Ticker

6/recent/ticker-posts

Download ZKTECO Access Control Software V6.0

 ZKTECO Access Control Software

 

Download ZKTECO Access Control Software V6.0



l Multi-terminal networking, real-time monitoring

No matter Ethernet connection or 485 connections, fingerprint

machine can be added into management software. After all

fingerprint machines are added, click Start Monitoring and the

system will start relative monitoring from the first unit to the last

unit.

l Real-time record download

Fingerprint records on each fingerprint machine can be downloaded

in real time. After download, these records will be stored in

database automatically. If there is a attendance software, you can

set database directory of attendance software as directory of the

database to store these records. Then you can check attendance

records at any time.

l Search records and output records in various formats

When there are many fingerprint records, you can search records.

During search, various condition search functions are defined, such

as ID of fingerprint machine, time period, department, etc. Also

records can be outputted in various formats.

l Upload Access control setting

This function is to upload basic Access control setting and user

Access control setting.

Access control software introduction

- 5 -

l Department management

After created department, in User Management you can assign

employees to corresponding department.

l User management

This function mainly includes downloading user and fingerprint,

editing user’s information and privilege, creating password for user,

using “U are U fingerprint sensor” to add new user, uploading user

and fingerprint.

l Remote open door

In program, you can click Open Door button to remote unlock the

selected door

l Synchronizing time

Synchronize time of fingerprint machines.

l Upgrading firmware

Upgrade the firmware of fingerprint machine.

l Initialize fingerprint machine

In device management, you can initialize fingerprint machine.

Access control software introduction

- 6 -

l Operation procedure steps as follow:

l Hardware connection

This is the first step. Connect all fingerprint machines and PC

together. Use RS232 cable to connect when distance doesn’t exceed

15 meters. Under the condition of distance over 15 meters, it is

recommended to use Ethernet connection.RS485 cable can be used

for connection when distance exceeds 80 meters and can connect

for 1000 meters maximally.

l User management

This step is mainly to register each fingerprint machine or upload

users. When there are many fingerprint records, it is recommended

to use “U are U” Fingerprint Sensor to register users first. Then

upload users to each fingerprint machine respectively. In user

management, you can edit employee’s information, create

password for employee and set corresponding privilege.

l Access control management

For Access control, we define that all users are initialized as invalid

user. User can become valid user in effective time period only after

user is assigned privilege. So we need to upload Access control

setting after we finish uploading users

Access control software introduction

- 7 -

1. Installation and Uninstall

1.1 Installs software

Before installing your software, it is better to shutdown other

running application programs, in order to keep away conflict in

installing process.

Note: Maybe some displaying figure does not tally with real

contents please subject with CD you install

Please put the CD with software into CD-ROM, it will be running

automatically and pop-up following interface.

Select an installation Language, Click Next, enter follow interface

Access control software introduction

- 8 -

Click Next, enter follow interface:

This interface fully provide with three way the software apply to,

there use method ability to be shifted by the setting, this software

mainly apply to the access control, so select the a Access

Access control software introduction

- 9 -

Control Device as example, Choose Access Control Device .

Click Next, enter follow interface:

Please read this license Agreement carefully, if you agree to the

terms, select the I accept... button and click Next.

If you do not agree above terms, select I don’t accept…., the step

will exit the installing program and return, enter following interface

Access control software introduction

- 10 -

This interface applies to locate the folder of the fingerprint access

control software, you may use the default folder, also can create or

select a folder, and Click Next enters following interface:

After select installing component. Click Next, Enter following

Access control software introduction

- 11 -

interface

This window is to confirm the folder which is created in

Start/Program item. Click Next, display following Interface

Access control software introduction

- 12 -

After enter into this interface, it is show that you have finish all

configured to setup, if want to modify it, Click Back to return,

Otherwise click Install, the installing program will copy and

write corresponding information into hard disk, After finish

installation, click Finish to complete the process。

1.2 Uninstall software

If you will not use the software and want to delete it from the

computer, may perform following operation:

Exit from all ZK software Access Control management software,

enter Start-> Setting-> Control Panel-> Adding/ Cancel to select

ZK software and click Cancel to delete it, may be there are some

files which is not to be all deleted, you ability to entry the installing

directory to cancel the folder of zkemnetman

In the Starting /Program to run the access control system, in this

portion of the Base Setup, you will review 6 module of the base

Access control software introduction

- 13 -

setup, Access Control, Base Operation, Query, Help. The

equipment must be added before using it.

Access control software introduction

- 14 -

2. Base Setup

In the portion of the Base Setup, include Department Management,

User Management, Equipment Management, and Load from USB

flash disk, System Setup and Exit

2.1 Equipment Management

First add equipment, open Equipment in the Base setup menu, the

display interface is following

Click Add button underside of the list, display interface is

following

2.1.1 Communication Setup

Communication Setup: Click Read Option; it can show

communication setup of all equipment to be connected. Like as

following figure

Access control software introduction

- 15 -

Communication type: Change to Serial Port/RS485

Machine num: Input number of fingerprint machine according to

the own requirement. For example, number of fingerprint machine

is set to 1, and its identify ID is set to Machine 1.

