Manual Hardware Colour
Manual Hardware Colour
Important Notes
Acknowledgements
Thank you purchasing our product, before working with this
machine, please read this manual carefully
Notice
Please do not place the product in the place with strong light,
because the strong light may significantly affect the fingerprint scanning,
and thus cause the fingerprint verification fail. This product is designed
for indoor installation, if it has to be installed it outdoor, please place the
equipment in proper environment, you must beware of not exposing it to
wet or harsh condition, the product work temperature rang is 0-40. Do
to use you machine in every hot environment, keep you machine away
from the heat source and radiator. For long time use it outdoor and the
internal heat of the machine, will cause problem to the operation
Notice Fingerprint Enrollment and Identification shall be taken
after the installation the fingerprint identification machine
Installation
Enrollment
Enrollment
Installation
Identification
Identification
Notice: Please adopt the correct way to place the finger; Our
Company is not liable for any damages and troubles
whatsoever arising out of from improper pressing manners.
screen.
Step 6Make a check for the fingerprint machine time, whether it is
correct, after completing setting up, then start to track employees
attendance.
Step7At end of the month the downloaded attendance log to software
will be accounted.
The equipment is at the ready working status
After user verification completed by the fingerprint or the password the
attendance log will be saved in machine general
Readiness for work
The equipment is in readiness for work, shown as following
picture:
Mode 2
It is allowed to set up a number of state that is self -definition and
therefore when press button, do not indicate the state prompt
information, in the lower left-hand corner only shift the
corresponding state.
Match the fingerprint which place the fingerprint sensor face and
type the one relate the number with keyboard entry, when user's
fingerprint quality is poor too recognize, this way 11 will be used.
Step 1Verify personnel's AC.NO that keyboard entry in the initial
interface.
.
Step 4The equipment prompt "Thanks", the validation process is
completed.
The equipment prompts "the password is wrong", than the step repeat
operation.
as an example:
1. Equipment motion that verification is successful, and output a
unlock signal.
Until the group where user locates and the other group pass
certification together, it is not allowed to open the door.
This is verification through the user or the group the users locate
combine verified, it is need to verify identity by multiple verification
Connect with PC
This equipment will only track the attendance time record, to get
statistics result is unable till the software process the attendance
record in the PC, therefore the need to connect machine with PC to
download attendance logs into Time & Attendance tracking software.
There are several ways to connect the machine and Time&
Attendance tracking software:
u
Ethernet
(1) Via the Hub: With Straight Thru Cable (apply to connect network
card and Hub) turns on, connect fingerprint machine to network.
2directly Connection With T crossover cabledirectly connect
two Ethernet terminalconnect fingerprint machine to PC
Machine Option: Enters the menu - communication Option, please
set the following several items:
RS232 way
Machine setting: Enter the menu - communication option, please set
the following several items:
Baud rate: With the computer communication speed, the high speed
communication is quick, it is better to use the RS232 communication;
(115,200, 57,600).
RS232: Whether uses the RS232 communication, set this item as
Yes
Communication password: in the connection setting". May change
communication parameter, after setting, must input the
corresponding value on connection interface in the PC
RS485 way
Machine Setting: Enter the menu communication option, please
set up the following several items:
Serial number: Assign a network ID. The serial number scope is 1
254.
USB way
Machine Setting: Entering the menu - communications settings, set
up following several Options:
Machine No: set it in the "Connection option". The number of
machines, Scope the 1-254;
USB: whether use USB communication, choose this item to
yes.
Communications Password: set it in the "Connection
option". Maybe set it up or not, after set up ,input the
corresponding figure in the PC-Link software interface .
