Face Recognition Access Controller
Quick Start Guide
V1.0.3
Foreword
General
This manual introduces the installation and basic operations of the Face Recognition Access Controller
(hereinafter referred to as "access controller").
This manual applies to model G and model J access controllers. Figures of model G access controllers
are demonstrated in the manual for example.
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Indicates a high potential hazard which, if not avoided, will result in
DANGER death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
WARNING could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or unpredictable
CAUTION result.
TIPS Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and supplement to
NOTE the text.
Revision History
Version Revision Content Release Date
V1.0.3 Update the manual. October 2022
V1.0.2 Update the manual. April 2022
Update the figure of face detect screen.
Update the distance requirement between
V1.0.1 August 2020
the face and camera.
Add a warning statement.
V1.0.0 First release. June 2020
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible identification to inform people
I
of the existence of the surveillance area and provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations and
technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This chapter describes the contents covering proper handling of the access controller, hazard
prevention, and prevention of property damage. Read these contents carefully before using the access
controller, comply with them when using, and keep them well for future reference.
Transportation Requirement
Transport, use and store the device under allowed humidity and temperature conditions.
Storage Requirement
Store the device under allowed humidity and temperature conditions.
Installation Requirements
Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
Do not place the device in a place exposed to sunlight or near heat sources.
Keep the device away from dampness, dust, and soot.
Install the device on a stable surface to prevent it from falling.
Install the device in a well-ventilated place, and do not block its ventilation.
Use an adapter or cabinet power supply provided by the manufacturer.
Use the power cords that are recommended for the region and conform to the rated power
specifications.
The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
Operation Requirements
Do not connect the power adapter to the device while the adapter is powered on.
Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
III
is stable and meets the power supply requirements of the device.
Do not connect the device to two or more kinds of power supplies, to avoid damage to the device.
Improper use of the battery might result in a fire or explosion.
When replacing battery, make sure the same model is used.
The appliance coupler is a disconnection device. When using the coupler, keep the angle for easy
operation.
When used in outdoors with high temperature, do not directly touch the surface of the access
controller, such as the screen, metal back shell, and fingerprint sensor.
Check whether the power supply is correct before use.
Do not unplug the power cord on the side of the device while the adapter is powered on.
Operate the device within the rated range of power input and output.
Transport, use and store the device under allowed humidity and temperature conditions.
Do not drop or splash liquid onto the device, and make sure that there is no object filled with
liquid on the device to prevent liquid from flowing into it.
Do not disassemble the device without professional instruction.
IV
Table of Contents
Foreword ............................................................................................................................................................ I
Important Safeguards and Warnings ............................................................................................................. III
1 Dimensions and Components ...................................................................................................................... 1
2 Connection and Installation ......................................................................................................................... 3
Cable Connection ...................................................................................................................................................................... 3
Installation Notes ....................................................................................................................................................................... 5
Installation .................................................................................................................................................................................... 6
2.3.1 Installing Access Controller of Model G................................................................................................................ 6
2.3.2 Installation of Access Controller of Model J ........................................................................................................ 9
3 System Operations ...................................................................................................................................... 11
Initialization................................................................................................................................................................................11
Adding New Users ...................................................................................................................................................................11
4 Web Operations ........................................................................................................................................... 14
Notes of Face Recording/Comparison....................................................................................... 15
Fingerprint Record Instruction.................................................................................................. 18
Cybersecurity Recommendations ............................................................................................. 20
V
1 Dimensions and Components
Dimensions and components of model G (mm [inch])
Table 1-1 Component description
No. Name No. Name
1 White LED illuminator 3 Dual cameras
2 Microphone 4 Screen
Dimensions and components of model J with fingerprint sensor (mm [inch])
Table 1-2 Component description
No. Name No. Name
1 White LED illuminator 3 Screen
2 Dual cameras 4 Fingerprint sensor
5 Microphone — —
1
Dimensions and components of model J without fingerprint sensor (mm [inch])
Table 1-3 Component description
No. Name No. Name
1 White LED illuminator 3 Display
2 Dual cameras 4 Mic
2
2 Connection and Installation
Cable Connection
Check whether the access control security module is enabled in Function > Security Module. If
enabled, you need to purchase access control security module separately. The security module
needs separate power supply.
Once the security module is enabled, the exit button, turnstile control, and firefighting linkage
will be invalid.
Cable Connection of Model G
Cable connection of model G
Table 2-1 Component description
No. Name
1 USB port.
2 100 Mbps network port.
3 Power port.
3
Ports of model G
Cable Connection of Model J
Cable connection of model J
4
Ports of model J
Table 2-2 Component description
No. Name
1 USB port.
2 100 Mbps network port.