Communication Key: it is not required to set under default

condition. If communication password is set in fingerprint machine,

then it is required to enter communication password correctly.

Port Number: Select communication port number that connects

PC and fingerprint machine. Default value is COM1.

Baud Rate: Select 9600 (recommended)

Note: Above settings are used for RS485 connection. If RS232

connection is used, then Baud Rate should be changed to 115200,

which will increase communication speed greatly.

Ethernet

(2)If the Ethernet communication mode is selected, shown as

following :

Access control software introduction

- 16 -

Name: Enter name according to the own requirement. For example,

name is set to Machine 1.

Communication key: it is not required to set under default

condition. If communication password is set in fingerprint machine,

then it is required to enter communication password correctly.

IP address: Default value is 192.168.1.201. IP address can be

changed according the network segment of local area network, but

IP address cannot conflict with other IP address of any machine in

the same local area network. Please notice that to fill IP address of

fingerprint machine should remain the same IP address as that is

edit in fingerprint machine.

Port: Default value is 4370 (no change)

There are two connection modes that have been described above.

You can select different modes to connect devices as requirement

by yourself. After finishing setting, click Test Connection button

on the bottom to test connection . After Connection Success

appears, click Save button to save the setting of this fingerprint

machine. If Connection Failure, please check the setting both

fingerprint machine and communication setting. You can use the

Access control software introduction

- 17 -

same method to add next fingerprint machine to system.

After all fingerprint machines are added, an icon of fingerprint

machine that has been added will appear in List on the left of

Device Manager. If you want to edit the information of fingerprint

machine, ability to read the setup of fingerprint machine firstly,

then you can directly modify it, click Apply Setup button below to

complete modifying. If you want to delete one fingerprint machine,

select the fingerprint machine and click Delete button below.

Read Option

If you want to check connection information of one fingerprint

machine, click Read Option to get connection information of that

fingerprint machine.

2.1.2 Fingerprint Machine Information

Click Fingerprint Machine info in the Equipment Management

item, display interface following.

Access control software introduction

- 18 -

Click Read Option, the base information of fingerprint machine

will be list. Like following Figure:

2.1.3 Wiegand

Click Wiegand in the Equipment Management, display interface

is following:

Access control software introduction

- 19 -

Click Read Option to obtain all kinds of wiegand parameter which

store in the fingerprint machine; there are four Defined Formats in

the drag –down volume to select. to choose a wiegand 26 or

44444444444444444wiegand 34 is avaliable.

Defined Format: this format has been defined and built in the

system; User doesn’t need to define the length of Bit and the

location of information. There are four default defined format:

wiegand26 with device ID、wiegand34 with device ID、wiegand26

without device ID、wiegand34 without device ID. The wiegand 26

with device ID means that the W26 output format along with

equipment ID and the wiegand26 without device ID point that the

W26 output format doesn’t own the unit ID, Here the equipment ID

is defined by following condition: if there is no set of the site code,

then it will output machine code. And if the site code has been set,

it will output the defined site code (which is similar the machine

code, there different is that this code is defined by user and can

recycle to use, range is 0-255)

Fail ID: Export Fail ID after verified is failure, if it has been

selected; its output range is 0-65534.

Site Code: similar the machine code, which different is that this

Access control software introduction

- 20 -

code is defined by user and it can be recycled in different unit,

range is 0-255)

Self-define Format: User define Wiegand output format by herself

Total Bit: the length of output format

ID begin: The start location of the ID code in the total bit

ID Bit: The length of ID code

Pulse Width: the default value of to send pulse width time is

100μs, if the controller isn’t able to receive the Weigand signal, can

adjust value from 20 to 800

Pulse Interval: the default value is 900 μs, ability to adjust it from

200 to 20000.

2.1.4 Verification

Click Verification in the Equipment item to read setting,

following interface display

1: N Match Threshold: A predefined number, often controlled by a

Access control software introduction

- 21 -

biometric system administrator, which establishes the degree of

correlation necessary for a comparison to be deemed a match. If the

score resulting from template comparison exceeds the threshold,

the templates are a match (though the templates themselves are not

identical).the default value is high, you can modify it

1:1 Match Threshold: It mean that match fingerprint threshold

after presenting the Card, the default value is high.

Only Verification No. Card: It is mainly designed for ID card, if

the item is choused as Yes, a user directly use ID card to verify

enough, to verify procedure doesn’t need to press fingerprint. If the

item is choused as NO, you must verify fingerprint after present the

card until pass

Only 1:1 Match: This feature is only available to that an user own

fingerprint, ID card or Mifare card for verification, can configure

Only 1:1 Match, if the item is choused as Yes to this setup, to

verify must first present a card, and then press fingerprint. If

doesn’t slide a card, there is no response to fingerprint in the unit.