Contents
1 Main Windows ......................................................................................... 1
2 User Management .................................................................................... 1
2.1 Add new user ...................................................................................... 2
2.2 Users management.............................................................................. 6
2.3 Short message ............................................................................. 17
2.4 work codes.................................................................................... 23
2.5 Access Control setting ................................................................ 26
2.6 Card management ......................................................................... 40
3 Communication setting.......................................................................... 48
3.1 Configure networks .......................................................................... 49
3.2 Configure serial port......................................................................... 50
3.3 Setting up connections...................................................................... 52
3.4 WiFi Setting.................................................................................. 53
3.5 Wirless LAN ................................................................................. 57
3.6 Wiegand........................................................................................ 58
4 System Setting ........................................................................................ 63
4.1 Systems parameters .......................................................................... 63
4.2 Data managements............................................................................ 66
4.3 Upgrade firmware............................................................................. 67
4.4 The definitions of keyboards ........................................................ 68
4.5 Window Setting ................................................................................ 72
4.6 Power management........................................................................... 74
4.7 Restore setting .................................................................................. 75
4.8 Bell setting.................................................................................... 75
1 Main Windows
The fingerprint machine is in readiness state, Press
open the main window, shown as following figure.
key to
2 User Management
For a fingerprint machine, user's basic information includes
fingerprint, password and management privilege. When the
company track staff Time & Attendance log , as a result of reassign
staff, the user information in the fingerprint machine also needs to
correspondingly make the modification, therefore the fingerprint
machine provide function to add, delete, search, change user and so
on the operation.
entry AC.NO with the keyboard, if occur error. May press " " to
delete it and input AC.NO again. Directly press "OK" key or scroll
the/ key, and locate cursor on the "Enroll fingerprint" button to
press the OK key again, go on the fingerprint registration.
Name
use T9 input method to keyin users name.
Registration fingerprint
Input staff's AC.NO you search for, press the "OK" key to search,
after searching successfully, the blue cursor will automatically
locate on this staff name, if this staff you search does not exist in
the device, the prompt "the non- registration data" will appear.
Press OK/
10
11
13
14
Choose canceled all, cancel all the fingerprints on the current page,
Do not serve as the duress fingerprints.
2) Duress fingerprint registration
In the above interface, press the menu button, to choose the "new"
option from the menu, then enter fingerprint registration interface,
after registering the successfully in the register interface you
will find that the fingerprints are designated as Duress fingerprints.
3) Save the duress fingerprints
If confirmed definition of duress fingerprint in the above interface ,
pres the menu button, option "save. appear in the menu
15
2.2.7 ID cards
Some equipments can also use ID cards to verify identity.
registration ID card
there is a ID card button in the new user interface of the machine
with ID cards function:
16
17
When the cursor locate in the text box, open the T9 input method,
press the "*" key to input the content of the short message, scroll
the / key to switch the input box, scroll / to change
setting or keyboard and input the value with the small numeric
keyboard.
(1) If the type of individual short message is your choice, the
distributing button is available; here the individual short message
will be distributed to the staff
19
scroll the / key choice " deletion " in the pop-up menu to
delete the short message.
Simultaneously eliminate all related information which is relating
with this record.
When the information bar of the machine main interface display the
prompt icon
, press the "#" key to view the current effective public
short message immediately.
21
22
The operation to edit the work code is same with one to add the
work code.
3) Delete the work code
scroll the / key choice " deletion " in the pop-up menu to
delete the work code.
Simultaneously eliminate all related information which is relating
with this record 2) edit the work code.
When the equipment is in the readiness interface, press "*" the key
(allowed to set it in keyboard definition) enter the work code
selection interface.
The user may directly input work code, or scroll the / key to
select from the work list., press
key to return main interface.
25
26
27
The first entry the number of Time Period, if the No. of Time
Period has been existed , then the Time Period setting will
automatically refresh and to be displayed. Scroll / , / key
to move cursor to the input box, with the small number of keyboard
input to the value you want to set, after the completion, press the
menu keys to save settings, press the ESC key to exit.
28
1) additional holidays
Press a menu button, menu operation appear
Scroll / , key to move cursor to the input box, with the small
number of keyboard input to the value you want to set, after the
29
completion, press the menu keys to save settings, press the ESC
key to exit.
