• *Thank you for purchasing our product.

    To fully utilize the performance of this product, please read this manual carefully and use it correctly and safely.

    All our products have undergone rigorous inspections before leaving the factory. Please ensure that the product packaging is undamaged before use.

    If the product is damaged or malfunctions, please contact our after-sales personnel promptly.

    Precautions:

    ■ Operating Environment:

    - Do not use this product in places with strong vibrations or impacts, as it may affect the precision components, leading to performance degradation or malfunctions.

    - Do not use or store this product in direct sunlight, high temperatures, extremely cold conditions, humid environments, or dusty areas.

    - Please use within the specified temperature and humidity range.

    - Do not subject the product to vibration or impact while writing data or during communication or turn off the power. Data loss may result in product malfunctions.

    ■ Installation:

    - Do not install the product near corrosive chemicals or in places where corrosive gases are generated.

    - Do not install the product in areas with low-melting substances or flammable materials.

    - Before connecting or disconnecting modules and wires, be sure to turn off the power. Installing or removing modules and wires with the power on may cause damage.

    - Do not tighten connectors by pulling or bending the wires. Doing so may damage the connectors.

    ■ Others:

    - Before cleaning, please turn off the power of this product.

    - Clean with a soft dry cloth. Wiping with alcohol, disinfectants, cleaning agents, glass cleaners, or similar substances may cause malfunctions.

    - When transferring or disposing of this product, please delete all data. If data remains, there is a risk of malicious reading and leakage by third parties.

    - If you encounter any issues with this product, please stop using it immediately, turn off the power, and contact us.


    Declaration:

    1 Quick Start

    1.1 Installation Conditions

    Precautions:

    1、 The installation height of the device (the height of the recognition camera from the ground) is 1.5m, and the recognizable distance is 25-90cm, recognizable height range is 110-220cm;

    2、 Install the device at least 2 meters away from any direct light source

    3、 In the Temperature Measurement Mode, the recognizable distance is 30-50cm and the recognizable height range is 120-190cm

    4、 In the Temperature Measurement Mode, it requires an indoor environment, and there should be no high-temperature heat source within the frame of the thermal camera, which will affect the result of temperature measurement

    5、 In the Temperature Measurement Mode, the temperature measurement camera needs to be warmed up for 20 minutes after the device is turned 1111on to achieve better detection accuracy

    1.2 Basic Setup Process

    1.3 Terminal Initialization

    1.3.1 Terminal Startup

    When the terminal is powered off, press and hold the power button to turn on the terminal.

    When the terminal is powered on for the first time, it will enter the initialization page.

    1.3.2 Select System Language

    On the 'Language' setting interface, select the system language of the terminal.

    Click on the arrow below to enter the 'Date and Time' setting interface.

    ▲ The system language of the terminal can be modified in the terminal or FaceOffice

    ▲ The language of some fields cannot be changed after initial selection. Such as the default recognition rules, default time rules, etc.

    1.3.3 Date and Time Setting

    In the 'Date and Time' setting interface, it is recommended to turn on the automatic setting (default value).

    Select the time zone for the terminal.

    ▲ The system provides four types of time formats. For example Apr.6, 1978 (default)、6 Apr, 1978、April 6, 1978、Thursday, April 6,

    ▲ Please make sure that the selected time zone is consistent with the time zone where you use FaceOffice.

    To edit the time format, log in to Terminal Management > General > Date & Time.

    Click on 'Next' to enter the 'Network Configuration' interface.

    1.3.4 Network Configuration

    The network settings are used to set the network connection method of the terminal, 'WLAN' and 'LAN' options are provided.

    For WLAN, select the corresponding network connection.

    For LAN, after the device is connected to the network cable, it is recommended to turn on 'Auto Obtain' so that the device can automatically obtain network information.

    ▲During initialization, the device needs to be connected to the public network to activate the algorithm. The device cannot work properly if it is not connected to the public network.

    image-20230525151547383  image-20230525151559910

     

    1.3.5 Select Operation Mode

    On the 'Select Operation Mode' interface, select the mode you purchased.

    Click on 'Next'.

    1.3.6 Device Group (OA、Home)

    For OA and Home modes, you can choose whether to enable the device group function.

    The device group function is applicable to scenarios with multiple devices, and users can manage all devices in a unified manner.

    Enable the device group function to select the role of the current device (maser or slave).

    Role Description
    Master Used for managing slave devices in a unified manner, including personnel and organization information and recognition records.
    Slave It can work normally, but the personnel and organization information can only be obtained from the master device instead of editing the information on slave devices. The records on the slave devices are aggregated to the master device and cannot be viewed on the slave devices.

     

    ▲ After using device group function, if you want to turn it off or change the device roles, you need to restore the factory settings for initialization, and all data will be deleted, please choose carefully.

    For detailed functions and operations, see <3.11.4 Device Group>

    1.3.7 Activation (Cloud)

    Enter project description.

    NO. Project Description
    1 Server address Required
    2 Activation code Required
    3 Device name Optional
    4 Device group Optional

     

    Input method 1: Activate device by scanning QR code, which will automatically enter the server address, activation code, device name, and device group information. (recommended)

    Input method 2: Manually input through the soft keyboard.

    Click on 'Next' and it will display "Device activation successful"

    1.3.7.1 Get Activation Code

    Login to the platform

    image030
    Public Cloud                                                             Private Cloud

    Step 1  Browser access to https://cloud.facesec.com or private cloud address.

    Step 2 Enter the account number and password to log in. To log in to the public cloud account, you need to obtain an email verification code.

    ▲ After generating the administrator ID, you can use email or administrator ID to log in on the login page. ▲ If the administrator ID is not generated, please go to Step3. (Public cloud)
    ▲ If the administrator ID has been generated, please skip Step3 and go to Step4. (Public cloud)

    ▲ The email used for login is the email submitted when registering the cloud management platform. ▲ Email can be modified after login.

    Step 3(Public Cloud)If the administrator ID is not generated, it will enter the administrator ID generation interface.

    1. Enter the new administrator ID

    2. Enter a new login password

    3. Click "OK"

    ▲ Once the administrator ID is generated, it cannot be modified. The login password can be changed afterwards. ▲ The administrator ID has been generated and this page will not be displayed. ▲ The administrator ID must be a half-width characters, start with English, and can be a combination of English, numbers, and three special characters ( . _ - ). The length of the administrator ID is 6 to 100 characters.

    Step4 (Public cloud) Enter the account password and 6-digit verification code, click on 'Login' to enter the home page of the Dashboard.

    Get Terminal Activation Code

    Step1 Open the device management interface.

    Steps: menu on left hand side → device → device management

    Step2 Click on 'Device Activation Code' to view the device activation code.

    Record the platform IP address and activation code or print the QR code.

    ▲ When activating the device, scanning the QR code is more efficient than manually entering the platform IP address and activation code. ▲ After refreshing the activation code, a new activation code will be generated, and the old activation code will be invalid immediately.

    1.3.8 Add Administrator (OA, Home)

    1. On the 'Device Administrator' page, register the terminal administrator's information.

    1. Click on the 'Next' button to complete the addition.

    Options Description Description
       
    <Photo>   
       
    Tap the camera icon to scan the administrator's   face.   
    Required
       
    Name   
       
    Enter the administrator’s name.   

    Required
       
    Password   
       
    Enter the administrator’s password.   
    Optional
       
    Confirm password   
       
    Confirm the administrator’s password.   
       
    Optional   

     

    ▲ Up to 10 administrators can be add to each terminal. ▲ The administrator of the cloud version terminal administrator needs to be issued by the cloud platform.

    1.3.9 Entering the System

          image047

     

     

    After entering the welcome page, check the checkbox of 'Read the Service Agreement & Privacy Policy' and then click on 'Start to use'.

    1.4 Login to Terminal

    On the recognition interface of the terminal, swipe up from the bottom of the screen to view the operation icons.

    Click on the icon in the red box in the picture above to open the terminal administrator login interface.

    Registered administrator can log in to the terminal via two methods: 'Face Recognition' or 'Password'.

    After logging in successfully, it will proceed to the settings interface.

    1.5 Login to FaceOffice

    Logging in to FaceOffice can assist users to remotely operate the terminal and view various data.

    Step1: Enter the FaceOffice login address in the address bar of the browser: http(s)://DEVICE_IP:8081,

    DEVICE_IP can be obtained from the terminal by viewing the running status, for example, http://192.168.189.198:8081

    Step2: If the browser prompts 'Your Connection is Not Private', click on 'Advanced' > 'Continue to xxx.xxx.xxx.xxx'

    (This prompt is normal, and users do not need to worry about the privacy and security issues)

    Step3: Enter the administrator's name and password.

    Step4: Click on 'Login'

    1.6 Importing Terminal Authorization (over 100 people)

    For details, please refer to "6.1 Terminal Authorization Instructions".

    1.7 Select Working Mode

    Working mode settings are used to set the working mode of the terminal, you can choose 'Temperature Measurement Mode', 'Access mode' and 'Temperature Measurement + Access mode'.

    Steps:Setting interface → Management → Mode

         

     

    ProjectDescription
    Smart AccessApplicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules.
    PrivacyWhen enabled, the face will not be displayed on the screen during face recognition.
    Temperature MeasurementApplicable to scenarios only require temperature measurement.Unnecessary to import people.
    Temperature Measurement + Smart AccessApplicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules.
    Prior Card/Fingerprint VerificationNon-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified.

    Please select the working mode according to the actual scenario.

    Users can also set the working mode in FaceOffice, refer to "3.11.3.3 Working Mode" for details.

    1.8 Set Recognition Rules

    Recognition rule settings are used to set the recognition rules for login personnel, including the verification method and effective periods.

    You can create, delete, and edit the recognition rules.

    Multiple recognition rules can be created for different login personnel.

    The terminal provides default recognition rules for quick use; the verification method of the default rule is 'face recognition', and the effective period is all periods.

    For the description of the input items of the recognition rules, refer to "3.6 Recognition Rules" for details.

    Steps: Settings -- General -- Recognition Rules

        image064

    ▲ When the working mode is 'Temperature Measurement Mode', there is no need to set recognition rules.

    Users can also set it in FaceOffice, refer to "3.6 Recognition Rules" for details.

    1.9 Personnel Registration

    Personnel registration is used to register personnels' information during 1:N recognition into the personnel database.

    Personnel registration can be performed through the terminal or FaceOffice.

    Personnels can be registered individually or imported in batch.

     Terminal operationFaceOffice
    Individual loginYesYes
    Batch loginYes(not recommended)Yes(recommended)

    ▲ After the personnel is registered, the personnel number cannot be modified. If you need to edit the personnel number, you need to delete the personnel and register again. ▲ When the working mode is ‘Temperature Measurement Mode’ there is no need to register personnels.

    1.9.1 Log in personnel using terminal operations

    Refer to the following content for details on input items for individual registration. '6.4 Project description for adding a single person'.

    1.9.1.1 Add Personnel

    For details, refer to '2.7.4.1 Add Personnel'.

    Steps: Settings → Personnel → Add in batch

    ▲ This operation needs to import the login file via USB, which is not recommended. It is recommended to use FaceOffice for batch login.

    1.9.2 Import using FaceOffice

    Refer to '3.5 Personnel' for details.

    2 Terminal Operation Guide

    2.1 System Overview

    2.1.1 System Architecture

    The terminal supports two working modes, including single host mode and cloud service mode.

    In the single-host mode, the terminal does not need to cooperate with the cloud management platform, but it can be connected to the network, connected with the computers and mobile phones for terminal management. The network topology of single-host mode is as shown.

