Hanwang Technology FACEID-MX00 Facial Recognition Terminal User Manual

Hanwang Technology Co., Ltd Facial Recognition Terminal Users Manual

Users Manual

Download: Hanwang Technology FACEID-MX00 Facial Recognition Terminal User Manual
Mirror Download [FCC.gov]Hanwang Technology FACEID-MX00 Facial Recognition Terminal User Manual
Document ID2805978
Application IDh2iAuNLFPjyj80Bw3TaRJg==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize182.21kB (2277620 bits)
Date Submitted2015-11-07 00:00:00
Date Available2016-04-15 00:00:00
Creation Date2015-10-22 04:10:15
Producing SoftwareMicrosoft® Office Word 2007
Document Lastmod2015-10-22 04:10:15
Document TitleUsers Manual
Document CreatorMicrosoft® Office Word 2007

M500 Facial Recognition
Terminal
User Manual
Original operating instructions Version 1.1 / 12-2014
Confidential
EN
Page 1
General Notice
Although every care has been taken to ensure that this manual is reliable and accurate,
Hanvon Corporation (here after referred to as Hanvon) provides it „as is‟ and without
express, implied, or limited warranty of any kind. In no event shall Hanvon be liable for
any loss or damage caused by the use of this manual.
This manual describes M500 facial recognition terminal in detail and contains full operating
instructions.
Hanvon reserves the rights to change the specifications and information in this document
without notice. The information contained herein is proprietary to Hanvon. Release to thir
d parties of this publication or of information contained herein is prohibited without the pri
or written consent of Hanvon.
Copyright © Hanvon, 2014
Confidential
Page 2
Content
0. About this document ...................................................................... 4
1. Product Features ............................................................................ 5
2.1 Appearance View ............................................................................ 5
2.2 Installation Guide ............................................................................ 6
2.3 Connection Port .............................................................................. 7
2.4 Power up terminal .......................................................................... 7
2. Operating Guide............................................................................. 8
3.1 Admin. Management ...................................................................... 8
3.2 User Management ........................................................................ 11
3. 3 Data Management ....................................................................... 14
3.4 USB Management ......................................................................... 16
3.5 System Settings ............................................................................. 19
3.6 System Info. .................................................................................. 29
3. Appendix...................................................................................... 30
Appendix1. Product Specification ....................................................... 30
Appendix2. Caution ............................................................................ 31
Confidential
Page 3
0. About this document
Validity
These instructions are valid for the M500 Facial Recognition Terminal.
Target group
The target group for this document comprises the terminal operator and technical
personnel.
Content and purpose
These user manual describe the M500 facial recognition terminal installation and
operation information to users.
Supplementary documents
N/A
Abbreviations
Hanvon
Face ID
M500
Hanwang Technology Co., Ltd Brand
Hanwang Technology Co., Ltd Brand
M500 Facial Recognition Terminal
Danger categories and warning symbols
DANGER
Danger Operation!
NOTE
Application tips, useful information
Confidential
Page 4
1. Product Features
2.1 Appearance View
1. RFID Reader
2. Touch Display
3. Fingerprint Acquisition Module
4. Camera
5. Speaker
Confidential
6.
USB Socket(Just for data transmission)
7.
Reset Button
8.
Mini-USB Socket(Not open)
Page 5
9
10
11
12
13
9.
Cooling Hole
10.
Power Adaptor
11.
Installation Port
12.
Connection Port
13.
Port Network Cable Port
2.2 Installation Guide
User can drill the holes according to the
mounting diagram. Use the 4 wall mount,
screws to mount the bracket to the wall.
User also could mount the terminal by
choosing your “shortest” users and have
them stand in front of the device.
Hold the terminal on the wall that
employee can comfortably center their
face in the display window.
Confidential
Page 6
Use the 2 bracket screws on the bottom of the
bracket. Align the terminal with the pairs on
the mounting-plate and secure the two
together with the 2 Philips head screws. Be
careful not to pinch the AC cord. When
finished, plug the Power Adapter into the AC
wall outlet.
2.3 Connection Port
Top→Below
PIN
J1.1
J1.2
J1.3
J1.4
J1.5
PIN
J2.1
J2.2
J2.3
J2.4
Definition
VC12V
GND
LOCK_NO
LOCK_COM
LOCK_NC
Definition
WGD0_OUT
WGD1_OUT
ALARM_COM
ALARM _NO
Feature
12V Power Supply
Ground
Door Lock
Feature
Weigand Output
Alarm Set
2.4 Power up terminal
Select a proper language when the terminal boot first time. The terminal will provide
several language options for customers:
English
Spainish
Portuguese
Turkish
┉┉
Confidential
Page 7
2. Operating Guide
3.1 Admin. Management
 Admin. Management Main Menu