2) Editors holidays
The firstly select the line that want to be edited, directly press
OK button or press the menu button, then the operation menu
pup-up, choose the Edition:
Scroll / , key to move cursor to the input box, with the small
number of keyboard input to the value you want to set, after the
completion, press the menu keys to save settings, press the ESC
key to exit.
3) Delete the holidays
To delete the selected line, press the menu button, the operation
menu appear, choose item to be Deleted.
Note: If theJ Access Control holiday hours has been set, the user
in the holidays of a few days open the door that depend on the
time set here .
30
Note: 1, when the holidays Setting take effective, the Staff can not
open the door; until whose the group Time Period and holidays
hours are must be in intersection.
2, when the holidays set to be ineffective, then the team's entry
time from holiday.
Scroll / key to move the cursor to the items to be set up. If
it is the input box input to provide value with the small number
keyboardIf it is a rolling box, scroll / key to switch and set
its value, after complete setting, directly press the menu keys to
save setting and return the previous interface, press the "ESC "
button to Cancel and return to the previous interface.
2) Editing group Time Period
firstly choose the line to be edited ,directly press
OK
button or press the menu button , choose the item to be edited in the
event of operation menu appear:
32
33
Scroll / key to select new and entered the new interface, such
as add a the combination that can unlock in event of which group
1, group 2 together verify successful, as shown below:
34
Scroll / key to move the cursor to the input box, input the
value to be set through the small number keyboard, after the
completion, press the menu keys to save settings, Press the ESC
key to exit.
5) Editing unlock Combination
The firstly selected item to be edit, directly press the OK button or
press the menu button , choose Edit in the event of the operation
menu appear:
35
Scroll / key to move the cursor to the input box, input the
value to be set through the small number keyboard, after the
completion, press the menu keys to save settings, Press the ESC
key to exit.
6) Delete unlocks combination
To delete the selected item, press the menu button, choose Delete
in the event of the operation menu appear.
37
Instructions:
38
39
OK button to implement
41
OK to
card, remove the cards from the equipment, after the equipment
prompt that verification is completed successfully verified.
Note : Please enter the user Access Control settings and switch to
the RF test, or they will not validated.
OK to
43
Step 5: place the cards near the induction area, waiting for the
equipment read fingerprint data into the card until the equipment
motion that the registration is successful.
2, Verification:
Slight ware card the near induction, after the equipment induct the
card, to be removed card from equipment , equipment motion to
press fingerprint, after successful and completion of verification. If
44
place the cards near area, waiting for all card information will be
deleted by the equipment ,if card data still is stored on the devices,
the equipment will also motion whether you want to remove the
equipment information, choose "Yes" , the user fingerprints and
information in the equipment, choose "no" , then keep up
information in the device.
45
46
to confirm
47
3 Communication setting
If when transfer the data between the equipment and PC, it is
necessary to set the equipment communication parameter Press the
transmission cable, When the equipment and the machine are in the
communication, the "in the work... ... Message will display on the
equipment Please did not operate the equipment by now.
48
Note: please inspect the setting here before the machines communicate
with the computer, the parameter must be consistent with one on the
communication option on the software.
49
Network speed: The network run speed, there are three kinds of
options, automatic adoption, 10M, the 100M, set up network speed
Press your equipment that is plugged into a locate area network
using Ethernet cable
Instruction
Scroll the/ /
key to shift the cursor to input box,
configure the value with the numeric keyboard input, when it locate
to the network speed, scroll the / key to select value which is
your favor. After the set up, directly press
OK or the
key to save the settings and return to unpaged, and return to an
interface, press the ESC key to cancel.
Scroll the /key to shift the cursor on the item you need set,
scroll the / key again to shift the value which you choose. After
setting up, directly or then press OK or
key to save this setting
and return to preceding interface, press the ESC key to cancel.
51
52
Scroll the/key shifts the cursor to input box, configure the value
with the numeric keyboard input. After the setup completed, directly
press OK or the
key to save the settings and return to
preceding interface, press the ESC key to give up option and return
preceding interface.