Must Register Mifare Card: there are two statuses to register a

Mifare card, if the card was configured to Must Register, it is only

to verify the user who’s ID has stored in the fingerprint machine.

The user No. to be store will not be verifying.

When you choose the item as NO, no matter there are user’s ID

information in the unit or not, it will export as the user and

fingerprint template which is store in the card are verified

successfully.

You can change the option according you actual statue to achieve

the best result.

2.1.5 Power Management

Click Power Management to read setup. The following is display

interface:

Access control software introduction

- 22 -

Firstly read the parameter of Power Management, modify the state

of Idle Setup and minutes of Idle Time, then click the Application

Option to complete set. When the idle time is 0, then the idle setup

function is invalid. When the value more than 0, the machine will

enter into idle state after arrives at define time.

2.1.6 Access Control

Click Access Control to obtain Setup, display interface as follow:

Access control software introduction

- 23 -

Delay time of lock control apply to determine unlock hour, the min

measured unit is20ms, in the normal condition is 100—200ms.

2.1.7 Mifare Card

Click Mifare , display follow interface:

Fingerprint Amount: How many fingerprints are stored up in the

Access control software introduction

- 24 -

Mifare card

Fingerprint First Sector: the first sector of Mifare card to store

fingerprint

Fingerprint Total Sector: fingerprint hold total sector.

Password of card: Read and write password of card, you only can

set it, can’t obtain it.

2.1.8 Other Setup

Click Other Setup the following appear:

This module provide with mainly convenience to configure

equipment.

Restart Unit: in the list, select a device and Click the name of the

device to restart fingerprint machine.

Clear Administer Privilege: this function can clear all administer

privilege which has registered in the fingerprint machine. Firstly

choose the name of the device from the list, then to do it

Access control software introduction

- 25 -

Upgrade Firmware: We remind that user doesn’t use the function

random, except user receive the manufactory notice, according to

the guide which factory offer to do.

Initialize Equipment: This function is mainly used to clear all data

in the reader.

Seize Fingerprint Image: This function can be used to view

fingerprint image, if want to inspect fingerprint image, please place

finger on the sensor window, don't move, and then click the button,

and will see the fingerprint

Date formats: Select the date formats from drag- drown box, this

data formats appear on the starting interface of fingerprint machine.

Voice function: Utilize this function to determine the prompt voice

of the fingerprint device on or off.

2.2 Department Management

Click Department Management in the Base Setup menu, pop –up

the Department Management main interface, like as following

figure.

Access control software introduction

- 26 -

Click or to add or delete a interrelated

department, is to Enroll Department Staff Button.

After established a new department, if want to shift a staff to anther

department, first select the head-office, then click Enrolling

Department Staff button, pop-up following interface.

Access control software introduction

- 27 -

Select the staff of corresponding department and add it to column, click

enroll staff button.

2.3 User Management

User management provides maintenance work for staff information.

Click User Management from drag-down menu of Basic Setting,

and main window of department management will pop up as

follows::

Access control software introduction

- 28 -

(1) User list Sort Order: Click the name of field. Choose a

triangle symbol which is beside the field, according to ascending

order to arrange when the triangle symbol point upwards, otherwise,

the triangle symbol point downwards that means the sort order

follow the descending order, you can click triangle symbol to

change the rise or down rank.

Statistic: the software can automatically count the total record and

also can count grouping record.

Left side is a user list and right side is a user maintenance setting

area. If one staff is redeployed from a headquarter to other

department, click corresponding the department from down drag

buttons of Department, a dialog will appear and ask whether the

staff is redeployed to this department or not. Here, you can set

user’s privilege. If you want to change one user to other identity,

for example an administrator, first select this user in list on the left

and then select Administrator from down drag options of

Privilege on the right. If you want to add password to one user,

first select this user in list on the left and then click Set Password

to add password. After this user is uploaded to fingerprint machine,

Access control software introduction

- 29 -

one user number will be added in password registration. Therefore,

this user can not only use fingerprint, but also use password when

identifying.

(2) Enroll fingerprint State: this item will show every user

enrolling State:

(3)Import: This function can realize to import data, this

importing software support all kinds of format user’s data file.

This system support following format data to import

MS Excel、MS Access、DBF、XML、Text File、CSV file,we

recommend use the CSV file to import, the following example

which take CSV file to import user’s data is used to illustrate how

to import data.

(1)、First click the radio button of CSV file, then select the file that

want to be import.

(2)、Click Next, the following figure appear

Access control software introduction

- 30 -

The left side list is a field list, the right side is a import file rank,

there are Skip line(s) on the right-up part, that means want to skip

amount of the line, if the first line to be import isn’t material data,

you can fill 1 here, that show to skip the first line to import data.