If no admin. in system, then press  to enter the main
menu.

If there has enrolled admin. in system, then press  to
enter admin. verifying process. While the verification is correct, then
the system enter to the main menu.
Press  buttom into  menu.

Set Admin.

There are total 8 admin. accounts. A < Admin. (null) > sign will
display for unset admin. accounts. Choose a  account to
register an admin.

Input Admin. ID: Input an ID for admin. If the ID is in the
database, then the terminal displays admin.‟s name.
Admin ID uses natural sequence numbers.
Admin.ID can‟t be duplicated and start with “0”.
 Input Admin. Name: Press  to switch different
character inputting mode.
 Admin. Types
Confidential
Page 8
 Super Admin. can operate all functions and normal
administrators.
The first administrator must be super admin and can‟t be
deleted in system.
 Normal Admin. can operate User/Data/USB Management
function, check system info. and auto test function.
Verification modes:
ID and Pin: Use ID and password sequentially as a
verification method.
ID and Face: Use ID and face sequentially as a verification
method.
Card and Face: Use card and face sequentially as a
verification method.
Card: Use card as a verification method.
 Add as an User: Press [Confirm] to make the admin. as an
user. If don’t, please check [Cancel].

If add as an user, please select the user privilege mode:
Access & Attendance: The terminal is used for access
control and time attendance with relay output.
Attendance: The terminal is only used for time attendance
without relay output.
Confidential
Page 9
 User Photo: Press [Capture] to capture a photo for the user.
If don‟t, please press [Cancel].

Admin Verification
 After set an admin. account, then press  to activate admin verification
process.
 Input admin. ID (or using registered RFID card)
 Input corresponding password or using face verification, according to the mode
during admin registration, after verification is successful, then the system enter to the
main menu.

Modify & Delete Admin account
 Select a registered admin. account to modify or delete this
account.
 Modify admin. name
 Change verification mode:
 Modify password
 Re-enroll face template
 Re-register RFID card
Delete the certain admin. account: If only one registered admin. account with in
the system, then it will be banned to delete.
Confidential
Page 10
3.2 User Management
 User Management Main Menu

User Enroll

Input User ID
The range of User ID is from 1-99,999,999,999,999.

Input name
Press  will switch character inputing mode
between   and .
User Name can contain 18-bit characters totally.

Select a verification mode
Face: Use face as a verification method.
Face and FP: Use face and fingerprint as a verification
method.
Face or FP: Use face or fingerprint as a verification method.
Fingerprint: Use fingerprint as a verification method.
Card and Face: Use card and face sequentially as a
verification method.
Card or Face: Use card or face separately as a verification
method.
Card: Use card as a verification method.
ID and Pin: Use ID and password sequentially as a
verification method.
Confidential
Page 11
Please make sure the customer don‟t
changed finger in this process. Because of
one finger will be collected 4 times.
The users can enroll 3 different fingers.

Select a privilege
Access & Attendance: The terminal is used for access
control and time attendance with relay output.
Attendance: The terminal is only used for time attendance
without relay output.
 User Photo: Press [Capture] to capture a photo for the user.
If don‟t, please press [Cancel].

User registering finished.