54
55
Type the valid password , there are the four groups password in the
WEP password, if the four groups have been set to the correct password,
only the currently selected password take effect.
WPA password
2) Assign IP:
Here assign the IP address to the wireless network equipment.
Which does not associates with the network settings of
communications setting
57
3.6 Wiegand
The definition of Wigand input and output format.
Pulse interval: which is default 900 microseconds, can be adjusted
between the 200 and 20000.
Output: wiegand output signals contained in the content choose to
include workers, or card number.
Instruction
58
59
sitecode refer to the W26 format output without site code. If there
is no set site code, the output signal does not contain the
information, if set up a site code, the output is set a site code
(similar to machines No., this is different from the user's own code
is designated, and the different machines Can repeat, in the range
between 0-255).
Failure ID: verify output after the failure of the failure of ID
number, when the choice is not the closure of the output. Range
between 0-65534.
Site Code: similar to machines No., this is different from the user's
own code is designated, and the different machines can repeat, in
the range between 0-255.
Pulse Width: refers to the Wiegand pulse, width the default is 100
microseconds, can be adjusted within the scope of 20-800.
Pulse interval: the default 900 microseconds, can be adjusted
between the 200-20000
Pulse content: weight input signal contain the content,
include choice of PIN, or card number
Instructions
61
that
Scroll / key to move the cursor to the item to be set up. If it is the
input box, type the number keys to input the value, if it is the rolling
box, scroll /
key to switch to set the value , for example, attempt
revise the failure to type ID figure to 10, scroll / key to set the
options as open, then enter10 figure in the box. After completed .press
OK to save your settings and return main interface, press the "ESC" key
to cancel and return to the main interface.
62
4 System Setting
To set up system parameter, make the equipment at the function,
display with the perfect exhibition, pursue user's satisfactions.
FAR
One-to-many
One-to-one
High
Low
45
25
Middle
Middle
35
15
Low
High
25
10
MM/DD/YY,
MM.DD.YY,
DD-MM-YY,
favor
Alarm attendance log( Alms Attlog), When the remainder log
capacity reached set numerical value, it will automatically sound
warning that logs will be full ( virtual value is 1-99).
Recheck Minute: set it within the scope (unit: minute). Someone
attendance has been recorded, then the second record will not
display (virtual value is 66)
Instruction
Scroll the/key to shifts the cursor on the item which you need
set. If the item is inputting box, configure the value with the
numeric keyboard input; If the item is rolls the frame, Scroll
the / key to choose the value you need, after the setting finished,
please directly press OK or
key to save this item and return
to preceding interface, press the ESC key to give up operation and
return to interface.
65
Scroll the/ key to shift the cursor on the button which you
will operate. press OK or
to start operation, when the prompt
Are you sure to continue the current this operation? appear on
the equipment, press OK or
key again , be sure that the data
will be deleted, if after you delete the data, the data will be unable
to restore. Press ESC key to exit and return to up aged.
66
Scroll the "/" key to preview the advertising picture which has
already saved in the equipment, if you want to delete this picture
then click on the OK key to delete it, after the prompt to delete
successfully appear on the equipment , after deleted completed
automatically jumps to the next picture. If you want to delete all
advertising picture in the equipment, click Clear All button. Press
the ESC key to return to the data management interface.
67
Caution: the user does not random upgrade the firmware, you must
be allowed by the dealer before to upgrade the firmware,
voluntarily upgrade occur the trouble which possibly affect your
normal use
Instruction
Plug the USB flash disk with Upgrade file into slot, click on this
item, the equipment will automatically recognize upgrading file
and upgrade firmware, the corresponding prompt will appear to
show upgrade successfully or fail.
68
69
Scroll / key, the "*" key may be defined to work code or the
short message, the function definition key.
2) Establishes as the condition key
Scroll /the key to switch input box, press the numeric key to
input or Scroll /
key to set the value. After the setting
completed, directly press
to save and returns to interface, the
press "ESC" to cancel setting and return to the interface.