Fields List Explain

UserID: The ID only is used in the system interior, it is useless to

import the fields, please don’t use the field

BadgeNumber:User code, this code is that user adopts the number

in the fingerprint machine and the software.

Name: User name, these fields must exist.

VerificationMethod:User’s verification method. This item can be

neglected.

DefaultDeptID:Department ID. If you wan to import the data

from other origin, this item can be neglected.

Gender: Males or Females

Title:Title

Access control software introduction

- 31 -

Photo: Photo can be neglected

Privilege:Privilege can be neglected.

Password: Password can be neglected.

CardNo:ID card number can be neglected.

(3)、First choose the field in the Fields list as to import, then select

the corresponding rank in the right side list. The Fields list will

automatically attach the corresponding number to the name of field,

such as it is, arrange all fields and corresponding rank after to

complete, click next.

If you want to cancel a field’s setup, first choose the field, and then

click corresponding rank, the software will cancel this field’s setup.

(4)、Click Execute button to run input operation.

Export:This function can realize that the software export user’s

data via all kinds of format which can be support by the software.

In order to it is convenient to supply third party to use.

Following, take the exporting MS Excel file as an example to

explain:

Click the Export button, appear following interface

1. Select the object file which is to be exported

Access control software introduction

- 32 -

2、Click Start Export button to export the file via default format,

otherwise, can configure exporting content through to click the

different option card.

Fields:Select the field to be export, the default format is all, it is

only to export field’s content after selected field.

Formats:Be exporting format of defined all kinds of field value.

Header & Footer: The file is starting and ending of the text.

Caption & Width:The title and width of field

Excel Options: Set font

Transfer User’s Information and Fingerprint

(5) Photo: There are two ways to attach photo, one way is

directly import photo into the file, and other way is to utilize a

Access control software introduction

- 33 -

camera to seizing image.

(6) Fingerprint Management

Enroll Fingerprint by The Fingerprint Sensor:

To use U.are.U sensor can enroll user's fingerprint under the

connecting condition, click shortcut “+” button to add new user in

the staff maintenance item, choose fingerprint sensor to enroll

fingerprint after finishing the enrollment procedure and close

enrolling interface, the system will store the user’s fingerprint into

the local Database, the new user’s info can be send to the

fingerprint machine via From PC to Fingerprint machine. The

enrollment interface like as following figure illustration.:

Select the finger which want to be enrolled to enroll; if want to

delete this fingerprint, please double click this finger.

Access control software introduction

- 34 -

Select a user you want cancel, Click shortcut “-” button to delete

the user.

Enroll Fingerprint by The Fingerprint Machine: Use the

fingerprint machine to enroll. Select the fingerprint machine on the

blank area, Click Connect Enrollment Equipment to connect

fingerprint machine, after to connect successfully, the

disconnection will appear, click Enroll to begin registration

fingerprint.

Note: this function only is used for black-write LCD fingerprint

machine, Now the TFT Screen Fingerprint does not support this

function.

Enroll Mifare Card: Choose the user who wants to register the

Maifare Card, then click Through Fingerprint Machine to Write

Card, the software will remind Punch Card, to slide the card near

an appropriate place in the fingerprint machine, after to show

Write Card successfully on the unit, this user's code and the

fingerprint will store in the card. Click Through Fingerprint

Machine to Clear Card to delete user's data in the Mifare, the

program remind Present Card, to slid the card near an appropriate

place in the fingerprint Machine, after to notice Clear Card

successfully to show the operation well.

Note: this feature is available only to the fingerprint machine

which support the Mifare card enrollment

Fingerprint Register Status: to show the detail of user and

fingerprint register

Sort Order: can arrange the record according to the ascending or

descending order in the record list, directly click the head of rank to

achieve, following figure is the process of sort order which

according to the name.

(6) Transfer User’s Information and Fingerprint

Form PC to Fingerprint Machine: the user which is store in the

database will be uploaded to the fingerprint machine, click From

PC to fingerprint machine, pop –up the interface to upload user’s

fingerprint.

Access control software introduction

- 35 -

Upload:Base on your need, Select a staff and an uploading

fingerprint machine, click Upload, it is able to upload user’s data

to the defined fingerprint machine.

NoticeUser’s data include user information and fingerprint.

Delete: If you want to delete a user in a fingerprint machine, first

choose user and corresponding fingerprint machine, and then click

Cancel button.

Operation Log:That is an error log during operating process

Batch:Utilize the function to speed up communication when there

a lot of users are need to be uploaded, if there a few user, do not

use it. (E.g... 30user)

From Fingerprint machine to PC: The user which is store in the

fingerprint machine will be downloaded to the local database, click

From fingerprint machine to PC, pop –up the interface to

download user’s data.