Input User ID
 Modify User
 Following the procedure to change
 and .
Confidential
,
Page 12
 Delete User
 Input an User ID
 Press [Confirm] (or [Cancel]) to confirm (or cancel) this
process.
 Delete All Users
 Press [Confirm] (or [Cancel]) to confirm (or cancel) this
process.
All user‟s ID, name and templates will be erased.
This step is irreversible. Not affect Admin data and records.
 User List
 Enter user list to check Un-enrolled and
Enrolled list.
 Press [Confirm] (or [Cancel]) to confirm (or
cancel) this process.
Confidential
Page 13
3. 3 Data Management
 Data Management Main Menu
 Record Management
 Record Inquiry: User records can be inquiry by User
ID/Name.
 Select a search mode to inquiry user
records.
 Select inquiry duration: 1 day/6 days /All records / from start
date to end.

Confidential
Del. by 6 months
Before 6 months records will be erased. This step is
irreversible.
Backup all user data before doing this step.
Page 14

Del. by Date: Input the delete time.

Delete All Records
All records will be erased. This step is irreversible.
Backup all user data before doing this step.
 Security Photo

Security Photo Switch: Turn on / off security photos function.
Default switch is off.
 Security Photo Browser: Browse sec. photo
before the date which customer input.

Delete All
All security photos will be erased. This step is irreversible.
Backup all user data before doing this step.
Confidential
Page 15
3.4 USB Management

USB Management Main Menu
Don‟t remove USB Disk while data transferring.
Try other USB Disk, if the terminal doesn‟t recognize it.
 Export Management
 Exp. Admin.: Export all admin. data into a file which named as
“MANAGER.TXT ”
 Exp. Part Users: Export part user‟s data into a file which
named “USER.TXT”
 Exp. All Users: Export data of all users.
Data is stored into a “USERALL.TXT” file.
 Exp. All Records: Export all user records into a file, which
named as “TIME+SN”.TXT.
For example, TIME063.TXT, “063” is the last 3 bits of SN of the
terminal.
 Exp. Admin. Log: Export all admin operating logs.
Data is stored into a “LOG.TXT” file.

Exp. Security photos: Set a time duration of exporting security
photos.
Security photos are saved in  folder

Exp. Config. File: Export terminal configuration file into a file,
which named as “sys.dat”.
 Import Management




Import admin
Import all administrators data from MANAGER.TXT file on an USB Disk into the
terminal.
Import Part Users
Import all users data from USER.TXT file on an USB Disk into the terminal.
Import All Users
Import all users data from USERALL.TXT file on an USB Disk into the terminal.
Import User List
Confidential
Page 16
Import all ID and name information of users from USERLIST.TXT file on an USB
Disk into the terminal.
It is a shortcut way to add user ID and name for a terminal before registration
process. The contents of USERLIST.TXT file are list of + +
.
The range of user ID is from 1-99,999,999,999,999.

Import work code
Import all work code data from WORKCODE.TXT file on a USB Disk into the
terminal.
The contents of WORKCODE.TXT file are list of  +  + .
The range of work code ID is from 1-99,999,999.

Import work status
Import all work status data from WORKSTATUS.TXT file on a USB Disk into the
terminal.
The contents of STATUS.TXT file are list of  +  + .
The range of work status ID is from 1-255.

Import Config. File
Import terminal configuration file from sys.dat file on a USB Disk into the
terminal.
 Set Wallpaper

Update the new wallpaper on a terminal.
240 * 320pix BMP/JPG file, and named to 
or .
 Set Prompt Audio

Confidential
Update Successful and Failed prompt audio on a terminal.
PCM, 16000Hz, 16bit, stereo wave file, and named to
 and 
Keep audio length less than 1 second.
Page 17
 Firmware Upgrade

Confidential
Upgrade a new firmware for a terminal.
Firmware files are  and 
Page 18
3.5 System Settings
 System Main Menu
 Basic

Date and Time
 Date and Time: System date and time
can be set with this function.

Date Format: System date format can be set in 9 formats.
 Daylight Saving: Set daylight saving
time.
Select proper DST format according to DST
rule of your region. Month-Day-Hour: DST
time starts on 01:00 AM May. 1st, and ends
at 03:00 AM Oct. 2nd
Default is off.
Confidential
Page 19

Volume

Set Volume: terminal support 4 modes to customers.
The default is medium.