71
72
confirm the equipment will permits you try again. You also may do
yourself favor to set the initial windows.
Clock mode: After the user verifying operation, the clock style of
your choice will display on the verification screen here, regardless
of the success or failure.
Advertising Picture: The user may place some the advertising
pictures display on the screen Press need.
1) The circulation interval of the picture (Picture Loop) refer how
long time separately transfer the advertising picture (virtual value is
3 ~ 999 seconds)
2) the time delay refer to how long the clock picture display after
the user verification finished, the time delay pass over, the initial
window will display the advertising picture again. (Virtual is 0~
999 seconds, 0 express continuously display clock picture.)
Instruction
73
Scroll the/key shifts the cursor to input box, set up the value
with the numeric keyboard input,. After the set up, directly press
OK or the
key to save the settings and return to preceding
interface, press the ESC key cancellation and return to on an
interface
Scroll the/key shifts the cursor to input box, set up the value
74
with the numeric keyboard input,. After the set up, directly press
OK or the
key to save the settings and return to preceding
interface, press the ESC key to give up
76
Scroll the/key shifts the cursor to input box, set up the value
with the numeric keyboard input,. After the set up, directly press
OK or the
key to save the settings and return to preceding
interface, press the ESC key to give up.
77
5 Time date
5.1 Time and Date settings
It is necessary to set the accurate date and time for each of
equipments. To obtain guarantee for tracking accurate attendance
time.
Enter option to set the time and date
Instruction
80
81
equipment.
instruction
plug the U flash disk into the USB slot of fingerprints machines,
then the scroll " / " key to select users to upload data, after
choose ,then press OK , the udata.dat and sms.dat 2 files in the U
flash disk will be uploaded to the machines.
Plug the USB flash disk in the USB slot of the fingerprint machine,
scroll the"/" t key to preview the picture in the USB flash disk
then press the OK key to choose the picture you want to
82
83
7. Automatically test
The equipment provides with the automatic test function to test
each module in the fingerprint machine, help the operator fast
check the module, if the machine breakdown possibly occur.
Including TFT screen, voice prompt, clock, keyboard, and
fingerprint sensor test. Choose the option to test.
finger when you place the fingerprint sensor window. Press ESC
key to exit from this test.
86
8. Inquiry record
When the fingerprint machine track the staff time & attendance
successfully the record will be saved in, in order to provide the
staff with convenience to know his/her attendance logs, this
machine offer the inquiry record function.
87
1) When the AC.NO that you input is empty, express that all staffs
will be inquiried
2) Input some AC.NO, then inquiry this staff's attendance record
only. After complete to inquiry these records which meet the
inquiry condition will appear on the screen:
Scroll the /key to locate the cursor to the line that you want to
view, press OK key to browse the detailed Time & Attendance
log.
For example on May 8 10,001 staffs' detailed situations:
88
89
9. Systems information
Through the system information option, you may know this
machine memory as well as the machine edition information and so
on.
90
detailed solution
1, 0 ~ 9, is used in to input the staff to number, numeral
and password so on.
2in the management user interface digital 0 are " search
user" shortcut key.
1Upward .
2shortcut key.
1Downward .
2Shortcut key.
1Revision goal value.
2Shortcut key
1Revision current project
2Shortcut key
1Shut down key. Press this key least for 3 seconds in the
2Shortcut key.
ESC
2.shortcut key
3.start the T9 input method
#
Two model
keys
Number
keys
Detail Explanation
1,0 ~ 9, is used to input staff numbers, passwords, and
other figures.
2, In the user management interface the digital 0 button is
used as "View users" shortcuts.
1, upward .
2, shortcuts.
1, down
2, shortcuts.
1, modify the value of the current project.
2, shortcuts.
1, modify the value of the current project.
2, can be used as shortcuts.
1, shutdown button. In the initial interface, hold down this
key for three seconds into the shutdown countdown state.
2, shortcuts.