    Both Home and OA are in single host mode.

    image-20230510160236680

    Single host mode networking diagram

    In the cloud service mode, the terminal needs to cooperate with the cloud management platform. The network topology of the cloud service mode is shown in the figure.

    image-20230510160345441

    2.2Hardware

    2.2.1 Machine Size (unit: mm)

    image-20230529103741747

    4.3''

    image-20230529103826855

    5.5''

    企业微信截图_16853279855227

    8.0''

    image-20230529104111300

    10.1''

    2.2.2 Functional Module

    ▲ Disconnect the power of the device when assembling or disassembling the modules

    TypeSampleDimensions(unit:mm)
    Temperature Measurement Module
    (BRD-SE-BFX3, BRD-SE-BFX4)
    image-20230529105846391159 * 55 * 50
    Temperature Measurement Module+Contactless IC Card Reader
    (BRD-SE-BFX5IC, BRD-SE-BFX6IC)
    image-20230529110005359159 * 55 * 50
    Fingerprint Module + Contactless IC Card Reader
    (BRD-SE-BF1)
    image-20230529110142582159 * 55 * 18.5
    Contactless IC Card Reader
    (BRD-SE-BF5S / BRD-SE-BF6S BRD-SE-BF5P / BRD-SE-BF6P)
    企业微信截图_16853293893142159 * 55 * 18.5
    Temperature Measurement Module + Contactless Card Reader
    (FRD-SE-CTB/FRD-SE-HTB FRD-SE-CTW/FRD-SE-HTW)
    image-20230529110550342159 * 55 * 50
    Fingerprint Module + Contactless Card Reader
    (FRD-SE-CFB/FRD-SE-HFB FRD-SE-CFW/FRD-SE-HFW)
    image-20230529110716978119.6 * 48 * 18
    Contactless Card Reader
    (FRD-SE-CW/FRD-SE-HW FRD-SE-CB/FRD-SE-HB)
    image-20230529110830350119.6 * 48 * 18

    2.2.4 Port Description

    5.5'' & 8.0'' Devices

    image-20230529152912268

    4.3''&10.1'' Devices

    Since there is no RJ45 port on 4.3-inch devices, it is required to use the USB Type-C to Ethernet LAN RJ45 Adapter rather than using Ethernet LAN cable directly.

    2.2.5 Specifications


    Recognizable Distance

    25-90cm

    Operating mode

    Temperature Measurement Mode, Access mode, Temperature Measurement +Access mode
       
    Verification Method   
       
    1:1, 1/N, 1:1/1:N   
       
    Recognition Speed   
       
    Time for per recognition (under 1:N mode) ≤0.3 sec   
       
    User Capacity   
       
    10000 users   
       
    Operating System   
       
    Android 8.1   
       
    Camera   
       
    Dual wide-angle camera (RGB + NIR)   
       
    multi touch   
       
    Support   
       
    Tamper alarm   
       
    Support   
       
    Operating temperature   
       
    –10° to 55° C   
       
    Relative Humidity   
       
    5% to 95% noncondensing   
       
    Power Supply   
       
    DC 12V 3A   
       
    Communication Method   
       
    Wi-Fi   
       
    Support 2.4 GHz/5GHz, IEEE 802.11a/g/b/n, IEEE 802.11ac    
       
    Bluetooth    
       
    Support Bluetooth 4.1+BLE    
       
    Ethernet    
       
    Supported   
       
    Power button   
       
    Support   

     

    2.2.6 Installation Instructions

    1. Select the appropriate mounting location and attach the positioning sticker to the mounting location, make holes in the wall and install the switch box in the wall.

    2. Fix the back plate bracket to the switch box with two screws (M4*40).

    3. Connect the Cable A on the bracket to the corresponding interface of the device (see port description).

    4. Attach the device from top to bottom on the bracket.

    5. Fix the device and bracket from the bottom with two screws (M2*7, installation completed).

    ▲Disconnect the power of the device when assembling or disassembling the modules!

    image-20230525151916179

    2.2.7 Installation Height Description

    W(cm) H(cm) L(cm)
                                                                   50    130    80〜200   
    140    90〜210   
    150    100〜220   

     

    Note: In the Temperature Measurement Mode, the recognizable distance is 30-50cm and the height range is 120-190cm

    2.3 Precondition

    The terminal has been installed and powered on. For detailed operationinstructions and precautions, please refer to the 'Quick Installation Guide'.

    2.4 Operational Process Overview

    Step Substep Description
    1、 Initialize the terminal After the uninitialized terminal is turned on, it needs to be initialized before the function setting and use.
    ▲ The initialization operation only needs to be performed once, and there is no need to repeat the operation after starting up.
               ▲ The scenarios involving terminal uninitialization include turning on the new machine for the first time and restoring the factory.
    Activate the terminal After the terminal is turned on for the first time, it is necessary to set the basic information of the system and confirm the service agreement and privacy terms.
    Add terminal administrator. The terminal administrator (referred to as "administrator") is a role with the highest configuration and management authority of the terminal. The default administrator is not set when the terminal is shipped from the factory, and it needs to be set after the terminal is activated.
    2、Set up the terminal Combined with the actual application scene of the terminal, perform function setting and personnel management, and put it into daily use after verification.
    Setting function Combined with the actual application scenario of the terminal, set the terminal function.
    Manage personnel Combined with the actual application scenarios of the terminal, manage personnel information and data.
    Verification function After the function setting and personnel management are completed, the terminal function is verified to ensure that the information displayed on the page and the logical relationship are correct.
    3、Routine maintenance After the terminal is put into daily use, daily maintenance is required in case there is an abnormal situation.
    4、System upgrade Upgrade the software version of the terminal.

     

     

    2.5 Power On/Off Terminal

    2.5.1 Power On

    When the terminal is powered off, press and hold the power button to start the terminal. When the terminal is turned on for the first time, it will enter the activation page.

    2.5.2 Power Off

    Step1 When the terminal is powered on, press and hold the power button to open the shortcut dialog box.

    Step2 In the shortcut dialog box, click 'Shutdown' to open the "Enter Password" dialog box.

    Step3 In the 'Enter Password' dialog box, enter the administrator's password and click on 'OK'.

    2.5.3 Save Log

    Step1 When the terminal is powered on, press and hold the power button to open the shortcut dialog box.

    Step2 In the shortcut dialog box, click on 'Save Log' to open the 'Log Export' dialog box.

    ▲ The file system of the USB flash drive must be in FAT32 format. The same below.
    ▲ The terminal log can be saved on the computer through FaceOffice. (Recommended).

    Step3 In the 'Log Export' dialog box, select the export method and click on the 'Export' button.

    2.6 Initialize Terminal

    After the uninitialized terminal is turned on, it needs to be initialized before the function can be set and used.

    ▲ The initialization operation only needs to be performed once, and there is no need to repeat the operation after powering on.
    ▲ The scenarios involved for uninitializated terminal include turning on the new machine for the first time and restoring the factory.

    For details, refer to '1.3 Terminal Initialization'.

    2.7 Activate Terminal

    Combined with the actual application scenario of the terminal, perform function setting and personnel management, and put it into daily use after verification.

    2.7.1Login Terminal Management

    Registered administrators can log in to the terminal settings page through two methods: "face recognition" or "password".

    Step1. On the recognition page, click on or slide the upward arrow at the bottom to view the operation icon.

    ▲ Operation icons can be customized. For details, please refer to '2.7.2 Set up the home button'.

    The operation icons from left to right are

    IconDescription
    Doors for opening controls.
    Used to open the Settings page.
    Used to open the Personnel page.
    Used to open the Running Status page.

    Step2. Click on the icon to open the "Administrator Login" page.

    The terminal supports two verification methods, "face verification" and "password verification", and the default is "face verification".

    Step3. On the 'Administrator Login' page, click on 'Password Verification' at the upper right corner to switch the verification method.

    ▲ The terminal records the current selected verification method as the default method.

    Step4. After the verification is successful, perform the assigned operation.

    2.7.2 Set Up the Home Button

    Step1. On the recognition page, click the extension button on the right side of the screen, or slide to the left to display the operation icon in the button area on the right column and the home screen button setting icon. Step2. Click on the Home Button Settings icon to open the 'Configure Home Button' page.
    Step3. On the 'Configure home screen button' page, adjust the display position of the operation icon on the recognition page, including the bottom button area and the sidebar button area: 1) In the 'Unselected Button' area, select an icon, click on 'Add to Bottom Area' or 'Add to Sidebar Area' to add the specific button to the assigned area. 2) In 'Add to Bottom Area' or 'Add to Sidebar Area', ctlick on the '×' above the icon to move the specific icon out of the assigned area.

    2.7.3 Basic Settings

    The Settings page of the terminal is shown in the figures below.

        image106     image108
    Cloud                                              Home                                                           OA

     

    ▲ For the basic settings of the terminal, it is recommended that you set them through FaceOffice. Refer to ‘3.11 Device Management’ for details

    2.7.3.1 Network

    Network settings are used to set the network connection method of the terminal, you can choose 'WLAN' or 'Wired network'.

    Steps: Terminal Settings interface → Network

    2.7.3.2 Bluetooth

    Bluetooth settings are used to connect with external devices via Bluetooth such as a Bluetooth lock.

    Steps: terminal settings interface → Bluetooth

    ▲If the user likes to connect the terminal to other Bluetooth products, please consult our company in advance.

    2.7.3.3 Camera

    Camera effect settings, which are used to set the lighting effect, fill light adjustment, recognizable distance, and exposure adjustment of the terminal's camera.

    Steps: Terminal Settings page → Camera

       
    Grouping Parameters Description
          
    Face Recognition   
    background image of facial recognition    Under the recognition interface, the background area (outside the frame area of face recognition) is displayed in different colors. Enabled by default.
    Face recognition frame     On the recognition interface, a detection frame   is displayed around the face. Disabled by default.   
    Face tracking.    After the verification is successful, the   registration photo will be displayed. When using this function, you need to   set the display mode to media mode. Disabled by default.   

    Recognizable distance.
    Max distance    It is used to set the maximum distance between   the face and the terminal in the face recognition scenario.
    Default value: 100%   
       

       
    Photo size.   
    Registration photo dimension    The minimum pixel limit of imported photos is used   to set the minimum pixel allowed when the terminal imports photos to ensure   the quality of photos.
    Including "32×32", "128×128",   "320×320" 3 specifications, the default is "320×320".   
       
    Image   
    Thermal Image.    Under the recognition interface, a thermal image   is displayed on the screen. Disabled by default.   
       
    Near-infrared.   
    Under the recognition interface, a near-infrared   image is displayed on the screen. Disabled by default.   
       
    Forehead temperature mode.   
    In the Temperature Measurement Mode, the temperature   at the center of the forehead of the face is taken as the measured   temperature. Disabled by default.   

       
    Fill lights.   
    Brightness of fill light in standby    It is used to set the brightness of the fill   light in standby mode.
       
    The larger the value, the brighter the fill   light. The default is 3%.   
       
    Brightness of recognition fill light   
    It is used to set the brightness of the fill   light in the face recognition state.
    The larger the value, the brighter the fill   light. The default is 100%.   
    Verify light duration    It is used to set the duration of the fill light in the face recognition state.
    The larger the value, the longer the lighting time of the fill light. The default is 3 seconds.

     

     

    2.7.3.4 General

    General settings are used to set the general information, rules and personnel of the device.

    Steps: Terminal settings interface → General settings

    Options Description
    About It is used to view the basic information of the terminal.
    The device name supports customization. Enter the device name in the name column and click "Save" to change the device name.
    Firmware Update Used for system updates. See 3.11.2.4 for details
    Date&Time 24-Hour Time The format of the time. When turned on, the time will be displayed in 24-hour format. Disabled by default.
    Date Format Set the format for date display.
    NTP Server Synchronization Used to set whether to automatically synchronize system time through the time server.
    When it is turned on, the date and time are synchronized with the specified time server;When it is turned off, the date and time need to be set manually.
    NTP Server Set the address of the NTP server when ‘NTP Server Synchronization’ is enabled.
    Time Zone Used to set the time zone of where the terminal is located.
    Date Set the date when ‘NTP Server Synchronization’ is off.
    Time Set the time when ‘NTP server synchronization’ is off.
    System Language Used to set up the terminal system language.
    The terminal supports 18 languages,
    Sound Used to turn the terminal on/off is enabled by default
    Volume Used to set the volume level when ‘Sound’ is on.
    Brightness Used to set the brightness of the terminal screen.
    Recognition Rules It is used to set the verification method and authority of personnel in different time periods. Refer to ‘3.6 Recognition Rules’ for details.
    Device Rules Used to set the period for the terminal to grant or deny access. A single device rule can be set for multiple periods.
    Personnel Used to add and manage personnel information. For details, refer to ‘1.9.1 Logging in Personnel Using Terminal Operations’
    Administrators Used to add and edit the administrator’s information.
    restart Used to reboot the device
    Factory Reset After factory reset, the device restarts and automatically enters the initialization process.
    ▲ After restoring the factory, all data will be cleared, including system logs, personnel data, etc. Please back up the data in advance.
    Reset Device Restore all settings and data to the state after initialization.