Access control software introduction

- 36 -

Select a fingerprint machine No. to download user’s information

which is on the left side list, click View User in the Fingerprint

machine, it is able to display all user in the fingerprint machine,

Select a user to be downloaded, click the “Download” button to

download the user information and fingerprint from fingerprint

machine to local database

View User in the Fingerprint machine:Display all users in the

fingerprint machine

Download:Download user data to be selected.

Delete: If you want to delete a user in a fingerprint machine, first

choose user, and then click “click” button.

Batch:Utilize the function to speed up communication when there

are a lot of users to be Downloaded, it isn’t need to a few user.

Note: this function only apply to Black–white LCD serial fingerprint

machine, the TFT screen serial fingerprint machine do not support this

Access control software introduction

- 37 -

function.

Operation Log:that is a error log during operating process。

NoteIn the process of the user management, if the fingerprint

and user will be upload or download, the monitor function

should be shut down firstly, if want to uploadthe download

operation will be priors, the operation must enter user

management once again.

2.4. Load from the USB flash disk

Load the attendance data of USB flash disk to the software through

this item, like as following figure:

Load in : On the left side list choose the data you want load in.

click Load in to load data to system.

Access control software introduction

- 38 -

Delete Data:On the left side list choose the data you want delete.

Click Cancel to delete the data from system

2.5 Management USB Flash Disk

The Option can be used to download the attendance data, and

download and upload employee data through USB flash disk. This

operation is as following

2.5.1 Load in the User Data

Click USB Flash Disk Management in the Base Setup, and enter

the U flash disk management interface. Like as follow figure.

Click Load the User Data from the USB disk button. The system

will automatically search the user data and load it into the system

from the USB flash disk, if a new use is found, the system will

prompt whether add the new user to system or not.

In the list the records with red color show this record do not

Access control software introduction

- 39 -

synchronization with data of software, click override to cover

asynchrony data up by the data of computer.

Delete Data of U Flash disk: Delete user data of user data of U

flash disk

Clear List: clear list on left side

2.5.2 Export user data

Click label of exporting data, display as follow

Left side is a department list. Ability to choose a department from

the list, all staff information will be appear on the information list,

Double click staff record or selected staff and click move the

selected record to right side add an employee information in the

right side. If there are a lot of staff record, ability to show all staff

information of the staff to be queried through staff information

query function.

Maintained Staff Information

Access control software introduction

- 40 -

Add: Add a piece of information of staff.

Modify: modify selected staff’s information

Delete: delete selected staff’s information.

Click export user data to U flash diskette. Then all record

accessories in the ready exporting to U flash to data list will be

exported to U flash disk

2.6 System Setup

System Setting of Access control software mainly includes following

several parts. First open System Setting, as shown in figure below:

Access control software introduction

- 41 -

2.6.1 Automatic monitoring

Run automatic monitoring when program start-up

If this option is selected, program start-up will enable automatic

poll all devices that has been connected with. If this option is not

selected, program start-up will not enable poll.

Default device rotation periodicity

During device continue poll, some fingerprint machines may

disconnect temporarily due to various reasons. Here, you can

modify device rotation periodicity in second (it is recommended to

set to 120)

Remain device record

Device record number means user attendance records that are

downloaded in every device. You can enter a record number. If

actual record number exceeds the pre-set value, the software will

clear all fingerprint records stored in fingerprint machine. For

example, record number to store is set to 1200, when record

number downloaded is 1201, all fingerprint records in fingerprint

machine will be deleted and record number downloaded resets to 0.

Count for continuous failure retries

Count for continuous failure retry (it is recommended to set to 3)

that is convenience to reconnect automatically under the condition

of fingerprint machine recovers normal connection.。

Run monitoring in specified Period time

Here, we can define one time period to run monitoring. If run

uninterrupted polling, it will bring huge burthen to whole

monitoring network. You can define one time period to run

monitoring, in order to reduce burthen of monitoring network.

Please pay attention to time format, such as 06:00-22:00.

Download all record cycle: Set the cycle to download record

automatically.

Synchronize time of fingerprint machines:

Access control software introduction

- 42 -

You can define a time to synchronize time of all fingerprint

machines that have been added into device. Please pay attention to

time format, such as 10:00

2.6.2 Parameter of Server

Select start to connect with network function; it is need to input the

IP address and port of linked Server.

2.6.3 Function Configuration

Select the function you want, the three function can be shifted

before use the function you have to restart the device.

Unit Name:Enter company name here.

Set database connection: For more detail see Set Database

Connection,

Run the program when windows start-up If this option is

selected, then the program will run automatically every time after

PC start-up. If this option is not selected, then this program will not

run automatically every time while PC start-up

Access control software introduction

- 43 -

3. Access Control Setup

Access control setting is to set unlock time and assign privilege for

registered users. Settings of each user consist of three period time

settings and one group setting. Relationship between period time

and period time is “OR”. Group also consists of three period time

settings and by the same token, relationship between these three

period time is “OR”.