93
OK Key
ESC
2.shortcut key
3.start the T9 input method
#
bond.
2, can be used as shortcuts.
Detail Explanation
1,0 ~ 9, is used to input staff numbers, passwords, and
other figures.
2 In the user management interface the digital 0 button is
used as "View users" shortcuts.
1, upward .
2, shortcuts.
1, down
2, shortcuts.
1, modify the value of the current project.
94
2, shortcuts.
1, modify the value of the current project.
2, shortcuts.
1Door Bell key
2, shortcuts.
1, the Backspace key. If when input AC.NO, password,
system setting value ,if you make the mistake , press
this key to be possible to delete the value ,input it
again.
2, can be used as shortcuts.
Menu Key, confirmed Key
OK
OK Select characters
ESC
Tab
PgUp
PgUp
keys
Number
keys
Detailed Explanation
1,0 ~ 9, is used to input staff numbers, passwords, and other
figures.
2 In the user management interface the digital 0 button is
used as "View users" shortcuts.
95
M/OK
ESC
96
Backspace key
Startup/Switch inputting
Blank Key
97
/ Page up/Down
OKChoose letter
Take an example for the T9 English input: Input Arabia "
press the * numeric key to enter the T9 input method.
Press numeric 2
key
98
If must continue, presses the above method to carry on the input again.
After the input completed, presses the ESC key to exit
99
Appendix
Multicombination
Authentication Mode
In order to meet the high-security Access Control occasions needs.
Taking into account the use of Access Control, we provide a various
functional verification methods, individuals or groups can be set up
against a variety of types of verification, there are four matching way
types main number (PIN), fingerprints (FP), password (PW) and RF, not
only can achieve alone fingerprint, a separate password, ID, and
fingerprint verification, could also achieve fingerprint + password,
password + fingerprint+ card, numbers + fingerprint + password
combination verification methods.
Note: 1) Mifare in specific processing can be regarded as RF,if the
verification involved in the type of Mifare card, only use the function of
machines Mifare cards may.
2) Except certain specific types of machines, other machines only
fingerprint verification and password verification test two types,
machines with Mifare card functions, also Mifare card verification.
provided
"/" Or , "&" and ,"" confirmed, (Enter).
The following table describes that the user is registered by fingerprint
cards and a password; the following verification maybe is used in future
multi- combination verification:
100
Type
Description
FP
PIN
PW
RF
FP/PW
FP/RF
fingerprinting or RF verification
1PIN+FP(1:1)
2FP(1:N)
3RF+FP
PW/RF
password or RF verification
1 RF+FP
2 PIN++PW
FP/PW/RF
101
2 FP(1:N)
3 PIN+PW
4 RF+FP
FP&PIN
FP&PW
FP&RF
PW&RF
FP&PW&RF
FP&PIN&PW
FP&RF/PIN
102
3PIN++FP(1:1)
Description
Registration password
FP
only
verification
fingerprint
1.PIN+FP(1:1
verification)
2FP (1: N verification)
3RF+FP(1:1)
PIN
Failed to pass
PW
Registration fingerprint
1PIN+
only
verification
password
Password wrong
1 PIN++PW
2RF+PW
RF
only
RF
Verification
Card
1RF+FP
FP/PW
1RF
fingerprint or password
verification
1 PIN+FP(1:1)
1 PIN++PW
2 FP(1:N)
2 RF+PW
3 PIN++ FP(1:1)
4 RF+FP(1:1)
103
FP/RF
fingerprinting
verification
or
RF
1RF
1 PIN+FP(1:1)
2 FP(1:N)
3 RF+FP
PW/RF
FP/PW/RF
password
verification
or
RF
1 RF
1 PIN++PW
2 PIN++RF
2 RF
fingerprint or password or
RF verification
1 PIN+FP(1:1)
1 PIN++PW
2 FP(1:N)
2 RF
3 PIN++ FP(1:1)
4 RF+FP
FP&PIN
PIN
number
and
fingerprint verification
1 PIN++FP(1:1)
Failed to pass
2 RF+ PIN++FP(1:1)
FP&PW
FP&RF
Failed to pass
RF and fingerprint
verification
Failed to pass
1 RF+FP(1:1)
2 FP(1:N)+RF
3 PIN+FP(1:1)+RF
PW&RF
passwords
and
104
RF
verification
Failed to pass
FP&PW&RF
1 RF+PW
2 PIN++PW+RF
fingerprinting, passwords
and RF Verification
Failed to pass
FP&PIN&PW
Failed to pass
FP&RF/PIN
Failed to pass
Failed to pass
105
Scroll the / key to browse the Time & Attendance record line
106
by line
Press /
record;
Press OK or
107
108
Appendix 6
function
anti-pass
back
[Summarize]
If you want to prevent following occasion occur, a people follow
the others to enter the building, but he/she do not go out with
people together, and potential safety problems arise, this anti-pass
back feature provide that, unless the access records match, the door
is unable to be open.