Head Photo Switch

Photo ID Switch
Switch On: Users head photo will display on the screen
when the user verified successful.
Switch Off: Users head photo will not display on the screen
when user verified successful.
 Communication


Communication: Network and Wiegand Output setting.
Network

Network: Ethernet mode
The default is Ethernet.
Confidential
Page 20
 Network -DHCP
DHCP Switch: If the DHCP function turned on, user doesn‟t
need configure the IP/Mark/Gate for terminal.
If the DHCP function turned off, user needs configure the IP
Address/Mark/Gate for terminal.
Confidential
Page 21

Network -Password
It is for enhancing the security of network access through
software or SDK.
The password can be set max 8 bits.

1.
Network -Push to sever
Push to sever Switch: On/OFF
The default is off.
2. Record Data Switch: User can select record
data/record+security photo data be pushed to the server.
3. User Data Switch: User can select user template data/user
template+head photo data be pushed to the server.
4. Server configuration: User needs to
set IP address and port of server.
The
default
IP
address
is
192.168.0.3.
Confidential
Page 22
The default CMD/HBP port is
9920/9924.
The default HBP Delay is 60.
The port parameters have to more
than 1024. The HBP delay range is
10~300.

Communication -Wiegand Output

 Wiegand Output-Type: System
supports standard Wiegand protocol
output on the follow list.
The default type is Wiegand output
26.
 Wiegand Output-Pulse Width
Set proper pulse width for wiegand output to match the
external wiegand input terminal.
The default Pulse Width is 100 us.
The pulse width range is 20~8000 us.
 Wiegand Output-Pulse Interval
Set proper pulse interval for wiegand output to match the
external wiegand input terminal.
The default Pulse Interval is 1000 us.
The interval range is 200~20000us.
 Wiegand Output-Content
The user can set Weigand output content with RFID card or
User ID.
Confidential
Page 23
 Attendance

Attendance -Interval

Interval: Only the first record will be
saved while several records created by
the same user during defined interval
time.
The default Interval is 1 minute.
The interval range is 0~255
minutes.

Attendance – Bell
 Bell: User can select the attendance
bell on the list.
System supports 24 bell groups.

Bell Status Switch.
The default is off.
 Edit Bell Time: User can set bell time on/off from Monday
to Sunday.
The default is 1-1-1-1-1-1-1, (1=On, 0=Off)

Confidential
Bell Audio: System supports 7 groups audio.
Page 24

Attendance – Work Status
 Work Status: It is defined to mark the work status related to
each record such as in, out, overtime in, overtime out.
The default is off.
If Work Status is on, user could select the desired work
status directly
 Auto Switch: It is defined to display the work status
automatically according to the time that set.
For example, if the time of work status “in” set as 9:00 and
work status “out” set as 18:00, the work status “in” will be
displayed automatically when time reach 9:00 till time reach
18:00, the work status “out” will be displayed automatically
when time reach 18:00 till time reach 9:00 in next day. The
default is off.

Switch Time: User can set auto switch time.
The default is 09:00 for “in” and 18:00 for “out”.
 List: User can edit or add the work
status on the list by selecting the desired
one to edit or delete.

Edit and Delete: Add User could edit the ID and Name of
work status.
The default work status is In/Out and they can‟t be deleted.
New added work status could be deleted.
Confidential
Page 25

Attendance – Work Code
 Work Code: It is defined to mark the work code related to
each record such as engineering, maintaining, training etc.
The default is off. If Work Code is on, user has to select
the desired work code after verification.
 Add: User can browse/add work code
on this list.
 Edit and Delete: User edit the work status and code with
ID/Name.
 Security

Security – Access Control
 Unlock: User can set duration time
of unlock.
The default duration is 3 seconds.
The duration
seconds.
Confidential
range
is
0~10
Page 26
 Unlock Sync: It is defined to enable the unlock execution
synchronic to the attendance interval. The unlock execution
will be only executed at the first time for the same user during
defined time of attendance interval time.
The default is off.