     

     

    2.7.3.5 Management

    Management, which includes three parts: user interaction, mode, and scenario

    2.7.3.5.1User Interaction
        image125
    Grouping Options Description
    Standby    Standby Message    It is used to set whether to display standby information.
    Face Mode: Enabled by default.
    Media mode: off by default   
    Line1 Standby Message    It is used to set the welcome message displayed when the terminal is in standby. Display up to 20 characters or 10 full-width text. Default: welcome   
    Line2 Standby Message    It is used to set the welcome message displayed when the terminal is in   standby. Display up to 20 characters or 10 full-width text. Default is blank   
       
    Others   
    On-screen Date&Time It is used to set the date and time display of the standby interface in media mode. Enabled by default.
    Standby Wallpaper It is used to set the wallpaper displayed when the terminal is in standby.
    ▲ The file size of a single photo is recommended to be less than 10M.
             ▲ The image format must be jpg, jpeg, png, bmp.
    Loop play: It is used to set whether to play the standby wallpaper in a loop.
    Rotation time: When "Loop" is set to on, it is used to set the time interval of wallpaper rotation. Unit: second
    Standby Video    It is used to set the video displayed when the terminal is in standby.   
       

       
    Multimedia Mode   
       
    Multimedia Mode   
    After it is turned on, the terminal screen only displays the face of the   person in the frame when the terminal is performing recognition,.   
       
    Prompt Message   
    Used to determine whether to display prompt information during face recognition.   Open by default.   
    Window Opacity Default: 100 (opaque)
       
    It is used to maintain the best presentation effect of the idle screen   content, please make appropriate settings according to the actual situation.   
       
    Window Size   
    Adjust the diameter of the floating circular window   
       

       
    Prompt   
       
    Text-Display Name   
    When the "Smart Access" is turned on,   the identified person’s name is displayed on the screen after the verification   successful. Enabled by default.   
       
    Text-Display Temperature   
    When the ‘Temperature Measurement’ or ‘Temperature Measurement + Smart Access’ is turned on, the temperature is displayed on the screen. Enabled by   default.   
       
    Verification Success Voice Prompt   
    Used to determine whether there is a voice prompt when the verification   is successful. Enabled by default.   
       
    Verification Failure Voice Prompt   
    Whether there is a voice prompt when the verification fails. Enabled by   default.   
    Voice Prompt Audio    The audio file of the voice prompt is the default system file, which can   be customized and uploaded by the user.
    Upload steps: FaceOffice > "Configuration Management" >   "Prompt Information" > "mp3 Import"   

     

    2.7.3.5.2 Mode

    Mode settings are used to set the mode of the terminal, you can choose 'Temperature Measurement Mode', 'Access mode' and 'Temperature Measurement + Access mode'.

    Steps: terminal settings interface → access control → mode

    ProjectDescription
    Smart AccessApplicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules.
    PrivacyWhen enabled, the face will not be displayed on the screen during face recognition.
    Temperature MeasurementApplicable to scenarios only require temperature measurement.Unnecessary to import people.
    Temperature Measurement + Smart AccessApplicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules.
    Prior Card/Fingerprint VerificationNon-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified.

    To use the Temperature Measurement Mode, the device needs to be equipped with a Temperature Measurement Module.

    2.7.3.5.3 Scenario

    Advanced Settings

    It is used to set various parameters for face recognition and Temperature Measurement.

     Steps: Terminal Settings interface → Management → Scenario→ Advanced

        image134   image136

    Parameter Description



    Facial Recognition
    1: N Threshold For details, refer to ‘3.11.3.5 Facial Recognition’
    1: 1 Threshold
    Repeat Recognition Intervals(s)
    Verification Success Display Time(s)
    Verification Success Display Time(s)



    Temperature Detection Settings
    Temperature Reading For details, refer to ‘3.11.3.6 Temperature Detection Settings’
    Temperature Alarm Threshold
    Body Overheating Settings Access Denied

    Access Granted and Record Event
    Dual-camera
    Ambient Temperature Compensation
    Emissivity
    Full Face

     

     

    Verification Mode

    Steps: terminal settings interface → Management → Scenario →verification mode

    The terminal supports three verification modes: "1:1 mode", "1:Nmode" and "mixed mode", and the default is "mixed mode".

    OptionsDescription
    1:N ModeUsed to compare the captured face with all registered persons.
    1:1 ModeIt is used to compare the captured face with the corresponding ID photo.
    Hybrid ModeAt the same time, it supports "1:1 mode" and "1:N mode" two verification modes. Default.

    System Extension

    Grouping Parameter Description
    Access Records    Refer to ‘3.11.3.16 Access Record’ for details.   
    Verification Sequence    Refer to ‘3.11.3.2 Verification Sequence’ for details.
    Additional Verification    Refer to ‘3.11.3.9 Addition Verification’ for   details.   
    ODSL Settings    ODSL Settings    Used to import configuration file. To import a configuration ;file, it is required to insert a USB flash drive behind the device in advance.
    Delete Configuration    Used to delete ODSL configuration file.   
                   Third Party Application It is used to view third-party apps installed on   the terminal and is used with ODSL. It is an advanced function for system expansion.   
    Web-client Management    Refer to ‘3.11.3.16 Web-client Management’ for   details.   

     

    2.7.3.6 Bluetooth Lock

    Used to set up the connection between the terminal and the Bluetooth lock.

    When the terminal links to a Bluetooth lock, the Bluetooth lock will be unlocked after the terminal is successfully identified.

    1. Turn on the Bluetooth of the Bluetooth lock.

    2. Import the lock configuration file into FaceOffice. FaceOffice > Device Management > Configuration Management > Lock pairing file import

    ▲ The lock configuration file is not imported to the terminal, and which cannot be paired with the Bluetooth door lock.

    ▲ Wrong configuration file, outdated lock configuration file, or wrong verification password will cause the operation of importing lock configuration to fail.

    ▲ Importing lock configuration files multiple times will overwrite/void the previous imported lock configuration files.

    ▲ After factory reset, the imported lock configuration files will be erased.

    1. Select 'Settings' > 'Bluetooth', open the 'Bluetooth' page, and confirm that it is turned on.

    2. On the 'Settings' > 'Bluetooth Lock' page, a list of the MAC addresses of all Bluetooth locks within 2 meters is displayed.

    3. Select the MAC address of the designated Bluetooth lock for pairing.

    ▲ When the terminal is linked with the Bluetooth lock sold by our company, it is required to import the key file issued by our company.

    ▲ When the user wants the terminal to be linked with other manufacturers' Bluetooth locks, it needs to be integrated with the Bluetooth lock in advance, please consult our company in that case. It is possible that the integration cannot be performed, so please take note in advance.

    2.7.3.7 Fingerprint Capture(Cloud)

    Fingerprint Capture is used to collect the fingerprints of new personnel.

    Existing personnel needs to add fingerprints in personnel management.

    Users who purchase fingerprint modules can use this function.

    1. Click on the fingerprint symbol above.

    2. After the prompt page appears, press your finger vertically on the fingerprint collection module, and move your finger out of the fingerprint collection module after hearing the beep sound.

    1. Enter the personnel's number and name.

    2. Click on the 'photograph' symbol below, and facing the camera for face collection.

    3. Click on 'Save'

    ▲ To add the second fingerprint, please repeat Step1 and Step2. Each person can register up to two fingerprints.

    2.7.3.8 Dry Contact

    Dry contact is used to set the control type of the dry contact interface.


    Options

    Suboption

    Description
       

       
    Relay   
    Open Door Dry contacts are connected to the access control controller or door lock for controlling the opening of the door
    Alert The dry contact is connected to the warning light, and the staff can be reminded by lighting the warning light when the verification fails, the temperature is abnormal, and there is no access authority.
    Signal Duration It is used to set the time of dry contact signal output.
    Value range: 200~10000 ms; default value: 2000 ms

     

    2.7.3.9 Open Door

    After clicking on 'Open door', the door lock controlled by the device will open for 5 seconds.

    2.7.3.10 Card Reader

    ▲ For the relevant parameters set by the card reader, the configuration information is provided by the corresponding IC card manufacturer.

    Grouping Parameter Description
       
    Card Reader   
    HID Module    Used to choose whether to enable the HID Module
    ▲ After the HID Module switch is changed, it needs to restart the device to take effect.
    Card Reader Option Select the card reader type. Support Mifare Classic and Mifare Ultralight
    KEY MODE    Select a key type.   
    KEY    IC card key. The key is provided by the   corresponding manufacturer.   
    Sector    Enter the area code where the data in the IC card   is located, the value is 0~15   
    Block    Enter the segment number of the data segment   where the data in the IC card is located.   
    Card Number Length Enter the card number length. The maximum value is 32.

     

    For the settings of the HID module, refer to the appendix '6.6 HID module settings' for details.

    2.7.3.11 Always Open

    It is used to control whether the access control connected to the device is in the always open state.

    2.7.3.12 Access Control Signal

    ▲ Terminal administrators need to have a basic understanding of the Wiegand protocol.

    ▲ When the terminal uses the ‘face + access control card’ verification method, it is required to set the access control signal.

    Options Suboption Description

    Wiegand   
    Used to   set the Wiegand type.   

    General
    Used to select a general Wiegand type.
    Include: 26-bit, H10302 37-bit, H10304 37-bit, Corporate 1000 35-bit, Corporate 1000 48-bit

    Customized
    It is used to customize the Wiegand type,   including parity, total number of digits, data digits, first even check, and   last odd check.   
    Facility Code    Used to choose whether to use the facility code   
    Facility Code    Used to identify facilities.   

    Output   
    It is used to customize the encoding of the   Wiegand signal output by the terminal in the case of a specific verification result   and is used for subsequent targeted secondary development.   

    Pulse Interval   
    Used to set the pulse interval of the Wiegand   signal.
       
    Value range: 100~2000; default value: 1000 us   

    Pulse Width   
    Used to set the pulse width of the Wiegand   signal.
       
    Value range: 20~400; Default value: 100 us   

    Invalid Card   
    It is used to set the encoding of the output   Wiegand signal when the card number is too long.
    It is limited to scenarios where the verification   mode is ‘1:1 Mode’ or ‘Hybrid Mode’.   

    1:1 Verification Failed
    It is used to set the encoding of the output Wiegand signal when the card number is in the library, but the verification fails.
    It is limited to scenarios where the verification mode is "1:1 Mode" or "Hybrid Mode".
    1:N Verification Successful It is used to set the encoding of the Wiegand signal output when the face verification is successful.
    Only applicable to scenarios where the verification mode is ‘1:N Mode’ or ‘Hybrid Mode’.
    Card Settings    Mifare Classic and FeliCa are optional.

    Among them, Mifare Classic provides six types of UID formats: 16-BIT MSB, 16-BIT LSB, 32-BIT MSB, 32-BIT LSB, 40-BIT MSB, and 40-BIT LSB.
    Beacon    Settings for linkage with warning lights via terminal RS485 interface
    Access Granted:Set the time for the warning light to turn on   when access granted
    Access Denied:Set the time for the warning light to be on when access   denied   

    Alarm Interface
    It is used to   switch the hardware alarm interface through the software interface.
    The alarm interface   provides two interfaces. Interface 1 defaults to ‘Door Magnetic Status   Detection’, and interface 2 defaults to ‘None’.   

    ▲ To edit the ‘Alarm Interface’, click on ‘Dashboard’ in the menu list on the left, and click on ‘Restart’ to restart the terminal to make the settings take effect.

    Select ‘Custom Wiegand Type’ to support editing the following parameters:

    OptionsDescription
    Total BitsUsed to set the total number of bits for the Wiegand signal. Value range: 26~80; default value: 80.
    Start of Personnel CodeDefault 9
    End of Personnel CodeDefault 24
    Facility CodeThe code used to describe the facility can be defined by the user.
    Start of Facility CodeUsed to set the location where the facility code starts. Default 1.
    End of Facility CodeUsed to set where the facility code ends.
    Parity CheckIt is used to set whether the encoding of the Wiegand signal adopts parity.
    Even parity positionAccording to the selected parity range, the position of the generated even parity bit
    Even parity startUsed to set the starting position of the even parity bit
    Even parity endUsed to set the end position of the even parity bit
    Odd test positionThe position of the generated odd parity bit according to the selected parity range
    Odd parity startsIt is used to set the starting position of sending check digit
    End of odd parityUsed to set the end position of the odd parity bit

    2.7.3.13 Tamper Alarm

    Used to sound an alarm when a terminal is tampered. Enabled by default.

    2.7.4 Personnel

    2.7.4.1 Add Personnel

        image150

     

     

    Step1 On the recognition page, select 'Personnel', or select 'Settings'> 'General' > 'Personnel', open the 'Personnel' page, and view the list of existing personnel.

    Step2 On the 'Personnel' page, click 'Add Personnel' to open the 'Add Personnel' page.

    Step3 Enter the number, name, and other information.

    Step4 Click on to collect face.

    If the user wants to use fingerprints as one of the verification methods, click on 'Add Fingerprint's below to collect fingerprints.

    Fingerprint Capture

    Step1 Click on the fingerprint symbol on the top.