This feature requires two machines work with together. A machine
is installed in the building (the "host"), other machine is installed in
the outside (hereinafter referred to as "client"). Between the two
machines connect through Wiegand communications signals.
[Principle]
The host own Wiegand In, the client with Wiegand Out function.
Connect Wiegand Out signal of the client machine to the Wiegand
In of host machine, Wiegand signal that output from the client
machine ,send it to host, must be without machine No., the number
in the host must exist, that is the function of two anti-pass back
the machines of users And the host must match.
[Instruction]
According to the most recent user accessed records to determine
whether anti-pass back, accessed logs must be matching. There are
IN ,Out , In-Out to anti-pass back function.
109
112
Appendix 7 Photo ID
Some equipment the Photo ID function provide , Photo ID feature is that
when a user go to performances authentication, the show, names and
other information screen , users photo which is stored in the U flash disk
also appear on the screen.
[Steps]
1, if there is not SD card in the equipment, the steps are as follows:
1) Create a photo folder in the U flash disk, which is named as photo,
the user's photos is stored in the folder.
2) Users photo must be in the JPG format, the file name must be the
name of working No.. For example: The No. 154 for the corresponding
photos of the user names would be 154. Jpg.
3) plug U flash disk into the USB slot of fingerprint machine, then
proceed to verify that the user can display photos.
2), while user goes on authentication, the U flash disk have been planted
on the device.
2, If the device with SD card, the steps are as follows:
1) Create a photo folder in the U flash disk, which is named as photo,
the user's photos is stored in the folder..
2) Users Photo must be in the JPG format, the file name must be the
name of, the User name can not be more than eight figures. For example:
The No. 154 for the corresponding photos of the user names would be
154. Jpg.
3) plug U-flash disk into the USB slot of fingerprint machine, enter the
U flash disk-management -> upload data -> upload users photos.
Operation is same with a 6.6 upload custom picture.
4) Download, enter the U flash disk -management -> Download ->
download users pictures, a folder will be automatically build on the U
flash disk -called photo , users download photos will be all existence on
this folder.
114
RoHS Compliance
The standard of environmental protection of these products in this
statement refers to safety deadline under the conditions of provisions
using the product no leakage of toxic or hazardous substances harmful
to.
The standard of environmental protection products by the deadline
does not include the batteries or be easy to wear and tear of the regular
replacement parts. The deadline for the use of environmentally friendly
batteries is five years.
Table of hazardous substances' name and concentration
Component
Name
Hg
Cd
Cr6+
PBB
resistors
SMD
capacitor
SMD
inductors
SMD diode
PCB
Buzzer
Adopter
Screws
(PBDE)
115
one of the homogeneous materials used for this part is above the limit
requirement in SJ/T11363-2006.
Note80% component of this product are made from non-toxic or
hazardous substance, Applications of hazardous substances in this
device are required to achieve its intended uses, due to lack of
reasonably (economically or technically) available substitutes. Indicates
that the concentration of the hazardous
116