of the person in the personnel database. 2) Face only: 1:N verification of [face] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’. |
Face OR Card | Operation: Check the ‘Face’ multi-select button and the ‘Card’ radio button at the same time. Input: face or card. Verification: 1) Face: 1:N verification of [face] and the personnel database information. 2) Card: 1:1 verification of [card] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’. |
Face OR Fingerprint | Operation: Check the ‘Face’ multi-select button and the ‘Fingerprint’ radio button at the same time. Input: face or fingerprint. Verification: 1) Face: 1:N verification of [face] and the personnel database information. 2) Fingerprint: verification of [fingerprint] and the personnel database information. Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’. |
On the recognition page, tap or slide the upward arrow at the bottom to display the operation icons.
The operation icons from left to right are:
Icons | Description |
---|---|
Used to Open the Door | |
Used to open the Settings page. | |
Used to open the Personnel page. | |
Used to open the Running Status page. |
▲ Operation icons can be customized accordingly. For details, please refer to '2.7.2 Set up the Home Button'
When the terminal in in single-host mode, personnel can directly log in via the terminal or log in remotely via FaceOffice.
The relevant descriptions for the two methods are shown in the table below
Project | Description | Terminal | FaceOffice |
---|---|---|---|
Photo | Used to register personnel photos. Required. | ● | ● |
Personnel No. | Used to register the personnel No. and identify personnel uniquely Required. ▲ Once the personnel No. is created, it cannot be edited ▲ If you need to edit the personnel number, you need to delete the personnel and create again | ● | ● |
Name | Used to register a personnel’s name. Special characters are not supported, including: ‘’’’%’’\’’/’’|’’_’’&’’#’’:’ | ● | ● |
ID No. | Used to register the personnel’s ID No. Not required. | ✖ | ● |
Organization | Used to register the organization personnel belong to. A person can belong to multiple organizations. | ✖ | ● |
FaceRing Password | Used to log in FaceRing for personnel. | ✖ | ● |
IC Card No. | Used to bind IC Card No. with personnel. The access authority of the IC card is determined by the recognition rules bind to personnel in the terminal. | ● | ● |
Access Password | A 4-digit password for setting up personnel verification. It is used when the recognition rule of the terminal is set to match the verification method. For example: face + password | ● | ● |
Recognition Rule | Used to assign the preset recognition rules. | ● | ● |
Time Rule | Used to display the time rules for recognition rules. | ● | ✖ |
Verification Method | It is used to display the verification method of the recognition rules. | ● | ✖ |
Description | Used to display the description of recognition rules. | ● | ✖ |
Threshold | Used to register the recognition threshold for a person. Default: 80 | ● | ● |
Fingerprint | For adding personel’s fingerprints, the device needs to be connected to a fingerprint module. Each person can register up to two fingerprints. | ● | ✖ |
The person should keep shoulders horizontal and look straight at the camera.
The person should have a natural expression, eyes open naturally, without hair covering eyes, and no heavy makeup.
The person should not wear glasses.
The lighting should be even, with no shadows or highlights on the face.
The background should be uniform in color with no gradient, shadows, or other people/objects.
File image format: JPEG, JPG, or PNG.
Image file size range: between 20 KB and 1 MB.
Photo resolution should not exceed 1024*1024.
The photo-taking environment should have even lighting and the portrait position is at center.
Moderate exposure, no shadows or highlights on faces.
Even background color, no gradients, no other people or objects
Background color is even white or light blue.
Proper posture.
Keep shoulders horizontal.
Look straight at the camera.
Natural expression.
Eyes open naturally.
Lips closed naturally.
Hair should not cover eyes.
The person should not wear head coverings, and non-permanent accessories should not cover the face.
Color of face and clothes should contrast with the background color.
Accurate focus, no red eyes, no facial distortion.
Clear paper photo, no blurring (scanning noise), dirt, creases, borders, or scratches.
No heavy makeup.
No obstructions (such as hands or toys) in front or behind.
Connect the module to the computer via Micro USB, enter the URL: http://192.168.63.99/ in the browser, and access to the configuration page.
Click on 'Contactless Config' to set the card type supported by the module.
Click on 'Keyboard Wedge' → 'General Config', check 'KBW' mode, and change the delay to 0 milliseconds.
Click on 'Host Interfaces', check 'Serial Enable'
Click on 'System Config'-> 'Apply Changes', save the changed configuration
Click on 'Card Data Selection' to choose the card type.
Take 'HID iCLASS' as an example (similar for other types),
When customizing PACS is not applicable, uncheck CSN and PACS.
Scroll down the page, check PACS Custom 1, and enter 1, 8, 9, 16 in the indicated positions.
Click on 'Out 1 Data Manipulation' and set the two StringFormat options to DEC as shown below.
Click on 'Out 2 Data Manipulation',
set 'Custom PACS 1 → Prestrokes' to '--',
and 'Custom PACS 2 → Prestrokes' to '**'.
Click on 'System Config'-> 'Apply Changes' and save the changed configuration. Click on 'Reboot System' to restart the device and check if the changed parameters take effects.
Connect the module to the computer via Micro USB, enter the URL: http://192.168.63.99/ in the browser to access to the configuration page.
Click on 'Keyboard Wedge'→ 'General Config', uncheck Keyboard Wedge Enable
Put the card on the card reader.
Open the "hid_ok5x27ck_configcard_tool_1.1.0.5" program, select the corresponding module in the Select Reader on the right to connect.
Click on 'Connect' to read a blank card, and the ATR information will appear on the Reader Status on the right side.
Click on 'Initialize Blank Card'.
Click on 'Export Config '. The configuration file can be obtained from the HID module configuration page.
Finally click on 'Write File' to complete the CFG card writing.
Read the CFG file in the card
After the card writing is successful and you need to configure a new module's parameters, you nned to firstly power off the module, then attach the written card to the module and power it on (or power on the module and then attach the card).
Remove the card after about 20-30 seconds, and the module configuration will be successful (if you can see the module light flashing red and green, the configuration is successful).
A single device can support up to 10 terminal administrators registered.
When using a PC browser:
It is recommended to use Google Chrome or Firefox.
Compatibility issues may exist when using browsers with IE9 or IE10 kernel.
When using a tablet:
It is recommended to use the built-in browser of the tablet.
To access FaceOffice, you need to obtain the device's IP address.
For details on obtaining the device's IP address, refer to '2.9.2 View Operating Status'.
If you cannot access FaceOffice, please troubleshoot the following situations:
Situation 1: Network disconnected. Check if the device is connected to the network and if the PC accessing the device is on the same Local Area Network (LAN) as the device.
Situation 2: Incorrect transfer protocol. Check if the input matches the settings on the device. FaceOffice supports both http and https protocols. If you change the protocol, you must restart the device for the changes to take effect. Refer to '3.11.3.18 Terminal Web Management'.
Situation 3: Incorrect port. Make sure you are using port 8081. If you cannot access it, check if your PC has disabled this port or if the port is being used by another program.
Firstly, make sure the device is connected to the network.
The prerequisite for the device to display contacts is that the person has logged in to FaceRing. If they have not logged in, their information will not be displayed on the contact list.
Personnel must set a FaceRing password before they can be displayed on the visual intercom page. For details on setting a FaceRing password, Refer to '3.5 Personnel'.