    Step2 After the prompt page appears, press your finger vertically on the fingerprint collection module, and move your finger out of the fingerprint collection module after hearing the successful prompt sound of "di------".

        image157

     

    ▲ To add the second fingerprint, please repeat Step1 and Step2. Each person can register up to two fingerprints.

    Please refer to the following for the input items when adding a person individually. '6.4 Project description for adding a single person'.

    2.7.4.2 Personnel Details

    Step1 Select the person to edit from the person list to open the 'Personnel Details' screen.

    Step2 Edit related items on the 'Personnel Details' screen and click on 'Save' to complete the editing.

    ▲ Once the personnel are added, the personnel number cannot be edited.
    If you want to edit the personnel number, you need to delete the personnel and register again.

    2.7.4.3 Delete Person

    Step1 Select the person to edit from the person list to open the 'Personnel Details' screen.

    Step2 Click on the 'Delete' button on the upper right corner of the 'Personnel Details' screen to delete the personnel information.

    ▲ Recognition rules will not be deleted when personnel are deleted.

    2.7.4.4 Add in Batch

    ▲ It is recommended to use FaceOffice to add personnel in batch, refer to '3.5.2 Add in Batch' for details.

    Step1 Copy the personnel list to a USB flash drive for backup.

    ▲ The personnel list file only supports Excel files, and the file size must be less than 50M. ▲ The maximum number of personnel imported at a time must be less than 10,000.

    Step2 On the recognition page, select 'Personnel', or select 'Settings' > 'General' > 'Personnel' to open the 'Personnel' page.

    Step3 On the 'Personnel' page, select 'Add in Batch' to open the 'Select Recognition Rules' page.

    Step4 On the 'Select Recognition Rules' page, set the recognition rules uniformly for the personnel added in batch, and click on 'Next' to open the 'Import Personnel List' page.

    Step5 On the 'Import Personnel List' page, specify the file and click on 'Next' to open the 'Select the folder where the photos are located' page.

    Step6 On the 'Choose Folder for Photos' page, specify the folder where the photos of the person are located.

    ▲ If you do not want to upload personnel photos, you can choose an empty folder.
    ▲ The name of the photo in the personnel list template needs to be in one-to-one correspondence with the file name of the picture.

    2.7.4.5 Delete All Personnel

    Step1 On the recognition page, select 'Personnel', or select 'Settings' > 'Personnel' to open the 'Personnel' page.

    Step2 On the 'Personnel' page, click the 'Delete' button to delete all personnel.

    ▲ The recognition rules will not be deleted when clearing personnel.

    2.7.4.6 Search Personnel

    Step1 On the recognition page, select 'Personnel', or select 'Settings' > 'General' > 'Personnel' to open the 'Personnel' page.

    Step2 On the 'Personnel' page, slide the page up and down to browse the personnel list.

    Step3 In the personnel list, click on a person to view the detailed information of the specified person.

    Step4 On the 'Personnel' page, click the 'Search' button to open the search page.

    Step5 Select search criteria, enter information, and click on Search.

        image165

     

    2.8 Verify Function

    After completion of setting up the terminal and personnel management, a verification on functions is required to ensure that the information displayed on the page and the logical relationship are correct.

    2.9 Terminal Maintenance

    After the terminal is put into daily use, daily maintenance is required in case there is an abnormal situation.

    2.9.1 Alarm Information

    The terminal abnormal alarm information is shown in the following table:

    Alarm InformationAlarm Description
    Storage exception.When the available space of the terminal local storage is less than 15%, a prompt icon will be displayed in the upper right corner of the terminal screen, and the recognition records will be automatically scrolled and cleared.
    The camera is damaged.When the camera fails, a prompt message will be displayed on the upper left of the standby page: camera not found, please check the terminal.
    Tamper AlarmWhen the hanging terminal is tampered, an alarm will sound. On the recognition page, select ‘Settings’ > ‘Advanced’, turn off the ‘Tamper Alarm’ switch, and turn off the alert.
    ▲ Only applicable to hanging terminals
    Network failure.When the terminal is not connected to the cloud management platform due to network failure, the disconnection icon will be displayed in the upper right corner of the standby page.
    ▲ Only applicable to cloud service model.
    Personnel issued.When importing data from the cloud management platform, the upper left corner of the standby page displays the percentage of the download progress.
    ▲ Only applicable to cloud service model.

    2.9.2 View Running Status

    On the recognition page, select 'Running Status' to open the 'Running Status' dialog box.

    In the 'Running Status' dialog box, you can view the terminal's 'CPU usage', 'Memory usage', 'CPU temperature', 'Light brightness', the IP address used to log in to FaceOffice on the PC, and the QR code used to log in web management on mobile phone.

    2.9.3 Other Maintenance

    Options Description
    View terminal information    ‘2.7.3.4 General’   
    Reboot    ‘2.7.3.4 General’   
    Factory Reset    ‘2.7.3.4 General’   
    Restore default settings    ‘2.7.3.4 General’   
       
       Data   
    Export personnel data    ‘2.7.5.1 Export Personnel Data’   
    Import personnel data    ‘2.7.5.2 Import Personnel Data’   
    Export access records    ‘2.7.5.3 Exporting Access Records’   
    Clear recognition records    ‘2.7.5.4 Clearing Authentication Records’   

     


    3 FaceOffice

    3.1 Log in

    Step 1 Enter the FaceOffice login address in the address bar of the browser: http(s)://DEVICE_IP:8081,

    DEVICE_IP can be obtained in the terminal to view the running status, for example https://192.168.189.198:8081

    Step 2 If the browser prompts 'Not a private connection', click on 'Advanced' > 'Continue to xxx.xxx.xxx.xxx'

    (This prompt is normal, and users do not need to worry about privacy and security issues)

    Step 3 Enter the administrator's name and password.

    Step 4 Click on 'Login'

    image178 ​ OA

    image180 ​ HOME

    image182 ​ Cloud

    3.2 Layout Introduction

    3.2.1 Menu

    image-20230508143852779

     

    image-20230508143913619

    After logging in, the left menu bar is in the 'closed' state by default. Click on the '' icon on the left side of 'Dashboard' to control the contraction of the left menu bar.

    3.2.2 Menu Structure

    Different versions of FaceOffice have different functions available. See the table below for details. Among them, '×' indicates that there is no such function, and '√' indicates that this function is available.

    Main menu Secondary menu Description Home Cloud OA
       

       
    Dashboard   

    Dashboard
       
    View   attendance data, document application, equipment status, operating equipment   restart, etc.   

    √(Only device status)

    √(Only device status)
       
       
       

       
    Calendar   
       
    View records   according to different time dimensions   
       
    ×   
       
    ×   
       
       
    Personnel&Organization Personnel View, edit, add and delete personnel information √(Read Only)
    Organization Edit, add or delete organizational structure √(Read Only)
    Recognition Rule Recognition Rule Set verification methods and permissions for different periods ×


    Record
    Access View the records of successful and failed permission verification ×
    Attendance View and manage attendance records × ×
    Submission Process leaves and overtime applications, view document records × ×
    Leave View leave records × ×

    Attendance
    Shift View, edit, add and delete shift information × ×
    Overtime Select the type of overtime that employees are allowed to apply for × ×
    Leave View and manage public holidays and holiday types × ×
    TV Add, delete, view sign-in panel × ×

    FaceRing
    FaceRing Check FaceRing's online status × ×

    FcaeUI
    FaceUI Change your device's wallpaper, UI mode, etc. × ×
    Device Administrator Add and delete administrators ×

    Configuration

    Upload   various configuration files and download logs, etc.
    Device Manage basic information of devices and parameters of various functions
    Device Group Unified management of other devices on one device. ×

    For a device with the device group function enabled, there are only Dashboard, Personnel and Organizations, Recognition Rule, and Device if the role is a slave device.

    image-20230508144012867

    When the main menu is in the collapsed state, the second-level menu will be displayed when the mouse moves and hovers over the first-level menu icon.

    3.3 Dashboard

    3.3.1 Dashboard

    After login successfully, the dashboard is displayed by default.

    The Dashboard of normal device, master device, and slave device are different.

    3.3.2 Calendar

    The 'calendar' is used to view various records, which can be viewed from four dimensions: day, week, month, and year. Click on the icon on the calendar to view the corresponding records.

    image199

    image201

    image203

    Click on the corresponding icon to display specific information. Click on 'Export Data' to generate the data as an Excel file.

    3.4 Organization

     

    image-20230508140027708

    3.4.1 Default Organization

    The terminal has one and only one root organization by default, whose name is 'FaceSec'; it can be changed to your root organization's name, and it is recommended to use the company abbreviation.

    3.4.2 Add Organization

    Under the root organization, you can add more sub-organizations without limitation; click on 'Add' after an organization name, and the new organization will be a sub-organization of this organization.

    Step 1 Click on at the far right of the organization name.

    Step 2 Enter the organization's name.

    Step 3 Click on 'OK'

    image213

    3.4.3 Edit Organization

    Step 1 Move the mouse over the name of the organization and click on the '' that appears on the right

    Step 2 Edit the organization name

    Step 3 Click on 'OK'

    3.4.4 Delete Organization

    Click on '' after the organization name to delete the organization (except the root organization)

    Note: If there are personnel in the organization you plan to delete, those people will be moved to the root organization after the organization is deleted.

    3.5 Personnel

    3.5.1 Add Personnel

    For details on inputting items for adding a single person, refer to the following content:

    '6.4 Project description for adding a single person'.

    Step1 Click on 'Add Personnel'

    Step2 Upload photos and fill in required information. The personnel number, personnel name, and organization are required to enter. Single personnel can belong to multiple organizations. If no organization is selected, the personnel will be assigned to the root organization by default.

    Step3 Click on 'Submit'

    ▲ The personnel number cannot be edited later, please fill in carefully. The personnel number can be used again after the personnel is deleted.

    Please refer to '6.5 Photo Quality Requirements' for requirements of uploading photo.

    image-20230810103940609

    3.5.2 Add in Batch

    Step 1 Click on 'Add in Batch', click on 'Download Template' to download the file to the local. Fill in the personnel information according to the format requirements in the file. Among them, the personnel name, personnel number, and department are required to be filled in.

    Step 2 Import personnel information file as Excel.

    Step 3 Import personnel's photos file. The file name and file format of a single person's photo must be consistent with those filled in the personnel information file. The format of the person's photo supports JPG and JPEG formats. Compress all personnel photos directly into a ZIP format file.

    Step 4 Select the recognition rule and click on 'import'

    3.5.3 Personnel Export

    Step 1 Click on the 'Personnel Export' button, and the system will generate a file named 'export.zip'.

    Step 2 Download and decompress the file, where person.xlsx is the exported personnel information table. The time of exporting the file increases as the number of personnel increases.

    3.5.4 Edit Personnel Information

    If you need to edit personnel information, click on the 'Edit' button to make the changes. Note that the personnel number cannot be changed.

    image-20230810104236969

    3.6 Recognition Rule

    image-20230508140817687

    Recognition rules are used to set the verification methods and permissions of personnel in different periods.

    image238

    OptionDescription
    Rule nameName the rule.
    DescriptionDescribe the rule.
    verification method.How people are verified when they pass through the device.
    Time Rules.Set the period for the rule to take effect.

    Verification Method.

    For details, refer to '6.2 Verification Method Description'

    Time Rules

    OptionsDescription
    Name.Name the time rule.
    Weekdays.Choose which days of the week the rule will be effective.
    Effective time.Choose which periods during the day the rule will be effective.
    Access / PrintChoose whether Personnel are granted access or printing during the effective time of the rule.

    3.6.1 Add Recognition Rules

    Step 1 Click on 'Add Recognition Rules'

    Step 2 Fill in the rule name, description, verification method, and add time rules. Multiple time rules can be added to one recognition rule.

    Step 3 Click on 'Confirm'

    3.7 Record

    3.7.1 Access

    image-20230508140851433

    In the permission record, you can query the personnel access record, clear the access record, and export the access record

    Search:

    Step1 Enter the search conditions at the top of the page. You can search by name, recognition result, time individually, or in combination.

    Step2 Click on 'Search'. The search results will be displayed on the page.

    Clear records:

    Step1 Click on 'Clear Records'

    Step2 Click on 'Confirm'

    Export:

    Step1 Click on 'Export' to download the zip file.

    Step2 Unzip the zip file, which includes the file .(as an excel table) of authority records, personnel registration photos, snapshot photos, and near-infrared photos (the "Near-Infrared Photo" must be enabled in "Device Management->Recognition Records")

    Automatic Refresh

    Click on the 'image-20230523142648946'icon at the upper right corner to set an automatic refresh interval.