Simply put, if you want to keep a registered user in unlock status.

Firstly the group that this user is in should be defined in unlock

combination (one group can be defined in one combination

together with other group, but these groups are required to unlock

door together). Second, current unlock time is in any availability

range of user time period and period time of its group.

Under system default, a new registered user is in Group 1 and

group combination is Group 1. So new registered user is in unlock

status under default. If a group that user is in is not defined in

group unlock combination setting, then the use can only record

attendance and cannot unlock door.

3.1 Period Time

Time period is the smallest time period unit in Access control

setting. In whole system, you can define up to 50 time periods.

Each time period defines 7 time intervals, i.e. one week. Each time

interval is valid time period in 24 hours everyday. Each use can set

up to three time periods and the relationship between these three

time periods is “Or”, which means the user is valid as long as

identification time satisfied one of these three time periods. Each

time period format of time period is HH: MM-HH: MM, i.e. in

term of 24 hours format and precision to second.

End time less than start time (23:57-23:56) means all day forbidden.

End time larger than start time (00:00-23:59) means valid in the

Access control software introduction

- 44 -

time interval.

Valid time period for user unlocks: all day open (00:00-23:59) or

time period with end time larger than start time.

Click Time period from Drag-down menu of Access Control

Setting, window of adding Time period will pop up. Click Add

button and system will pop up a timetable from Sunday to Saturday.

Here, you can define any time period you may use. Then click

Confirm to save the time period automatically. If you want to use

several time periods, continue to click Add. In addition, time

period can be edited and deleted.

3.2 Group

Group function can divide users into groups and combine different

Access control software introduction

- 45 -

groups to different unlock combinations, which make group

management of Access control more convenience. So user can

define many unlock combinations. System has defined 5 groups:

Group 1, Group 2, Group 3, Group 4, and Group 5. Under system

default, new registered user is in Group 1 and can be re-assigned to

other group.

Under system default, a new registered user uses time period of Group

1. After the user is re-assigned to other group, the user uses default

time period of the corresponding group. So please make sure to define

default time periods for each group.

Group Setting

Entered the "group" setting ,there are two ways to enter:

1) Through bar options of the system menu: Access Control

Settings -> Group, set up group access interface.

2) Through shortcuts button options of the system : Time Period,

Enter the group setting interface.

Enter the "group setting" interface, shown as following figure.

Group editing. left click item that need to edit with cursor to enter the

editing state.

Access control software introduction

- 46 -

Through drop-down box to choose the Time Period .

Through the drop-down box to choose verification way

If you want to holiday Time Period take effective, selected it by cursor

clicks, if you want the holidays is invalid, it can not selected.

Access control software introduction

- 47 -

Set up is completed, click on "Save" to save

3.3 Unlock Combination

Definition of unlock combination function

Unlock combination is the direct expression for controlling unlock.

For example, if you want that all registered users cannot unlock

door, then set Unlock Combination to null.

Definition of unlock combination is defined to different

combinations that can unlock door, and each combination consists

of different groups. Unlock combination directly uses group

number and does not consider order for identifying user between

each group. For example, “123” means door will only be unlocked

when at least one user in each group of Group 1, Group 2 and

Group 3 passes identification together with other two users. “4”

means door will be unlocked when one user in Group 4 passes

identification together with other two users. System can define up

to 10 unlock combinations at the same time and door will be

unlocked as long as one of these 10 unlock combinations passes

identification.

Access control software introduction

- 48 -

3.4 User Privileges

User privilege mainly applies to user access control setting: if a

user whose personal No. is assigned as 1,2,3,4, and is distributed to

No. (1) Device in the default period time, likes as follow, add user

to right list first, then add device to right side list. Click allows

passing.

1 entered the "Access Control Privilege” setting there are two ways

to provided:

1) through the system menu bar options: Access Control Settings ->

Access Control Privilege, enter Access Control Privilege interface.

2) through directly shortcuts button of the system : Access Control

Privilege, enter Access Control Privilege interface.

Access control software introduction

- 49 -

2 enter the "Access Control privilege" interface such as shown.

3Click on "Edit Privilege" button and enter the Access Control

Privilege to edit the interface, shown such following.

4 default users belong to Group 1, if need be assigned to other user

groups, the need for users to re-allocation group. Here we illustrate:

Access control software introduction

- 50 -

No. 1 users assigned to Group 1.

First selected No. 1 users, shown as following.

5 Click on the "Set Group" button and enter "the group setting"

interface, select group 2.

6 through the above steps, the users will be assigned to the second

group, shown as following.

Access control software introduction

- 51 -

7 follow the 4-6 steps, set up the group those users respective. After

the setting completed, through ">/>>" button, a single or all of

users will be moved to the right critical areas, waiting for the

Privilege setting. Shown as following

8 in the equipment list choose the equipment that need to upload

Privilege.