3 Power port.
Installation Notes
If there is light source 0.5 meters away from the access controller, the minimum illumination
should be no less than 100 lux.
We recommend that the access controller is installed indoors, at least 3 meters away from
windows and doors and 2 meters away from lights.
Avoid backlight and direct sunlight.
Ambient Illumination Requirements
Ambient illumination requirement
5
Places Recommended
Places recommended
Places Not Recommended
Places not recommended
Installation
2.3.1 Installing Access Controller of Model G
Desktop Installation
Insert the buckle of the desktop bracket into the rear slot of the access controller, and then slide it
down to the end.
6
Desktop installation (1)
Desktop installation (2)
7
Wall Installation
The recommended distance between the lens and ground is 1.4–1.6 meters.
Installation height
Wall installation
Drill four holes in the wall according to holes in the bracket.
Fix the bracket to the wall by installing the expansion screws into the four bracket installation
8
holes.
Connect cables for access controller. See "2.1 Cable Connection".
Hang the access controller on the bracket hook.
Tighten the screws at the bottom of the access controller.
2.3.2 Installation of Access Controller of Model J
The recommended distance between the lens and ground is 1.4 meters.
Installation height
Wall installation
9
Apply silicon sealant to the access controller
Installation Procedure
Drill four holes in the wall according to holes in the bracket.
Fix the bracket to the wall by installing the expansion screws into the four bracket installation
holes.
Connect cables for access controller. See "2.1 Cable Connection".
Apply silicon sealant to gaps of the cable entry for waterproof. See Figure 2-5.
Hang the access controller on the bracket hook.
Tighten the screws at the bottom of the access controller.
Apply silicon sealant to gaps between the wall and the access controller.
10
3 System Operations
Initialization
Administrator password and an email should be set the first time the access controller is turned on;
otherwise the access controller cannot be used.
Initialization
The administrator password can be reset through the linked email address when you forget it.
The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
For access controllers without touchscreen, initialization can be completed through the web
interface. See the user manual for details.
Adding New Users
You can add new users by entering user IDs, names, importing fingerprints, face images, passwords,
and selecting user levels.
The following figures are for reference only, and might differ from the actual product.
11
On the standby screen, press and hold 3 seconds to go to the Administrator Login screen.
Tap Admin to log in to the Main Menu screen with an admin account.
Select User > New User.
New user
Configure parameters on the screen.
Table 3-1 New user parameter description
Parameter Description
Enter user IDs. The IDs consist of 32 characters (including numbers and letters), and
User ID
each ID is unique.
Name Enter names with at most 32 characters (including numbers, symbols, and letters).
At most three fingerprints of one user can be recorded, and one fingerprint need to
be verified three times.
You can enable the Duress FP function under each fingerprint, and only one of the
three fingerprints can be the duress fingerprint. Alarms will be triggered if a duress
FP fingerprint is used to unlock the door.
We recommend you set the first fingerprint as the duress fingerprint.
Fingerprint unlock is only available for access controllers with fingerprint
sensors.
Make sure that your face is centered on the image capturing box, and then the face
Face image will be automatically captured. For details about face image recording, see
"Appendix 1 Notes of Face Recording/Comparison."
You can register at most five cards for each user. On the card registration screen, enter
Card your card number or swipe your card, and then the card information will be read by
the access controller.
12
You can enable the Duress Card function on the card registration screen. Alarms will
be triggered if a duress card is used to unlock the door.
If the access controller has no card reading module, you need to connect the device
to peripheral card readers.
The door unlocking password. The maximum length of the password is 8 digits.
PWD
If the access controller has no touch screen, you need to connect the access controller
to a peripheral card reader. There are buttons on the card reader.
You can select a user level for new users. There are two options.
User: Users only have door unlock permission.
Admin: Administrators can unlock the door and also have parameter
Level configuration permission.
In case that you forget the administrator password, you had better create more than
one administrator.
The period in which the user can unlock the door. For detailed period settings, see
Period
the user manual.
Holiday You can set a holiday plan in which the user can unlock the door. For detailed holiday
Plan plan settings, see the user manual.
Valid Date You can set a period during which the unlocking information of the user is valid.
There are eight levels:
General: General users can unlock the door normally.
Blocklist: When users in the blocklist unlock the door, service personnel will get
a prompt.
Guest: Guests are allowed to unlock the door certain times or in certain periods.
Once they exceed the maximum times or periods, they cannot unlock the door.
User Level Patrol: Patrolling users can get their attendance tracked, but they have no
unlock permission.