    Configure the header

    Click on the 'image-20230523142648946'icon at the upper right corner to hide/show or re-order the columns.

    企业微信截图_16848223775800

    image-20230523145902803

    3.7.2 Attendance

    image-20230508140907500

    Attendance Records show personnel's attendance records, attendance status, overtime status, and leave status.

    Search record:

    Step1 Enter query conditions at the top of the page. You can search by name, personnel number, shift type, and shift name. Click on the '' symbol at the upper right corner to filter attendance status and check-in date. Click on 'Reset' to clear all query conditions.

    Step 2: Click on 'Search'. The results will be displayed on the page.

    Step 3: View the search results. Scroll the bar at the bottom of the table to view more information or click on the 'Details' button to view details.

    Edit attendance record:

    Click on 'Edit' button to edit the clock in / clock out time of the personnel, and click on 'OK' to save.

    Export Attendance Report

    Click on 'Export' button to download the Excel file.

    retouch_2023052413462309

    3.7.3 Submission

    image-20230508140932258

    Search record:

    Step1 Enter the query condition at the top of the page. You can filter by personnel number, name, organization, and attendance options, and click on the symbol '' at the upper right corner to filter thedate. Click on 'Reset' to clear all query conditions.

    Step2 Click on 'Search'. The search results will be displayed on the page.

    Delete Record:

    Click on 'Delete' > 'OK' after each record.

    If an application is deleted, the application will be invalid.

    pending application:

    Administrators can click on 'Edit' to edit application information or click on 'Approved' or 'Reject' to process applications. The processed applications cannot be edited.

    3.7.4 Leave

    image-20230508140949002

    Leave Records show personnel's leave status and number of days of leaving.

    Search leave records

    Step1 Enter the query conditions at the top of the page. You can filter by name, personnel number, organization, and click on the symbol'' at the upper right corner to filter the holiday type and date. Click on 'Reset' to clear all query conditions.

    Step2 Click on 'Search'.

    3.8 Attendance Setting

    3.8.1 Shift Management

    image-20230508143459597

    Query shift:

    Enter the shift name or select whether it is an overtime shift and then click on 'Search'.

    Edit shift:

    Click on 'edit' button after the shift, edit the parameters, and click on 'Confirm'.

    Delete shift:

    Click on 'Delete' button after the shift and click on 'Confirm'.

    Create shift:

    Step 1: Click on 'Create Shift'.

    Step 2: Enter the shift name and other information, and then click on 'Confirm'.

    Step 3: The shift is created successfully.

    image-20230509095116183 Standard Shift

    image-20230509095132173 Flexible Shift

       

       
       
    Standard Flexible
    Shifted Name Fill in the shift name.
    Shift Type Standard:Required to clock in and out under the restricted timing.
    Flexible:Do not required clock in and out under the restricted timing and calculating total attendance duration weekly supported.
    Weekdays Select the days of the week to work

    Working Period from
    Set start time for shifts     ‘The earliest clocking in time’ - extra duration does not count in the attendance duration if clocking in time is earlier than the earliest clocking in time.

    Working Period to
    Set end time for shifts     ‘The latest clocking out time’ - extra duration does not count in the attendance duration if clocking out time is later than the latest clocking out time.   

    Public Holiday
    Set public holidays as weekdays or off days

    Organization
    Select the organizations corresponding to this shift.
    Break Time Set daily break time. (Break time is not counted in working hours);    
    ----------------------------------------------------------
    Overtime Whether to allow overtime for that shift. The overtime hours can be set as fixed or flexible. Flexible overtime means that the time is calculated according to the time applied on the overtime application form, or according to the actual time of clocking out from work.    
    ----------------------------------------------------------
    Segment clock in Need to clock in every period, and then set clock in interval.    
    ----------------------------------------------------------
    Attendance Time    
    The total hours of attendance per day.
       
    ----------------------------------------------------------
    Weekly Working Hours    
    -----------------------------------------------------------------------------------------
    The total attendance duration needs to be satisfied for every week.
    Daily Working Hours    
    ----------------------------------------------------------------------------------------
    The minimum or maximum attendance duration for every day.

    ▲ The regarding attendance records will be displayed on the last working day after setting up the total attendance duration for every week. The daily attendance records will not be generated if clocking in / out on off days.

    3.8.2 Attendance Parameter Settings

    Step 1: Click on 'Attendance Settings'.

    Step 2: Enter the parameters.

    Step 3: Click on 'Submit'.

    OptionsDescription
    Flexible Clock in & outRefers to allowing employees to clock in late or clock out early outside of their required working hours. For example, if a shift's working hours are from 9:00 to 10:00, with a flexible clock in / out time of 10 minutes, clocking in before 9:10 and after 8:50 are both considered as valid and will not be counted as late or leaving early.
    Late clock in as absenceAfter checking this option, it is required to set a duration for late clocking in, which can be set to be half-day or full-day absence.
    Early clock out as absenceAfter checking this option, it is required to set a duration for early clocking out, which can be set to be half-day or full-day absence.

    3.8.3 Overtime Management

    Overtime on weekdays, off days, public holidays option is enabled by default, it is not allowed to apply for this type of overtime after the option is disabled.

    3.8.4 Leave Management

    3.8.4.1 Public Holiday Settings

    Set weekly working days and off days and select public holidays according to specific country / region; it is also allowed to manually set off days and public holidays.

    Off Day Management

    Step1 Check the off days for each week.

    Step2 If there are special dates, click on 'Add Adjustment'.

    Step3 Select the date and choose to set it to an off day or workday.

    ▲ After an off day is selected, it is not allowed to choose that day as a workday in a shift. The newly set off day will not affect past shifts.

    Public Holiday Settings

    Step 1: Click on 'Select' and choose country / region. The public holidays for the country / region will be displayed below.

    Step 2: Delete unnecessary holidays. Click on 'Add Public Holiday' to set dates and name for the holiday if it is needed to add other holidays.

    Step 3: Click on 'Submit'.

    3.8.4.2 Holiday Management

    In this page, it is possible to manage the holiday types.

    To enable a type of holiday, click on the seventh column of the table to enable it.

    To edit an existing holiday, click on 'Edit', edit the information, and click on 'Submit'.

    To delete an existing holiday, click on 'Delete' > 'OK'

    image282

    Add a new type of holiday:

    Step 1: Click on 'Add', enter the information.

    Step 2: Click on 'Submit'.

    Step 3: Choose whether to enable the holiday type.

    Parameters of holiday type:

    OptionsDescription
    TypeHoliday name
    Minimum DurationThe minimum duration of each holiday.
    Include Off DaysDetermine whether to include off days.
    Attendance CalculationDetermine Whether to included holiday in attendance.

    3.8.5 TV

    3.8.5.1 TV Dashboard

    image-20230508143554967

    Step 1 Click on 'Add TV' > 'Dashboard'.

    Step 2 Enter the dashboard theme and select 'Attendance Dashboard' as the dashboard type.

    Step 3 Select the dashboard background or click on '' to upload a local image.

    Step 4 Click on 'Create'.

    3.8.5.2 Show TV Dashboard

    Click on 'Open Dashboard' to display all personnel's face recognition records for the day, which are displayed as the registration photos of personnels who clock in via face recognition. Click on the full-screen icon at the upper left corner of the logo to enter full-screen mode.

    3.8.5.3 Share TV Dashboard

    Click on 'Copy Link' and anyone can view the content of the dashboard through the link.

    3.9 FaceRing

    image-20230509100621704

    Used to display the online status of personnel of FaceRing.

    3.9.1 Install FaceRing Client

    Double-click on the .exe file and follow the prompts to install it step by step until the installation is complete.

    After installation, the desktop icon will be displayed.

    ▲ If the device changes the network protocol, such as changing from HTTP to HTTPS, it is required to restart FaceRing before using it.

    3.9.2 Login

    Step 1 Launch FaceRing and enter the terminal's IP.

    Step 2 Enter the ID of personnel on the terminal and FaceRing password, then click on 'Login'.

    Step3 After log in successfully, you can use FaceRing on the terminal to video intercom with personnel.

    When logging in FaceRing for the first time, you will be recommended to change the password. You can choose whether to change it or not.

    3.9.3 Video Call Process

       image311    image313
                        Calling                                        In video call                            Open the door during a call

     

     

    3.9.4 Call Log

    Click on 'Call log' on the home page to view the call log, including answered and missed calls.

    3.9.5 Configuration

    Click on 'Configuration' to enter the configuration page, on which you can edit the IP address, enable automatic login, and verify the password when opening the door.

         image319

     

    3.9.6 Attendance

    Click on 'Attendance' to view attendance status

    Apply for overtime:

    Step1 Click on 'Attendance' > 'Overtime' > 'Apply for overtime.

    Step2 Fill in overtime hours, shifts, overtime type, start and end time, reason for overtime.

    Step3 Click on 'Apply'

    After the applied successfully, the status of the application will be displayed, and the administrator can approve it in 'FaceOffice' > 'Records' > 'Document Record'.

    Yellow icon indicates that the application is waiting for approval, green icon indicates that the application has been approved, and red icon indicates that the application has been rejected.

      image325   image327

     

     

    Apply for leave:

    Step1 Click on 'Attendance' > 'Overtime' > 'Apply for leave'.

    Step2 Fill in the leave type, start and end time, reason for leave.

    Step3 Click on 'Apply'.

    After the applied successfully, the status of the application will be displayed, and the administrator can approve it in 'FaceOffice' > 'Records' > 'Document Record'. Yellow icon indicates that the application is waiting for approval, green icon indicates that the application has been approved, and red icon indicates that the application has been rejected.

       image331    image333

     

    3.9.7 Change Password

    Step1 Click on 'Change Password'

    Step2 Enter the current password.

    Step3 Enter the new password.

    Step4 Click on 'Submit'

    ▲ Changing the login password can also be done in 'FacesecOffice' →'Organization Management' → 'Personnel' →'Edit Personnel Information'.

    3.10 FaceUI

    3.10.1 Style

    Logo Change Logo

    Click on 'Upload Image' and select a file.

    Change Wallpaper

    Click on another wallpaper image on the page and the wallpaper of terminal will automatically switch to it. To use other wallpapers, click on the "+" at the end of the wallpaper list and upload a new wallpaper, click on it.

    3.10.2 UI Function Mode

    The UI Function Mode is used to set the functions of the terminal's home page UI, including 'application mode' and 'access mode'.

    3.10.2.1 FaceUI Mode

    image-20230524145723246

    In 'application mode', applications can be displayed directly in forms of icons.

    On the left side, you can choose which applications to display and configure them.

    For detailed instructions on using the applications, please refer to "4 Interactive".

    3.10.2.2 Access Mode

    Face recognition / card reader, as the default access mode, automatically sensing personnel to initiate the comparison process.

    3.11 Device Management

    3.11.1 Administrator

    image-20230508143644598

    This page is used to display administrator's information. You can add, edit, and delete the administrator.

    Add new administrator:

    Step1 Click on the 'Add Administrator' to enter the 'Add Administrator' interface.

    Step2 Upload a portrait of the administrator, enter the administrator's name, and set a password (4 digits only).

    Step3 Click on 'Submit'

    Delete administrator:

    Step1 Click on 'Delete'

    Step2 Click on 'Confirm'

    企业微信截图_16849996872831

    image350

    OptionsDescription
    PhotoClick on the camera icon to scan the administrator's face.
    NameEnter the administrator’s name.
    PasswordEnter the four-digit password.

    ▲ Up to 10 terminal administrators can be registered in one terminal.

    3.11.2 Configuration

    image-20230508143705666

    Configuration management is used to import and export various files of the terminal, including:

    OperationScenario
    Import/Backup Settings FileUsed to set multiple terminals with the same parameters:
    1) Pre-set a terminal, such as terminal A.
    2) Export the setting file (XML) of terminal A.
    3) Import the setting file (XML) to other terminals.
    Import/Export Prompt MessageUsed to modify the prompt message of the terminal:
    1) Export the prompt information (JSON) of the terminal.
    2) Edit the prompt information (JSON).
    3) Import the prompt information (JSON) to the terminal and overwrite the original prompt information.
    Import MP3Used to import user-owned MP3 audio files to the terminal when the prompt information is set to "MP3 Prompt" to replace the default audio.
    Export/Clear LogsUsed to export and clear terminal logs to release storage space.
    Import Upgrade PackageUsed to upgrade the terminal system version and import upgrade packages to the terminal.
    Export/Clear Test LogsUsed to export and clear test logs to release storage space. This function is not usually used by users.
    Import Authorization FileUsed to import authorization files to upgrade the number limitation of terminal personnel or enable Temperature Measurement Mode.
    ▲ For detailed information about terminal authorization files, please refer to ‘6.1 Terminal Authorization Instruction’
    Import Resource FilesAdvanced function, rarely used by users.
    Import Pictures/VideosUsed to import advertising pictures/videos with brand information to be played when the terminal is in standby mode or during recognition. To play during recognition, the terminal must be set to media mode.
    Import Process Customization FilesUsed to customize the recognition process of the terminal. An advanced function for system expansion.
    Import Bluetooth Lock Pairing FilesUsed to control the Bluetooth locks when the terminal and Bluetooth locks are connected.