Access control software introduction

- 52 -

9 through ">/>>" button, single or all of the equipment will be

moved to the right the critical region, waiting for Privilege setting.

Like following equipment known as the NEW UNIT_1 , the

equipment has been moved to the critical region, waiting for

Privilege setting

10 after users and equipment is selected, click on "allows" button,

the group Time period which is used by user in the critical periods

will be assigned to the selected devices. After distribution is

successful, prompt will appear shown as following

Access control software introduction

- 53 -

11 In the "User Access Control Privilege" interface, click "exit"

button and enter the "Access Control Privilege Setting" and

synchronize set up information of user groups will display in the

list. Shown as following, NEW UNIT_1 in the No. 1 user group 1

Time Period.

2) Set up the Access Control Privilege When a user do not use

group

1 if a user belongs to the group, but she/he does not use group Time

Period, then in the "User Access Control Privilege" setting interface,

select the Time Period to be used, shows as below, No. 10 users

belong to the third group, but he/she does not use group Time

Period, and use the 1,2,3 Time Period

Access control software introduction

- 54 -

2 After completing, in the "user Access Control Privilege" interface,

click "exit" button and enter the "Access Control Privilege Setting"

and synchronize set information of user groups will display in the

list. shown as following, in the NEW UNIT_1 the No. 1 user use

the 2 group Time Period. in the NEW UNIT_1 the No. 10 user use

group 3 Time Period, the non-use group, but use 1,2,3 Time Period

3) Delete the user Access Control Privilege

Access control software introduction

- 55 -

1 After choose the user who will ready to be deleted and his group ,

move their to the critical areas, and moved equipment whose the

Privilege will be deleted to the critical, shown as below, delete the

No. 1 users in NEW UNIT_1 , who use the Group 2 Time

Period .

2 Click on the "AccessDeny " button, the group Time Period

the user use will be deleted in critical area from the selected

equipment. After deleted successfully, the system will prompt

shown as in the dialog box.

3 after completion, in the "User Access Control Privilege" interface

click "exit" button and enter the "Access Control Privilege Setting" ,

and synchronize the set information of user groups will display in

the list. shown as following , only in the NEW UNIT_1 the No. 10

user use group 3 Time Period, Do not use group, but use 1,2,3 Time

Period

Access control software introduction

- 56 -

After assigned the privilege, ability to automatically produce a

privilege table, click exit to exit, the following figure will appear

Access control software introduction

- 57 -

4 through shortcuts delete user privileges. in the Access Control

Privilege setting interface, select the user to be removed , and then

right click this item, the pop-up "delete" button. Click this button to

delete users.

3.5Holidays setting

These steps is shown

1 entered the holidays set. Choose Access Control Settings ->

holidays set. Shown as following.

2 Click on the "New" button, can add a holiday. The default date is

the date you choose.

Access control software introduction

- 58 -

3 move the cursor to the "start date", it is start date to revise

holiday,

4 move cursor to the "end date", it is end date to revise holiday .

Access control software introduction

- 59 -

5 moved the cursor to the Time Period to be set, choose the valid

Access Control Time Period .

Access control software introduction

- 60 -

6 set is completed, click on the "Save" button, the setting will be

saved.

After complete assigned the user privilege, next step is to upload

the user access control setup and the basic access control setup

to fingerprint machine, exit to the main program interface, may see

upload setup, must upload the privilege to N machine prior

selecting N machine, if want to upload many fingerprint, may hold

down Ctrl to select and click Upload setting again, a dialog box

will pop-up, As counting the need to click confirm to upload

Access Control Setup.

Note: when the privilege is assigned to user, because all the group

period time of users is defaulted as 1 group, therefore there are two

kinds of situations occurring:

1st, user use group time period, designated a user in the left side

user list (may hold down the Ctrl key to select), then click

redistribute the group in the user privilege assign which the group

is designated user .

2nd, user does not use the group time period and directly uses the

time period, add a user to privilege distribution list in the right side ,

from three time period option in the top right corner the time period

Access control software introduction

- 61 -

is choused in the user privilege distribution list which can use

Access control software introduction

- 62 -

4. Base Operation

The base operation fully provide with three sub-module—Upload

Setting, Open Door, Starting/Stopping Monitoring。

4.1 Upload Setting

Choose operation device , click Upload Device, show as

following interface :

Select the Access control setting which you want, the two kind of

setting ability to be choused at same time

4.2 Upload Equipment

Choose upload equipment. click icons to choose the equipment

with mouse, selected this equipment.

Access control software introduction

- 63 -

Select "upload set up" interface, there are two ways to enter:

1) through bar options of the system menu: basic operation ->

upload settings, enter upload interface.

2) through the system shortcuts button options: upload settings,

enter upload interface.

There are two choices to upload interface elements, the basic setup

and user Access Control Access Control setting, and it is better the

two selected together at the same time to upload.