VIP: When VIP unlocks the door, service personnel will get a prompt.
Special: When special people unlock the door, there will be a delay of 5 seconds
before the door is closed.
Custom User 1: Reserved for customization. Users can unlock the door normally.
Custom User 2: Reserved for customization. Users can unlock the door normally.
For a guest user, you can set the maximum number of times that the guest can unlock
Use Time
the door.
Tap .
13
4 Web Operations
The access controller can be configured and operated on the web interface. Through the web interface
you can set parameters including network parameters, video parameters, and access controller
parameters; and you can also maintain and update the system. For details, see the user manual. Here
only describe the login operation.
You need to set a password and an email address before logging in to the web interface for the first
time. The Password that you set is used to log in to the web, and the email is used to reset passwords.
Open IE web browser, enter the IP address (192.168.1.108 by default) of the access controller
in the address bar, and then press the Enter key.
Make sure that the IP address of the computer used to log in to the web is on the same
LAN with the access controller.
Login
Enter the username and password.
The default username of administrator is admin, and the password is the login password
after initializing the access controller. Change the administrator password regularly and
keep it properly for security.
If you forget the administrator login password, you can click Forget Password? to reset
it. See the user manual.
Click Login.
The homepage of the web interface is displayed.
14
Notes of Face Recording/Comparison
Before Registration
Glasses, hats, and beards might influence face recognition performance.
Do not cover your eyebrows when wearing hats.
Do not change your beard style greatly if you will use the device; otherwise face recognition
might fail.
Keep your face clean.
Keep the device at least two meters away from light source and at least three meters away from
windows or doors; otherwise backlight and direct sunlight might influence face recognition
performance of the device.
During Registration
You can register faces through the access controller or through the platform. For registration through
the platform, see the platform user manual.
Make your head center on the image capture box. A picture of your face will be captured automatically.
Appendix Figure 1-1 Registration
Do not shake your head or body, otherwise the registration might fail.
Avoid two faces appear in the image capture box at the same time.
15
Face Position
If your face is not at the appropriate position, face recognition effect might be influenced.
Appendix Figure 1-2 Appropriate face position
Requirements of Faces
Make sure that the face is clean and forehead is not covered by hair.
Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image
recording.
With eyes open, without facial expressions, and make your face toward the center of camera.
When recording your face or during face recognition, do not keep your face too close to or too far
from the camera.
Appendix Figure 1-3 Head position
16
Appendix Figure 1-4 Face distance
When importing face images through the management platform, make sure that image
resolution is within the range 150 × 300–600 × 1200; image pixels are more than 500 × 500; image
size is less than 75 KB, and image name and person ID are the same.
Make sure that face does not take 2/3 of the whole image area, and the aspect ratio does not
exceed 1:2.
17
Fingerprint Record Instruction
Notice
Make sure that your fingers are clean and dry before recording your fingerprints.
Press your finger to the fingerprint recording area, and make your fingerprint is centered on the
recording area.
Do not put the fingerprint sensor at places with intense light, high temperature, and high
humidity.
If your fingerprints are worn or are unclear, try other unlock methods.
Fingers Recommended
Forefingers, middle fingers, and ring fingers are recommended. Thumbs and little fingers cannot be
put at the recording center easily.
Appendix Figure 2-1 Recommended fingers
Finger Pressing Method
Correct method
Appendix Figure 2-2 Correct finger pressing
18
Incorrect method
Appendix Figure 2-3 Wrong finger pressing
19
Cybersecurity Recommendations
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.
2. Update Firmware and Client Software in Time
● According to the standard procedure in Tech-industry, we recommend to keep your equipment
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with
the latest security patches and fixes. When the equipment is connected to the public network,
it is recommended to enable the“auto-check for updates” function to obtain timely information
of firmware updates released by the manufacturer.
● We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices. For
example, place the equipment in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from carrying
out physical contacts such as damaging hardware, unauthorized connection of removable
equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password reset
in time, including the end user’s mailbox and password protection questions. If the information
changes, please modify it in time. When setting password protection questions, it is suggested not
to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to guarantee
the account security. If an attacker attempts to log in with the wrong password several times, the
corresponding account and the source IP address will be locked.
20
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers between
1024–65535, reducing the risk of outsiders being able to guess which ports you are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment, thus
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you use
encrypted transmission function, to reduce the risk of audio and video data being stolen during
transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check equipment log: By viewing the logs, you can know the IP addresses that were used to
log in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure that
the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
21
In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If there
are no communication requirements between two sub networks, it is suggested to use VLAN,
network GAP and other technologies to partition the network, so as to achieve the network
isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.
22