Security – Alarm
 Remove
Enable/Disable
function.
Alarm
tamper
Switch:
alarm
The default is OFF.
 Rejection Alarm Switch: Enable/Disable rejection alarm
function
The default is OFF.
 Rejection Times: Set the rejection
times to activate rejection alarm
The default duration is 3 times.
The rejection time range is 1~9
times.
 Alarm Duration: Set the rejection
alarm duration
The default duration is 180s.
The range is 1~999S.
Confidential
Page 27
 Advanced
 Relay 2 Output: User can set output to
external Bell or Alarm output.
 Duplication Check: System will match new enrolled user
with database to check this user already enrolled or not. If
system displaying “Similar to ID XX”, admin is suggested to
check this user for double enrollment.
The default is OFF.
 Face Detection Switch: Enable/Disable face detecting
function when using Card and Photo recognition method.
The default detection is off.

Test All: Test all below hardware automatically
Press  if it is working normal
Press  if it is working abnormal.
A list of status will be displayed after all testing.
Check single function with device, LCD/Touch
Screen/Detection/Speaker/Camera/Card/Network/USB
Port: please operate follow the tips.
 Default: This operation will delete all data and
configurations. And then initialize the device to factory setting.
If the administrator , the terminal
will be in factory mode!
Confidential
Page 28
3.6 System Info.
 System Info.
 Capacity Info
 Face: Current enrolled user numbers and total capacity of
user numbers for face related recognition mode.
 Other: Current enrolled user numbers and total capacity of
user numbers for card and ID+PIN related recognition mode.
 Record: Current record numbers and total capacity of
record numbers.
 S. Photo: Current security photo numbers and total capacity
of security photos.
 Unsent Records: Unsent record numbers while push to
server mode is on.
 Unsent Users: Unsent user numbers while push to server
mode is on.
 Product Info.
 Product info: IP Address/Mask
Number/ /Gate/MAC/SN/Firmware
version/Algorithm/Working time.
Confidential
Page 29
3. Appendix
Appendix1. Product Specification












User capacity
1,000 users for face related verification method;
2,000 users for fingerprint related verification method;
10,000 users for other verification methods including card, card and photo, ID
and Pin
Record capacity
Data Capacity:100,000
Security Photo: 20,000
Verification methods
Face
Face and FP
Face or FP
Fingerprint
Card and Face
Card or Face
Card
ID and Pin
Languages:
English
Spanish
Traditional Chinese
Japanese
Korean
Turkish
Recognition algorithm
V3.1
Display: 2.8 inch Touch
RFID card: Proximity card or Mifare card (Optional)
Communication
TCP/IP
USB port
Power: 12V DC, 1.0A
Environment Light: 0-8,000 LUX
Working Temperature: 0°C-40°C
Working Humidity: 20% - 80%
Confidential
Page 30
Appendix2. Caution

Installation Environment
Terminal should install inside of the room, and make sure the installation place far
with the window/door/light more than 2 meters.
Outside of the room
Sunlight directly shines on the
terminal through the window.
Sunlight slanted shines on the
terminal through the window.

Restoration and restart
When the system halted and cannot quit, you can remove the adapter to restore and
restart the system, or you also can press  to restart the terminal.

Restore to default setting
Restore all parameters to the default setting.

Non-Water proof
The terminal is non-waterproof, please keep away from water.

Prevent from Falling
The parts in this terminal are friable; please prevent the terminal from dropping,
smashing, bending and high pressure.

Cleaning
Please use soft cloth or the other similar material to clean the screen and faceplate,
please avoid cleaning with water and cleanser.

Low Temperature Environment
The working temperature for screen and the main parts in this terminal are the normal
indoor temperature. The performance of this terminal will get worse, if the working
temperature extend this temperature range.
Confidential
Page 31
Please prevent the screen from oil
or any sharp objects.
Please use the equipped adapter
for the terminal, the other
unknown adapters will burn out
the terminal.
Warning
Any Changes or modifications not expressly approved by the party responsible for
compliance could void the user‟s authority to operate the equipment.
This device complies with part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired
operation.
Note: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generate, uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio
communications. However, there is no guarantee that interference will not occur in a
particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one or more of the following
measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
—Consult the dealer or an experienced radio/TV technician for help.
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment.
Confidential
Page 32

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Warning                         : Root object (1 0 obj) not found at 17
EXIF Metadata provided by EXIF.tools
FCC ID Filing: XQI-FACEID-MX00

Navigation menu