ZKTECO TL400B Fingerprint Lock User Manual

ZKTECO CO., LTD. Fingerprint Lock Users Manual

Users Manual

    User Manual ZKBioBL                               www.zkteco.com
 I Important Statement Thank you for choosing our product. Before use, please read this manual carefully to avoid unwanted damages caused, ensuring high effectiveness and authentication speed under proper use. It is informed that without our company's written consent, no copy or any other forms of distribution of this guide's content may be allowed.   The products described in the manual may contain copyrights shared by licensors including our company. Except having permission from license holder, no any copying, distribution, revision, modification, extraction, decompilation, dissembling, decryption, leasing, transferral, sublicensing, or other acts of copyright infringement will be allowed.     Due to constant renewal of products, our company does not guarantee that the information and technical parameters of this guide are exactly consistent with the actual product, nor do we make prior notice on any updates of the product. Our company will not undertake any disputes caused by the above problems.
 1 Contents Contents ................................................................................................................................................................................ 1 Necessity for ZKBioBL .................................................................................................................................................... 3 ZKBioBL Administrator Operating Procedures ............................................................................................. 4 Connecting ZKBioBL with Lock .............................................................................................................................. 5 Setting Administrator .................................................................................................................................................... 8 Unlocking the Door ..................................................................................................................................................... 11 Visitor Password ............................................................................................................................................................. 13 Creating New Phone User ....................................................................................................................................... 15 User Management........................................................................................................................................................ 16 Time table Management ......................................................................................................................................... 21 Checking Access Record .......................................................................................................................................... 25
 2 Device Management .................................................................................................................................................. 26 ZKBioBL Settings ............................................................................................................................................................ 28 Setting App Password .................................................................................................................................... 28 One touch to Open .......................................................................................................................................... 29 Enable APP Login ............................................................................................................................................... 30
Necessity for ZKBioBL 3 Necessity for ZKBioBL IPhone with system above IOS 7.0, such as iPhone4S/iPhone5/iPhone5S/iPhone5C/iPhone6/iPhone6 plus/iPhone7/iPhone7 plus/iPhone8 iOS OS Requirement: 7.0 and above Android OS Requirement: 4.3 and above Bluetooth Requirement: Bluetooth 4.0    A lock with Bluetooth function, such as    TL400B   The app may not operate normally when a low battery warning is displayed on the lock. Please renew the batteries  It is recommended to open and manage the lock using a phone within a distance of 3 meters. For a longer distance, the performance depends on the actual environment  Please do not operate the lock while connecting it with a mobile, or the lock may stop working.  The lock would restart automatically, or you need to reinstall the battery
 4 ZKBioBL Administrator Operating Procedures  Use phone to download and install ZKBioBL. Turn on Bluetooth to search for lock device, and connect ZKBioBL and the lock after pairing password verification  Enter supervisor password and set the privilege as Administrator  Unlock the door  Create visitor password  Create new phone user: create new phone app users for other users  User management: change user information and privileges, allocate time table, delete user etc  Time Table Management: edit and allocate time table  Search for access records  Device Management: manage device settings
Connecting ZKBioBL with Lock 5 Connecting ZKBioBL with Lock   Note: Please confirm that the Bluetooth function on the Phone device is turned on before using ZKBioBL to connect with the lock.   1. Turn on ZKBioBL and click [BLE Lock] on the main interface to enter the devices listing interface; the app will automatically search for surrounding Bluetooth devices.      Note:   1. When lock is not yet connected, click the Unlock button on the main interface, “Please connect to the lock first” will be displayed.   2. Click   or slide the finger down on the screen to refresh the “All Searched Locks” list.   3. The default device name of the lock equipped with Bluetooth is ZKBiolock. 4. Please do not operate the lock while connecting it with phone or the lock would stop working. If you face any issue with the lock, please take out the battery and re-insert it to restart.
 6 2. After the app searches for the lock, click the lock for connection on the device list and enter the correct Bluetooth connection password (the default connection password is 000000), and click [OK]:          Note: If a wrong connection password is input, “Connection failed” will be shown. Click [OK] to re-enter the password for matching.
Connecting ZKBioBL with Lock 7 After the device is connected to a lock, the LED green light of the fingerprint sensor will blink, and the app will return to the main interface automatically. You can see the connected devices list on the [BLE Lock] interface:       Note:   1. The default privilege for ZKBioBL new users is “Invalid User”. Administrator requires to assign privileges for new users by using admin password.   2. After successfully connected with the lock, the app will generate a number for the user’s default name. The user number and name can be changed, but the number cannot be duplicated; it can only be an integer within 1~65534.