    ▲ When importing and exporting large files such as upgrade packages, videos, and logs, the waiting time may be too long. It is recommended to use a computer to import.

    3.11.2.1 Setting File

    Export Setting file

    Prerequisites: Setup for Terminal A has been completed.

    Click on 'Backup Device Settings', and the browser will prompt you to download 'bbox_settings.xml' to local device.

    ▲ The terminal settings file can be edited by using a text editor.

    Import setting file

    Prerequisites:

    1. The settings file of Terminal A has been exported to the computer.

    2. Login to Terminal B's web management page.

    Step 1 Click on 'Device Management' > 'Configuration Management' > 'Import Settings File' to open the 'Import Settings File' page.

    Step 2 On the 'Import Settings File' page, click on 'Choose File' to specify Terminal A's exported settings file.

    Step 3 Click on 'Import' to import Terminal A's settings to Terminal B.

    3.11.2.2 Prompt Messages

    Export prompt information

    Prerequisite: Smart prompt information has been importe

    ▲ The default prompt information cannot be exported.

    Click on 'Device Management' > 'Configuration Management' > 'Export Prompt Messages' to automatically download the terminal's prompt message file to local device.

    Import prompt message

    Step 1: Click on 'Device Management' > 'Configuration Management' > 'Import Prompt Messages' to open the 'Prompt Messages' page.

    Step 2: On the 'Prompt Messages' page, click on 'Choose File' to specify the prompt message file.

    ▲ The prompt information file is in JSON format.

    voice export

    Click on 'Voice export' to download the voice file.

    ▲ The default prompt voice cannot be exported.

    voice import

    Step 1: Click on 'Device Management' > 'Configuration Management' > 'Voice Import' to open the 'Voice Import' page.

    Step 2: On the 'Voice Import' page, click on 'Choose File' to specify the MP3 files for the following three scenarios:

    1. Verification successful prompt message;

    2. Verification failed prompt message;

    3. 'Please place your ID in the sensing area' prompt message;

    4. 'Normal temperature' prompt message;

    5. 'Abnormal temperature' prompt message;

    6. 'Please aim at the camera to re-measure temperature' prompt message;

    7. 'Current time prohibits passage' prompt message;

    8. 'You do not have access permissions' prompt message.

    3.11.2.3 Logs

    Export logs

    Click on 'Download Logs' to pack and download the terminal logs to local device.

    ▲ The download process may take time according to the log size.

    Clear logs

    Prerequisite: Terminal logs have been exported to the local device.

    ▲ Clearing logs is irreversible, please be careful.
    ▲ Before clearing the logs, export a backup of the logs. ▲ Logs will also be cleared when restoring the terminal to factory settings.

    Clicking on 'Clear Logs' will delete the existing logs directly.

    3.11.2.4 System Update

    Prerequisites: Contact technical support to obtain the upgrade package, whouse name is "software_version_number.zip".

    Click on 'Import Upgrade Package' and select the upgrade package.

    Step 1 Click on 'Device Management' > 'Configuration Management' > 'Software Update'.

    Step 2 Click on 'Import Upgrade Package' > 'Choose File' and select the zip upgrade package that has been obtained in advance.

    Step 3 Wait for the system to read and verify, then the package will be imported automatically.

    Step 4 After the upgrade package is successfully imported, the terminal will automatically upgrade and restart.

    ▲ As the upgrade package file size may be large, it is recommended to import it from a computer.
    ▲ During the terminal upgrade process, the terminal web management tool will be disconnected from the terminal, and it will not be accessible temporarily. After the terminal upgrade is completed, the connection will be restored, and the webpage can be accessed again after refreshing.

    3.11.2.5 Test Mode

    Functions that are not for users, the description is omitted.

    3.11.2.6 License

    Prerequisites: Authorization services and authorization file are purchased and obtained respectively. This mainly aims to authorize the maximum number of registered photos of personnel in the terminal.

    Click on 'Import license' and select the license file.

    Step 1 Click on 'Device Management' > 'Configuration Management' > 'License'.

    Step 2 Click on 'Import license' and select license file.

    Step 3 Wait for the system to import the file automatically.

    3.11.2.7 Resource File

    Functions that are not for users, the description is omitted.

    3.11.2.8 Standby Page

    Import Image

    Step 1: Click on 'Device Management' > 'Configuration Management' > 'Standby Page'.

    Step 2: Click on 'Image Import' > 'Choose File' to specify the image or image's zip package.

    Step 3: Wait for the system to read the file automatically.

    ▲ The file size of a single image should be less than 30M. ▲ The number of images uploaded for one time should be less than 30.
    ▲ Image formats in jpg, jpeg, png, and bmp are supported.

    Import Video

    Step 1: Click on 'Device Management' > 'Configuration Management' > 'Standby Page'.

    Step 2: Click on 'Video Import' > 'Choose File' to specify the video or video's zip package.

    Step 3: Wait for the system to import the file automatically.

    ▲The total capacity of video files that the terminal can import is 1GB.
    ▲ The file size of a single video should be less than 1GB. ▲ The video format supported is mp4.
    ▲ The recommended aspect ratio for materials is 9:16.

    3.11.2.9 Custom Verification Sequence

    Click on 'Process Customize File Import' > 'Select File' and specify the process customization file.

    Step 1 Click on 'Device Management' > 'Configuration Management' > 'Custom Verification Sequence'.

    Step 2 Click on 'Process Customization File Import' > 'Select File' to specify the process customization file.

    Step 3 Wait for the system to import the file automatically.

    3.11.2.10 Lock Pair File

    Click on 'Lock Pair File', 'Select File' to select the Bluetooth lock pairing file and enter the Verification password.

    Step 1: Click on 'Device Management' > 'Configuration Management' > 'Lock Pair File'.

    Step 2: Click on 'Import Lock Pair File' > 'Select File' to select the Bluetooth lock pairing file and enter the Verification password.

    Step 3: Click on 'Import'.

    image-20230525153253430

    image376

    ▲If the verification password is incorrect, the file cannot be imported.
    ▲ The Bluetooth lock pairing file and verification password are provided as accessories when the user purchases the Bluetooth lock.

    3.11.3 Device Management

    image-20230508143725733

    In the 'Device Management', various functions of the device can be configured.

    3.11.3.1 About

    'About' is used to view basic information of the terminal.

    The device name can be customized. Enter the device name in the name column and click on 'Save' to change the device name.

    3.11.3.2 Date & Time

    Options Description
       

       
    Date & Time   
    24-Hour Time The format of the time. When turned on, the time will be displayed in 24-hour format. Disabled by default.
    Date Format Sets the format for date display.
    NTP Server Synchronization Used to determine whether to automatically synchronize system time through NTP server.
    When enabled, the date and time are synchronized with NTP server;
    When disabled, the date and time need to be set manually.
    NTP Server Set the address of the NTP server when ‘NTP Server Synchronization’ is enabled.
    Time Zone    Used to set the time zone of terminal located.
    Date    Set the date when ‘NTP Server Synchronization’ is disabled.
    Time    Set the time when ‘NTP server synchronization’ is enabled.

     

    3.11.3.3 User Interaction

    Grouping Options Description

    Multimedia Mode
    Face Mode Set by default. When person detected, the interaction of the comparison is displayed in full screen.
    Media Mode When person detected, a small circular window hangs on screen to display the interaction of the comparison.
       

       
    Standby
    Standby Message It is used to set whether to display standby information. Enabled by default.
    Line 1 Standby Message It is used to set the welcome message displayed on screen when the terminal is in standby mode. Display up to 20 characters or 10 full-width text. Set as ‘Welcome’ by default.
    Line 2 Standby Message It is used to set the welcome message displayed on screen when the terminal is in standby mode. Display up to 20 characters or 10 full-width text. Set as blank by default.
    On-screen Date & Time It is used to set the date and time display of the standby interface. Enabled by default.

    Multimedia Mode   
    Prompt Message It is used to determine whether to display prompt message during face recognition. Enabled by default.

    Window Opacity
    Default: 100 (opaque)
    It is used to maintain the best presentation effect of the idle screen content, please make appropriate settings according to the actual situation.
    Window Size Adjust the diameter of the floating circular window


    Prompt
    Display Name When the "Smart Access" is turned on,   the identified person’s name is displayed on the screen after the verification   successful. Enabled by default.   
    Display Temperature When the ‘Temperature Measurement’ or ‘Temperature Measurement + Smart Access’ is turned on, the temperature is displayed on the screen. Enabled by default.   
    Verification Success Voice Prompt Used to determine whether there is a voice prompt when the verification is successful. Enabled by default.
    Verification Failure Voice Prompt Whether there is a voice prompt when the verification fails. Enabled by default.
    Voice Prompt Audio The audio file of the voice prompt is the default system file, which can be customized and uploaded by the user.Upload steps: FaceOffice > "Configuration Management" > "Prompt Information" > "mp3 Import"

    3.11.3.4 Working Mode

    Working mode is used to set the working mode of the terminal.

    ProjectDescription
    Smart AccessApplicable to scenarios only require verification (default value)It requires login of personnel and setting of recognition rules.
    Temperature MeasurementApplicable to scenarios only require temperature measurement.Unnecessary to import people.
    Temperature Measurement + Smart AccessApplicable to scenarios that require both verification and temperature measurement at the same time.It requires login of personnel and setting of recognition rules.
    PrivacyWhen enabled, the face will not be displayed on the screen during face recognition.
    Prior Card/Fingerprint VerificationNon-face verification methods are preferred for verification. After it is enabled, if the verification method of the device is only face verification, it cannot be verified.

    ▲ To use the temperature detection function, it needs to be equipped with a Temperature Measurement module.

    3.11.3.5 Access Records

    Access records are used to set the storage and transmission of recognition records, making it easier for testers to obtain necessary information.

    OptionsDescription
    Near-infrared PhotosUsed to determine whether to enable near-infrared photos. Enabled by default. When enabled, recognition records include near-infrared photos.
    Image File FormatUsed to set the size of the recognition image. Available options: Standard, Economy
    ▲ Restart the terminal to apply changes.
    ▲ The size of the snapshots affects the consumption speed of the terminal storage, choose the best option based on actual scenario.
    Record TransferInterface for setting up the transfer of access records to third parties. Disabled by default.

    Record Tranfer is one of the ways to link with other systems. When a recognition record is generated, it will be pushed to a pre-configured receiving server. After the server receives the pushed information, it will proceed with the next step of customized business processing.

    OptionsDescription
    Record TransferIt is used to determine whether to enable access record transmission. Enabled by default.
    Communication ProtocolsWhen ‘Recognition Record Transmission’ is enabled, it is used to display the communication protocols ws (WebSocket) and http used for recognition records transmission. WebSocket is set by default.
    ▲ When http is selected, both http and https are supported.
    Re-pushIt is used to determine whether to repeat the transmission of recognition records.
    IP AddressIP When ‘Recognition Record Transmission’ is enabled, it is used to set the IP address of the transmission destination.
    Port Numberws(WebSocket) When ‘Recognition Record Transmission’ is enabled, it is used to set the communication protocol as the port of the transmission destination under ws (WebSocket).
    Alert Port NumberSet the port number used for the alert when an exception occurs.
    Serial Interface TransferIt is used to determine whether to transmit through the serial interface.

     

    3.11.3.6 Card Reader

    ▲ For the relevant parameters set by the card reader, the configuration information is provided by the corresponding IC card manufacturer.

    Grouping Parameter Description
       
    Card Reader   
    HID Module    Used to choose whether to enable the HID Module
    ▲ After the HID Module switch is changed, it needs to restart the device to take effect.
    Card Reader Option Select the card reader type. Support Mifare Classic and Mifare Ultralight
    KEY MODE    Select a key type.   
    KEY    IC card key. The key is provided by the   corresponding manufacturer.   
    Sector    Enter the area code where the data in the IC card   is located, the value is 0~15   
    Block    Enter the segment number of the data segment   where the data in the IC card is located.   
    Card Number Length Enter the card number length. The maximum value is 32.