This can choose to upload multiple machines.

Access control software introduction

- 64 -

Upload success, in its lower right corner the successful operation

prompt will be displayed, shown as below

Access control software introduction

- 65 -

4.2 Open Door

Click Open Door to open the selected door remotely.

4.3 Starting/Stopping Monitoring

The monitoring function already run after the program is running,

the information about opening door and fingerprint verification will

not show on the list

Access control software introduction

- 66 -

5. Query

These modules include record and alarm record

5.1 Record Query

In Start/End Date, you can select time period to query, Click

Query, list below will show all users’ come-in and go-out records

within the time period. Each rank in the table has drag-down

condition for searching. If you want to do classify Query, you can

drag head of rank to table head of query table, show as following.

Click Output to output fingerprint records in various formats, such

as Excel format, etc. this operation like as user management

exporting operation.

Access control software introduction

- 67 -

5.2 Alarm Record

Click alarm record. The following interface appears.

When the fingerprint identify fail or the Duress fingerprint has been

verified the alarm record will produce.

Access control software introduction

- 68 -

6. System Management

System Management includes that Operator Management,

System Operation Log, Backup Database, Clear old Data,

Initialize System and Set Password of Database. Eight

sub-modules

6.1 Operator Management

Click Operator Management in the System Management menu,

Pop-up the main interface of administers maintained, like as follow.

Click Administer,Pop-up the two item of Add Administer and

Cancel Administer, and then pop-up a user list frame, Select a user

to be add a administer, and the click Confirm to pop-up a

distributing privilege list. Like as follow

Access control software introduction

- 69 -

Put a tick in front of the administer privilege, and then click

Confirm.

If want to cancel administer, click Administer firstly, and then

click Cancel Administer to complete the operation process.

It is able to modify administer password and operation privilege

after a administer is added

In the administer interface, Choose a administer and click modify,

then follow the system prompt to click privilege to reset its

privilege.

If there is only one administer in the system, a administer want to

be canceled, you firstly find the Database Att2000, and open the list

of Userinfo, delete the field Securityflags

6.2 System Operation Log

The system operation Log is a track record which records this

software operation history, and utilize list mode to record all

Access control software introduction

- 70 -

operation. Click Cancel, this operation is availed to delete

operation log to the defined previous date, appear following figure.

6.3 Data Maintenance

The Data maintenance is, consist up Backup Database, , Compress

Database, Clear Old Data, threes module Buildup

6.3.1 Backup Database

Click Backup Database in the System Management menu, pop-up

a dialog-box to backup database, you can name it as your favor,

and save it in the defined location, like as following picture:

Access control software introduction

- 71 -

6.3.2 Database Compress

Click Database Compress in the Data Maintenance menu, to

compress database, it is only capable to Access Database.

6.3.3 Clear Old Data

Can use the function to clear old data which are useless to utility,

click Clear Old Data in the Data Maintenance display interface

as follow

Access control software introduction

- 72 -

Click the Menu to choose the date, and than Confirm to clear old

data at once, then old record data will backup in the installation

directory automatically.

NoteThe delete content doesn’t include the ending date be

selected. You can choose the operation to backup record data

which is before the close data to your folder.

6.4 Initialize System

Click Initialize System in the System Management menu,

pop-up a warn dialogs box, like as following figure , executes the

command all the system will be initialized, after this operation the

all data will be clear.

Access control software introduction

- 73 -

6.5 Set Database

Click set database

1.Connecting Microsoft Access Database setup

(1)Provide program to select Microsoft Jet 4.0 OLE DB

Provider;

(ï¼’)Click “Next” or “ Connect” enter the following interface.

Access control software introduction

- 74 -

Click button, Can select the database file, the default name is

att200.mdb, according to real condition to renew setup of the

database connection.

ï¼’.SQL Server Database Connecting Setup

First you should establish the empty database on the database

server. you can find a script file with the name of sqlserver.sql in

the directory of instating CD, the empty database is established in

the front of the searcher of SQL Server, and then open the

sqlserver.Sql script files, to run database which is to create this

software.

In the Provider Select Microsoft OLE DB Provider for SQL Server,

click “next” or “connect” to enter this following interface

Access control software introduction

- 75 -

Confirm the server name for storing this database, information for

logging on this serve, and the database name. After run test

connection successfully Click (OK) button to complete settings

6.6 Set Password of Database

In order to ensure the database security, we may give the database

to set a password, when the database is opened needs to input the

password to prevent other people destroy the data

Clicks setup database password in the system administration

menu, inputs your password to press the confirmation, please keep

firmly in mind the password which you set. Has to revise this

Access control software introduction

- 76 -

password, enter the set database password interface to input the

new password once more.


Add your Email to the Comment Section to get the Link for Software or WhatsApp +940707312015

Post a Comment

0 Comments