 8 Setting Administrator After successfully connect the app with the lock, enter the [App Setting] interface and click [Supervisor password mode], and then enter the password (the default supervisor password is 12345678) and click [OK]. When entering the [Open] interface, the privilege has become “Administrator”:
Setting Administrator 9 Please note that the administrator is temporary at this stage; the user privilege is still Invalid User. You need to change privileges on the user information interface.   Click the   >   at the top right corner, slide down the screen to refresh the user list, and select the user corresponding to your number and name on the user list. Choose Administrator privilege on the editing interface and then click [Save]:
 10 Return to the user list interface, you can see your logo has been changed from Invalid User to Administrator.     Note: As shown in above figure, the user list needs to be refreshed by sliding down the screen so as to display the newly connected locks.     Icons Meanings  Administrator  Normal User  Temporary User  Invalid User  App. User   Fingerprint User  Password User  Card User
Unlocking the Door 11 Unlocking the Door 1. If a lock is connected but the user privilege has not been changed, when clicking the open button, “Access Denied” will be displayed, as shown in figure 2. If a lock has not been connected, when clicking the open button, the app will automatically search for the surrounding BLE locks, if you haven’t connect the lock or your privilege can’t unlock the door “Access Denied” will be displayed, as shown in figure   3. If you have privilege to open the door and once connected the lock, the lock will be unlocked.
 12
Visitor Password 13 Visitor Password After setting administrator, enter the [Unlock] interface and click” Visitor password” to access the visitor password generation interface. Enter admin password of the lock, then click Create Visitor password button at the center, the visitor password is created done, and you can copy the code and send to others who are temporary users. Note: ·You must know the admin password. ·The visitor password is limited to use one time in 5 minutes. ·Lock match the time of phone that last connection, so the phone time must same with the lock before using this function.
 14
Creating New Phone User 15 Creating New Phone User Create new phone user by installing ZKBioBL on the phone device of other users.   Administrator uses the app on the user’s phone device to connect to the lock, and enter admin password to assign privilege to the phone user (Admin, Normal User, and Temporary User), and also edit and save the user information (number and name).   After setting, the phone user can use the app to carry out operation corresponding to the set privilege.   Note: The procedure of creating new phone user is similar to that of setting administrator, with the main process of the administrator using the admin password to assign privileges for app users. For security reason, we strongly recommend the administrator not to disclose the password to anyone else. Each app for connecting with the lock is regarded as 1 user, occupying the storage of 1 user. The storage of lock is 100 users.
 16 User Management Users can be classified into four types according to the creating methods:   1. Fingerprint User: users directly registered in the lock.   2. Card User: users directly registered in the lock. 3. Password User: users directly registered in the lock. 4. Phone User: users created by app. Administrator can manage all users who registered in the lock and phone users.    To change user information and privilege and to allocate time table 1. Administrator enters the [User] interface, refreshes the user list and then synchronizes the user information in the lock with the app. Click the to-be-edited user on the user list, and change user PIN, name privilege and time table on the user information interface;   2. Click [Save] after editing.
User Management 17
 18        Pin: Default PIN denotes the user’s position in the system’s sequence. It should be numerical, which can be changed but cannot be duplicated. PIN ranges from 1 to 65534.   Name: Default name denotes the user’s position in the system’s sequence. It can be changed to any numbers, letters or signs, with the maximum length of 24 characters.   Privileges: Administrator, Normal User, Temporary User and Invalid User. Administrator can gain access anytime, check access logs, and change information of user, time table and device etc.; normal
User Management 19 user and temporary user can gain access anytime as well, but no other permissions are allowed; Invalid user cannot gain access anytime, no does he/she have other permissions.   Registration Time: This denotes when the user registered on the lock or when the phone user was connected with the lock; it cannot be edited.   Time table: The time table in which the user can gain access. In default setting, administrator uses Time table 1 ,invalid user uses Time table 2 and both two Time table are unchangeable; normal user and temporary user use Time table 3-12 and it is changeable; for more details, please refer to the Setting Time table below. Remarks: To add user remarks.   Note: There is no correlation between phone user and lock user. For instance, when one person is both lock user and phone user, since these two types of user use different codings, 2 out of 100 user capacity are occupied.  To Delete User Administrator enters the [User] interface, refreshes the user list and then synchronizes the user information in the lock with the app. Click the to-be-deleted user on the user list, and slide the screen to the left and click the delete button, so that all information of the user in the app and the lock are deleted.