     

    For the settings of the HID module, refer to the appendix '6.6 HID module settings' for details.

    3.11.3.7 Access Control Signal

    Options Suboption Description

    Wiegand   
    Used to   set the Wiegand type.   

    General
    Used to select a general Wiegand type.
    Include: 26-bit, H10302 37-bit, H10304 37-bit, Corporate 1000 35-bit, Corporate 1000 48-bit

    Customized
    It is used to customize the Wiegand type,   including parity, total number of digits, data digits, first even check, and   last odd check.   
    Facility Code    Used to choose whether to use the facility code   
    Facility Code    Used to identify facilities.   

    Output   
    It is used to customize the encoding of the   Wiegand signal output by the terminal in the case of a specific verification result   and is used for subsequent targeted secondary development.   

    Pulse Interval   
    Used to set the pulse interval of the Wiegand   signal.
    Value range: 100~2000; default value: 1000 us   

    Pulse Width   
    Used to set the pulse width of the Wiegand   signal.
    Value range: 20~400; Default value: 100 us   

    Invalid Card   
    It is used to set the encoding of the output   Wiegand signal when the card number is too long.
    It is limited to scenarios where the verification   mode is ‘1:1 Mode’ or ‘Hybrid Mode’.   

    1:1 Verification Failed
    It is used to set the encoding of the output Wiegand signal when the card number is in the library, but the verification fails.
    It is limited to scenarios where the verification mode is "1:1 Mode" or "Hybrid Mode".
    1:N Verification Successful It is used to set the encoding of the Wiegand signal output when the face verification is successful.
    Only applicable to scenarios where the verification mode is ‘1:N Mode’ or ‘Hybrid Mode’.
    Beacon    Settings for linkage with warning lights via terminal RS485 interface
    Access Granted:Set the time for the warning light to turn on   when access granted
    Access Denied:Set the time for the warning light to be on when access   denied   

    Alarm Interface
    It is used to   switch the hardware alarm interface through the software interface.
    The alarm interface   provides two interfaces. Interface 1 defaults to ‘Door Magnetic Status   Detection’, and interface 2 defaults to ‘None’.   

    Select ‘Custom Wiegand Type’ to support editing the following parameters:

    OptionsDescription
    Total BitsUsed to set the total number of bits for the Wiegand signal. Value range: 26~80; default value: 80.
    Start of Personnel CodeDefault 9
    End of Personnel CodeDefault 24
    Facility CodeThe code used to describe the facility can be defined by the user.
    Start of Facility CodeUsed to set the location where the facility code starts. Default 1.
    End of Facility CodeUsed to set where the facility code ends.
    Parity CheckIt is used to set whether the encoding of the Wiegand signal adopts parity.
    Even parity positionAccording to the selected parity range, the position of the generated even parity bit
    Even parity startUsed to set the starting position of the even parity bit
    Even parity endUsed to set the end position of the even parity bit
    Odd test positionThe position of the generated odd parity bit according to the selected parity range
    Odd parity startsIt is used to set the starting position of sending check digit
    End of odd parityUsed to set the end position of the odd parity bit

    3.11.4 Device Group(OA、Home)

    3.11.4.1 Add Device

    Method 1: Scan Local Area Network (LAN) to add devices.

    Step 1: Click on 'Scan LAN' and wait for the results

    Step 2: Select the desired devices and click on 'link'

    Method 2: Manually add devices

    Step 1: Click on 'Add Device'

    Step 2: Enter the IP address and S/N of the desired slave devices, name it, and click on 'Confirm'

    Step 3: After adding slave devices successfully, click on 'Finish' to complete the addition, or click on 'Continue Adding' to repeat Step 2. If the addition fails, click on 'Back' to edit the input information, or click on 'Retry' to add the device again.

    ▲ To replace the master device to which the slave device belongs, you need to restore the factory settings of the slave device before connecting and before restoring the factory, it is recommended to export the records stored in the slave device.
    ▲ In the current version,a master device can connect up to 7 slave devices.

    3.11.4.2 Delete Device

    Click on 'Delete Device' on the right side of the device list to delete the corresponding device.

    After deletion, the master and slave devices will be unlinked, and the data from the slave device will no longer be uploaded to the master device.

    3.11.4.3 Synchronize Personnel Information

    Click on 'Synchronize Personnel Information' to send personnel and organization information to the slave devices.

    ▲ After changing the personnel or organization information, please synchronize the information to the slave device in time.

    3.11.4.4 Data Update

    The slave devices automatically transfer recognition and attendance records to the master device.

    3.11.4.5 Jump to Slave Device

    Click on 'Jump' to go to the corresponding slave device's FaceOffice page.

    4 Interactive

    4.1 Recognition

    Use face recognition or other verification methods for verification whentesters pass through the terminal and check the verification results.

    4.1.1 Standby

    1) No standby page setting: the page displays a static system default standby wallpaper;

    2) Standby page settings applied: The page displays information, plays standby images, or videos according to the settings.

    4.1.2 Recognition Process

    1. Verifying:

    When the tester's face is facing the screen or the touch screen is tapped three times, the recognition page opens and displays the prompt: Verifying, please wait...

    image-20230511093416891

    1. Face is not facing the screen:

    When the tester's face is not facing the screen, or the quality of face recognition is not good, a prompt message will be displayed on the recognition page: Please face the screen.

    4.1.3 Verification Result

    1. Verification succeeded

    When the tester uses the specified verification method and the identity verification is successful, a prompt message will be displayed on the recognition page: Verification successful, XXX, Hello

    image-20230511110720612

    1. Verification failed

    When the tester uses the specified verification method and the identity verification is failed, the recognition page displays a prompt message: verification failed, try it again.

    image-20230511095446134

    4.2 Temperature Measurement

    When the terminal switches on the 'Temperature Measurement' or' Temperature Measurement + Access' mode and the tester passes through the terminal, the tester should use the face verification method for verification and checks the verification result.

    When the 'Full Face' is turned on for Temperature Measurement, a white dotted face frame will appear on the screen when the temperature is measured.

    4.2.1 Temperature Measurement Process

    1. :Temperature Measurement mode is not turned on:

    When the device is not connected to the thermal camera, a prompt message is displayed: IT camera not found, please check the device.

    image-20230511093648263

    1. The face is not in the Temperature Measurement area:

    When the tester's face does not appear in the Temperature Measurement area, the recognition page will display a prompt message: Please aim at the camera to measure the temperature again.

    image-20230511093936074

    4.2.2 Verification Result

    4.2.2.1 Temperature Measurement Mode

    1. The temperature is normal:

    When the tester's temperature is normal, the recognition page will display a prompt message: Normal temperature: temperature value

    image-20230511094517720

    1. Unusual Temperature:

    When the tester's temperature is abnormal, a prompt message will be displayed on the recognition page: Unusual Temperature: temperature value.

    image-20230511095929593

    4.2.2.2 Temperature Measurement + Access Mode

    1. Normal Temperature Verification Successful

    When the tester's temperature is normal and the identity verification is successful, a prompt message will be displayed on the recognition page: Normal Temperature:temperature value, hello,XXX

    image-20230511094747288

    1. Unusual Temperature&Verification successful

    When the tester's temperature is unusual and the verification is successful, the recognition page will display a prompt message: Unusual Temperature: temperature value, XXX, hello.

    image-20230511100221860

    1. Unusual Temperature & Verification Failed

    When the tester's temperature is unusual and the identity verification is failed, the recognition page displays a prompt message: Unusual Temperature: temperature value, verification failed, please try again.

    image-20230511100715080

    1. Normal Temperature & verification failed

    When the tester's temperature is normal and identity verification is successful, the recognition page displays a prompt message: Normal Temperature: temperature value, verification failed, please try again.

    image-20230511102741156

    4.3 Attendance(OA)

    When the device is in the application mode and the attendance application is enabled, you can click the application to clock in on the terminal.

    Step1 Click on the 'Attendance' button on the screen.

    Step2 Select the type of clock in.

    Step3 Perform face recognition verification.

       image-20230525141556862   image423

     

    4.4 Visitor(OA)

    When the device is in the application mode and the visitor application is enabled, you can click on the application to select a person to have video intercom on the terminal.

       image427   image429

    When using the visitors application to make a call for the first time, a prompt window as shown in the figure below will appear. Click on 'Advanced' > 'Proceed to facing.facesec.com'

           image433

     

    For first-time use, the system will request camera permission; click on 'agree' to proceed.

    4.5 Access/Print

    When the device is in the application mode and the 'Permission/Print' application is enabled, you can click on the application on the terminal to enter the verification process. The specific verification method can be set in the recognition rules.

    4.6 Doorbell

    When the device is in the application mode and the 'Doorbell' application is enabled, you can click on the doorbell application on the terminal to one-touch call a fixed person.

    image-20230511133043317

           image438

    5 System Extension

    5.1 Overview

    Category Extension Description
    Terminal customization Text and voice of prompt message You can customize your own text and voice of prompt message.
       

       
    Digital sign   
    Terminal Import images or videos to the terminal to play on the standby screen.
    Cloud Management Platform Upload images or videos to the extension app on the cloud management platform for uniformed management of multi-play schedules and multi-device play tasks.
       

       
    Function extension   
    Terminal WebAPI Integrate with third-party business systems, such as ERP, OA, MES, etc., by directly accessing and controlling the terminal through the WebAPI. eg. Integration with business systems such as ERP, OA, and MES.
    Cloud management platform WebAPI Integrate with third-party business systems, such as ERP, OA, MES, etc., by accessing user-specific data on the cloud through the WebAPI. eg. Integration with business systems such as ERP, OA, and MES.
    Terminal PUSH Real-time push of recognition records from the terminal to the user's server. Suitable for applications with high real-time response requirements, such as CRM systems, meeting check-ins, and visitors.
    Cloud management platform PUSH Real-time push of recognition records from the cloud management platform to the user's server. Suitable for applications with high real-time response requirements, such as CRM systems, meeting check-ins, and visitors.
    Terminal ODSL Embed third-party apps into the terminal workflow using ODSL to customize the workflow.
    Application Example 1: Perform secondary verification for valid tickets, conference attendees, or daily attendance after identity verification for intelligent scene applications.
    Application Example 2: Embed the terminal as an identity recognition step within the actual business process.
    Terminal Android JavaSDK Third-party developers can use the provided Android JavaSDK for secondary development.
    Hardware I/F Link with other manufacturers' security systems, fire systems, card readers, electric locks, access control controllers, elevator controllers, speed gates, warning lights, and other devices.

    ▲ For details on system extension, please contact us or a certified distributor.

    5.2 Summary of terminal WebAPI (RESTful)

    The built-in FaceOffice service in the terminal provides a way to remotely access and manage terminal devices through a web page on a PC.

    The WebAPI provided by the built-in FaceOffice enables third-party developers / ISVs to quickly integrate their own business development with the system.

    By using the WebAPI provided by the built-in FaceOffice, the applications on third-party platform can flexibly and easily perform personnel management, rule customization, data management, and device management on the terminal and integrate the clients' application system with the terminal, achieving the intellectualization and automazation of the business scenarios.

    After API integration, the following functions can be done: CRUD of personnel and personnel's affiliated organizations; obtain device information and recognition records; management of recognition rules, perform 1:1 face comparison, and other functions.

    For more details, please refer to the 'Terminal WebAPI Developer Guide'.

    5.3 Overview of Terminal data push

    image443

    5.4 Summary of Cloud Management Platform WebAPI

    Through the Cloud WebAPI, the third-party developers / ISVs to quickly integrate their own business development with the system.

    WebAPI is offered by both public and private cloud.

    For details, please refer to the 'Cloud WebAPI Developer Guide'.

    5.5 Overview of data push on cloud management platform

    image447

    5.6 Terminal ODSL Summary

    ODSL (Open Domain Specific Language) is a business process customization development framework provided by the terminal.

    Third-party developers can embed their own applications into the existing face recognition process without editing the original code.

    By writing an ODSL configuration file -> importing the configuration file -> installing the third-party application specified in the configuration file, the secondary customization development of the facial recognition process is completed.

    For details, please refer to 'Terminal ODSL Developer's Guide'.

    5.7 Summary of Terminal Android SDK

    FaceSec facial recognition terminal open platform is based on a deeply customized Android system, and third parties can carry out secondary development based on the SDK provided by FaceSec. The development platform supports facial recognition process customization, personnel management, rule management, recognition record management, configuration management, and other functions.

    image-20230530102610159

    For details, please refer to 'Device Android SDK Developer Guide'.

    6 Appendix

    6.1Terminal Authorization Instructions

    When using Facesec's terminal products, relevant authorizations need to be imported into the terminal.:

    NO.Authorization number(ppl)Description
    1100default value, free.
    21,000One terminal can support up to 1,000 people, payment required.
    35,000One terminal can support up to 5,000 people, payment required.
    410,000One terminal can support up to 10,0000 people, payment required.
    520,000One terminal can support up to 20,000 people, payment required.
    650,000One terminal can support up to 50,000 people, payment required.
    7100,000One terminal can support up to 100,000 people, payment required.

    ▲ In Home and OA operation modes, terminal authorization needs to be imported manually. For terminal authorization, please contact Facesec or distributors for more detail.

    6.2 Description of Verification Method

    Single verification method, including face, card, fingerprint, ID card, passport.

    A+B verification method (Multiple Verification Method)

    A+B
    Face + Password
    Face + ID Card
    Face + Passport

    ▲ Different verification methods may require additional extension modules or reading devices from other companies.

    Verification methods from the perspective of usage scenarios

     Single VerificationA+B Verification Methods
    Combination of single verification methodsSupportSupport
    Combination of dual verification methodsMethod 1: Face recognition Method 2: Other single verification methodMethod 1: Face recognition Method 2: A+B verification methods

    ▲ The combination of dual verification methods is the scenario where method 1 and method 2 are required at the same time.

    The verification methods can be in various combinations, the detailed description is as follows:

    Combination of single verification method:

    OptionsDescription
    FaceOperation: Check the ‘Face’ multi-select botton.
    Input: face.
    Verification: 1:N verification of [face] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’
    FingerprintOperation: Check the ‘Fingerprint’ radio button.
    Input: fingerprint.
    Verification: [fingerprint] and the personnel database information.
    CardOperation: Check the ‘Card’ radio button.
    Input: card.
    Verification: 1:1 verification of [card] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’.
    Face + CardOperation: Check the ‘Face + Card’ radio button.
    Input: face and card.
    Verification: 1:1 verification of [face and card] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’.
    Face+PasswordOperation: Check the ‘Face + Password’ radio button.
    Input: face and password.
    Verification: 1) 1:N verification of [face] and the personnel database information;
    2) After the verification for face recognition is successful, the input password will be verified with the preset password of the person in the personnel database.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’.
    Face+ID CardOperation: Check the ‘Face + ID card’ radio button.
    Input: Face and ID.
    Verification: 1:1 verification of [face and ID card] information.
    Note: 1) In the scenario of using an ID card for verification, apart from comparing the face with the photo on the ID card, it supports ‘authorization list’ and ‘ID card fingerprint comparison ’ at the same time to further improve security level.
    2) In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’.
    Face+PassportOperation: Check the ‘Face + Passport’ radio button.
    Input: face and passport.
    Verification: 1:1 verification of [face and passport] information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:1 Mode’ or ‘Hybrid Mode’.

    Combination of dual verification methods:

    OptionsDescription
    Face OR Face + ID CardOperation: Check the ‘Face’ multi-select button and the ‘Face + ID card’ radio button at the same time.
    Input: face (and ID).
    Verification: 1) Face + ID card: 1:1 verification of [face and ID card];
    2) Face only: 1:N verification of [face] and the personnel database information.
    Illustrate: 1) In the scenario of using an ID card for verification, apart from [face and ID card] verification, it also supports two higher-level verification methods of ‘authorization list’ and ‘ID card fingerprint’.
    2) In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’.
    Face OR Face + PassportOperation: Check the ‘Face’ multi-select button and the ‘Face + Passport’ radio button at the same time.
    Input: face (and passport).
    Verification: 1) Face + passport: 1:1 verification of [face and passport] information;
    2) Face only: 1:N verification of [face] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’.
    Face OR Face + CardOperation: Check the ‘Face’ multi-select button and the ‘Face+Card’ radio button at the same time.
    Input: faces (and cards).
    Verification: 1) Face + card: 1:1 verification of [face and card] information;
    2) Face only: 1:N verification of [face] and personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’.
    Face OR Face+PasswordOperation: Check the ‘Face’ multi-select button and the ‘Face + Password’ radio button at the same time.
    Input: face (and password).
    Verification: 1) Face + password: ①1:N verification of [face] and the personnel database information; ② After the verification for face recognition is successful, the input password will be verified with the preset password of the person in the personnel database.
    2) Face only: 1:N verification of [face] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’.
    Face OR CardOperation: Check the ‘Face’ multi-select button and the ‘Card’ radio button at the same time.
    Input: face or card.
    Verification: 1) Face: 1:N verification of [face] and the personnel database information.
    2) Card: 1:1 verification of [card] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘Hybrid Mode’.
    Face OR FingerprintOperation: Check the ‘Face’ multi-select button and the ‘Fingerprint’ radio button at the same time.
    Input: face or fingerprint.
    Verification: 1) Face: 1:N verification of [face] and the personnel database information.
    2) Fingerprint: verification of [fingerprint] and the personnel database information.
    Note: In the current scenario, ‘Verification Mode’ needs to be set to ‘1:N Mode’ or ‘Hybrid Mode’.

    6.3 Recognition Page Operation Icons

    On the recognition page, tap or slide the upward arrow at the bottom to display the operation icons.

    The operation icons from left to right are:

    IconsDescription
    Used to Open the Door
    Used to open the Settings page.
    Used to open the Personnel page.
    Used to open the Running Status page.

    ▲ Operation icons can be customized accordingly. For details, please refer to '2.7.2 Set up the Home Button'

    6.4 Instruction for Adding A Single Personnel

    When the terminal in in single-host mode, personnel can directly log in via the terminal or log in remotely via FaceOffice.

    The relevant descriptions for the two methods are shown in the table below

    ProjectDescriptionTerminalFaceOffice
    PhotoUsed to register personnel photos. Required.
    Personnel No.Used to register the personnel No. and identify personnel uniquely Required.
    ▲ Once the personnel No. is created, it cannot be edited
    ▲ If you need to edit the personnel number, you need to delete the personnel and create again
    NameUsed to register a personnel’s name. Special characters are not supported, including: ‘’’’%’’\’’/’’|’’_’’&’’#’’:’
    ID No.Used to register the personnel’s ID No. Not required.
    OrganizationUsed to register the organization personnel belong to. A person can belong to multiple organizations.
    FaceRing PasswordUsed to log in FaceRing for personnel.
    IC Card No.Used to bind IC Card No. with personnel. The access authority of the IC card is determined by the recognition rules bind to personnel in the terminal.
    Access PasswordA 4-digit password for setting up personnel verification. It is used when the recognition rule of the terminal is set to match the verification method. For example: face + password
    Recognition RuleUsed to assign the preset recognition rules.
    Time RuleUsed to display the time rules for recognition rules.
    Verification MethodIt is used to display the verification method of the recognition rules.
    DescriptionUsed to display the description of recognition rules.
    ThresholdUsed to register the recognition threshold for a person. Default: 80
    FingerprintFor adding personel’s fingerprints, the device needs to be connected to a fingerprint module. Each person can register up to two fingerprints.

     

    6.5 Photo Quality Requirements

    6.5.1 Photo-taking Requirements

    The person should keep shoulders horizontal and look straight at the camera.

    The person should have a natural expression, eyes open naturally, without hair covering eyes, and no heavy makeup.

    The person should not wear glasses.

    The lighting should be even, with no shadows or highlights on the face.

    The background should be uniform in color with no gradient, shadows, or other people/objects.

    6.5.2 Digital Photo File Specification Requirements

    File image format: JPEG, JPG, or PNG.

    Image file size range: between 20 KB and 1 MB.

    Photo resolution should not exceed 1024*1024.

    6.5.3 Examples

    6.5.3.1 Lighting, exposure and portrait position

    The photo-taking environment should have even lighting and the portrait position is at center.

    Moderate exposure, no shadows or highlights on faces.

    image-20230509145141649

    6.5.3.2 Background

    Even background color, no gradients, no other people or objects

    Background color is even white or light blue.

    image-20230509150439171

    6.5.3.3 Posture

    Proper posture.

    Keep shoulders horizontal.

    Look straight at the camera.

    image-20230509151628655

    6.5.3.4 Facial Expressions

    Natural expression.

    Eyes open naturally.

    Lips closed naturally.

    image-20230509155418621

    6.5.3.5 Facial Obstructions

    Hair should not cover eyes.

    The person should not wear head coverings, and non-permanent accessories should not cover the face.

    Color of face and clothes should contrast with the background color.

    image-20230510135916217

    6.5.3.6 Other Specifications

    Accurate focus, no red eyes, no facial distortion.

    Clear paper photo, no blurring (scanning noise), dirt, creases, borders, or scratches.

    No heavy makeup.

    image-20230510143738688

    No obstructions (such as hands or toys) in front or behind.

    image-20230510144455223

    6.6 HID Module Settings

    6.6.1 Card Reader Settings

    1. Connect the module to the computer via Micro USB, enter the URL: http://192.168.63.99/ in the browser, and access to the configuration page.

    2. Click on 'Contactless Config' to set the card type supported by the module.

    1. Click on 'Keyboard Wedge' → 'General Config', check 'KBW' mode, and change the delay to 0 milliseconds.

    1. Click on 'Host Interfaces', check 'Serial Enable'

    1. Click on 'System Config'-> 'Apply Changes', save the changed configuration

    image-20230525155120532

    1. Click on 'Card Data Selection' to choose the card type.

    Take 'HID iCLASS' as an example (similar for other types),

    When customizing PACS is not applicable, uncheck CSN and PACS.

    Scroll down the page, check PACS Custom 1, and enter 1, 8, 9, 16 in the indicated positions.

    1. Click on 'Out 1 Data Manipulation' and set the two StringFormat options to DEC as shown below.

    1. Click on 'Out 2 Data Manipulation',

    set 'Custom PACS 1 → Prestrokes' to '--',

    and 'Custom PACS 2 → Prestrokes' to '**'.

    1. Click on 'System Config'-> 'Apply Changes' and save the changed configuration. Click on 'Reboot System' to restart the device and check if the changed parameters take effects.

    6.6.2 Desfirre EV1 8K Write data on blank card

    1. Connect the module to the computer via Micro USB, enter the URL: http://192.168.63.99/ in the browser to access to the configuration page.

    2. Click on 'Keyboard Wedge'→ 'General Config', uncheck Keyboard Wedge Enable

    3. Put the card on the card reader.

    4. Open the "hid_ok5x27ck_configcard_tool_1.1.0.5" program, select the corresponding module in the Select Reader on the right to connect.

    1. Click on 'Connect' to read a blank card, and the ATR information will appear on the Reader Status on the right side.

    2. Click on 'Initialize Blank Card'.

    1. Click on 'Export Config '. The configuration file can be obtained from the HID module configuration page.

    image-20230525160457688

    1. Finally click on 'Write File' to complete the CFG card writing.

    Read the CFG file in the card

    After the card writing is successful and you need to configure a new module's parameters, you nned to firstly power off the module, then attach the written card to the module and power it on (or power on the module and then attach the card).

    Remove the card after about 20-30 seconds, and the module configuration will be successful (if you can see the module light flashing red and green, the configuration is successful).

    7 FAQ

    7.1 Maximum number of terminal administrators that can log in to a single device

    A single device can support up to 10 terminal administrators registered.

    When using a PC browser:

    It is recommended to use Google Chrome or Firefox.

    Compatibility issues may exist when using browsers with IE9 or IE10 kernel.

    When using a tablet:

    It is recommended to use the built-in browser of the tablet.

    7.3 Accessing FaceOffice

    To access FaceOffice, you need to obtain the device's IP address.

    For details on obtaining the device's IP address, refer to '2.9.2 View Operating Status'.

    If you cannot access FaceOffice, please troubleshoot the following situations:

    Situation 1: Network disconnected. Check if the device is connected to the network and if the PC accessing the device is on the same Local Area Network (LAN) as the device.

    Situation 2: Incorrect transfer protocol. Check if the input matches the settings on the device. FaceOffice supports both http and https protocols. If you change the protocol, you must restart the device for the changes to take effect. Refer to '3.11.3.18 Terminal Web Management'.

    Situation 3: Incorrect port. Make sure you are using port 8081. If you cannot access it, check if your PC has disabled this port or if the port is being used by another program.

    7.4 Device contact list is empty/missing personnel

    Firstly, make sure the device is connected to the network.

    The prerequisite for the device to display contacts is that the person has logged in to FaceRing. If they have not logged in, their information will not be displayed on the contact list.

    7.5 FaceOffice's FaceRing page has no personnel

    Personnel must set a FaceRing password before they can be displayed on the visual intercom page. For details on setting a FaceRing password, Refer to '3.5 Personnel'.

    Document library