 20          Note: For the procedure of deleting users in batches, please refer to the lock user manual.
Time table Management 21 Time table Management Time table is set for regulating user’s valid access time. Each user must belong to one time table.   Time Table: There are 12 time tables in the time table list, in which Time table 1 and 2 cannot be edited.    Time table 1: It includes anytime on every day, which means users applying this time table can gain access anytime.    Time table 2: It does not include any time, which means users applying this time table cannot gain access anytime.  Other Time table: To set at what time on which days within a week can users gain access in the other 10 time tables.   After editing time tables, you can distribute time tables to users except administrator.   Upload: To upload time table settings to the lock.
 22  To Edit Timetable 1.  Click in the “Time Table”, and select any time table from the 10 editable time tables;   2.    Choose on which day can users gain access (multiple selection is enabled), for example, select “Sun” and “Mon” for allowing users to unlock the door on Sunday and Monday;   3.    Set the start time and end time for each day, and then click [Done].
Time table Management 23  To Allocate Timetable   1. Choose the edited time table and click [Select Users], and select the user who uses that time table on the user list (multiple selection is enabled);
 24 Note: Only Normal User and Temporary User can choose time table; administrator uses Time table 1 and it is unchangeable.   2. Return to the time table setting interface, and click Save to upload the time table settings to the lock.          After uploading successfully, the lock will beep and the fingerprint sensor will be activated.   Note: You can also allocate the time table in User Management.
Checking Access Record 25 Checking Access Record Administrator can check all access records after entering the [Records] interface; all access records within 7 days will be shown. It supports searching for records within 30 days by choosing the date manually. It also supports quick search for records of a user or within a time period by inputting user name or ID.
 26 Device Management When administrator enters the [Setting] menu (as the below figure), he/she can change the Admin password of the app, Lock name, and Pairing password. He/she can set the always open mode.   Note: A lock can only have one connection password. Once the password is changed, the connection password for all app users is also changed.
Device Management 27  Admin Password: The default supervisor password is 12345678. After changing the admin password, a new password needs to be entered in supervisor password verification. The password should be in 8 digits.   Lock Name: Lock name, which is ZKBiolock as default. The lock name cannot be blanked; it supports at most 10 letters or numbers. After change, “Update Finish. BLE lock will disconnect soon!” will be displayed. The system will automatically search for devices after disconnection, and a device can be connected after returning to the [BLE Lock] interface.   Paring Password: The default connection password is 000000. After connection password is changed, the system will request user to re-enter the password when logging in the app to connect with the lock. The password should be in 6 digits. Always Open Mode: This mode will enable the lock to open without identifying the validation, once the verification that is registered on the lock opens, this mode will be closed.
 28 ZKBioBL Settings Setting App Password After turning on and setting the app password, only after the password verification for turning on ZKBioBL succeeds can the user continues to use the app.   Click [Setting] on the main interface and turn on the [Setup App login password], the system will then enter the password entering interface:
ZKBioBL Settings 29          One touch to Open The major function of One touch to open is to simplify the access procedure. Turn on the One touch to Open function and click open on the main interface, the app will automatically search the surrounding for lock devices which have been ever connected, and automatically matches with Bluetooth password and open the door.
 30 Enable APP Login Increase a step of verify code to enhance security for the app.  Note: 1. If the connection password is changed, the password needs to be re-entered when using One touch to Open. 2. When “One touch to Open” function is enabled, after then Bluetooth name is changed and the Bluetooth is disconnected, the system will automatically search for lock devices which have been ever connected and connect with one of them.This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and(2) this device must accept any interference received, including interference that may cause undesired operation.NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates,  uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interferenceto radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the followingmeasures:-- Reorient or relocate the receiving antenna.-- Increase the separation between the equipment and receiver.-- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.-- Consult the dealer or an experienced radio/TV technician for help.Note: The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment. such modifications could void the user’s authority to operate this equipmentChanges or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.The device has been evaluated to meet general RF exposure requirement. The device can be used in portable exposure condition without restriction.
 31

Navigation menu