Amcrest HTR7213-B User manual

2
Contents
Features.................................................................................................................................................4
What’s Included?....................................................................................................................................4
Application..............................................................................................................................................4
Dimension and Component ...................................................................................................................5
Connection and Installation....................................................................................................................5
Installation............................................................................................................................................10
System Operations...............................................................................................................................12
Initialization ..........................................................................................................................................12
Adding New Users ...............................................................................................................................13
Access Management............................................................................................................................14
Web Operations...................................................................................................................................15
Initialization ..........................................................................................................................................15
Appendix 1 Notes of Temperature Monitoring.....................................................................................17
Appendix 2 Notes of Face Recording/Comparison .............................................................................18
Appendix 3 Cybersecurity Recommendations.....................................................................................19
FCC Statement ....................................................................................................................................21
IC Warning Statement..........................................................................................................................22
References & Contact Information.......................................................................................................22

3
Welcome
Thank you for purchasing an Amcrest HTR7213-B Thermal Kiosk Solution.
This device is an access control panel that allows entry through the use of facial recognition,
password cards, as well as a non-contact means of applying multi-objective, fast, and effective
temperature readings which can help to lower the risk of illness or disease.
This document provides a quick setup and overview of your Amcrest thermal kiosk solution
installation and setup. For access to a full user manual or further information regarding your device
please visit: http://amcrest.com/support
Note: This device can be used as a standalone device or can be accessed via a local network using
the web user interface on a computer.
Important Safeguards and Warnings
This section of the guide will discuss the proper handling of the device, hazard prevention, and
prevention of property damage. Please read the contents of this guide carefully and comply with
instructions before and after use.
Operation Requirement
●Do not place or install the device in an area exposed to direct sunlight or near an extreme heat
source.
●Keep the device away from damp areas or in areas prone to high levels of dust or soot.
●When installing the device, ensure it is installed horizontally on a stable surface to prevent it from
falling or being damaged.
●Do not drop or splash liquid on the device. Please keep all objects filled with liquid away from the
device to prevent damage to the unit.
●Ensure the device is installed in a well-ventilated area. Do not block any vents on the device.
●Only use the device within the rated range of power. The rated input power range is DC12V, 2.0A.
●Do not attempt to disassemble or repair the device.
●Do not transport, use, or store the device in environments that exceed the recommended humidity or
temperature conditions of 14°F ~ 131°F (-10°C ~ 55°C) with a humidity of 0%RH ~ 90%RH.
●While installing the device, install the temperature monitoring unit in a windless, indoor environment
with an ambient temperature of 59°F to 89.6°F (15°C to 32°C).
●Based on the algorithm compensates and adjustment technology, ensures that the temperature
measurement data of each scan is kept within the range of 0.9°F (0.5°C).
●Allow the device 20 minutes to power on when initially turning on the unit. This will allow the device
to reach thermal equilibrium.
Electrical Safety
●Use the recommended power cables and conform to the recommended rated power specification.
●The power source shall conform to the requirement of the Safety Extra Low Voltage (SELV)
standard, and supply power with rated voltage which conforms to the Limited Power Source
requirement according to IEC60950-1. Please note, the power supply requirement should be found
on the device label.
●Connect the device (I-type structure) to the power socket with the proper protective grounding.
●The appliance coupler is a disconnection device. Keep the coupler accessible for easy
disconnection.

4
Features
●A 7-inch LCD display with a resolution of 1024 x 600.
●Supports facial recognition, IC card unlock, and password unlock, as well as provide unlock
schedules.
●2MP, wide-angle WDR lens with auto/manual illuminator.
●With its current face recognition algorithm, the device can recognize more than 360 positions of the
human face.
●Face verification accuracy > 99.5% which provides a low false recognition rate.
●Supports profile recognition with a profile angle is 0° - 90°.
●Supports motion detection.
●Supports abnormality alerts such as, mask detection, duress alarms, tamper alarms, intrusion
alarms, door contact timeouts, and illegal card exceeding threshold alarms.
●Supports general users, patrol users, blacklist users, VIP users, guests, and special users.
●Various unlock status display modes protects user privacy.
●Supports body temperature monitoring through peripheral temperature monitoring.
What’s Included?
1. Vertical Bracket (Kiosk) 4. Module Bracket Joint 7. Access Control Terminal
2. Installation Manual 5. Screw Package 8. Module Terminal Bracket
3: Waterproof Case 6. Temperature Monitoring Module 9. Power Adapter
Application
The application of this device is recommended for areas such as, parks, office buildings, schools,
factories, residential areas, or other applicable areas. The identity is verified through face recognition
to achieve passage without perception.

5
Dimension and Component
No.
Name
No.
Name
1
Temperature monitoring unit
3
Dual cameras
2
MIC
4
Display
Connection and Installation
Cable Connections

6
No.
Name
1
USB port
2
Power port
3
100M network port
4
1000M network port
5, 6
Ports for connecting the temperature monitoring unit
Note: If an external security module is enabled the exit button, lock control, and firefighting linkage
feature will be invalid.
Installation Notes
●If there is a light source 0.5 meters away from the device, the minimum illumination should be no
less than 100 Lux.
●It is highly recommended to install the device indoors at least 3 meters away from any windows and
2 meters away from doors or lights.
●Avoid areas with extreme backlight or direct sunlight.
Temperature Monitoring Requirement
●It is highly recommended to install the device in an indoor, windless environment. If the device is
being used outside, it should be setup in a relatively isolated area away from liquids or direct
sunlight. The ambient temperature around the device should be between 59°F to 89.6°F (15°C to
32°C).
●Allow the device 20 minutes to warm up to allow the device to reach thermal equilibrium.
●If a suitable environment is not available, a temporary setup passage with stable ambient
temperature can be used for temperature monitoring.
●Factors such as sunlight, wind, cold air, and air conditioning can easily affect the surface
temperature of the human body and the working status of the device which can cause temperature
deviation between the monitored temperature and the actual temperature.
●Influencing factors of temperature monitoring:
o Wind: Wind will take away the heat from the forehead, which may affect the accuracy of
temperature monitoring.
o Sweating: Sweating is a way for the body to automatically cool down and dissipate heat.
When the body sweats, the temperature will also decrease.
o Room Temperature: If the room temperature is low, the surface temperature of the human
body will decrease. If the room temperature is too high, the human body will start to sweat which will
affect the overall accuracy of temperature monitoring.

7
o The device is sensitive to light waves with a wavelength of 10um to 15um. Avoid using it in
the sun, fluorescent light sources, air conditioning outlets, heating, cold air outlets, and glass
surfaces.
Kiosk Stand Installation
Step 1: Remove the rear cover and base cover.
Step 2: Remove the vertical bracket from inside the stand.

8
Step 3: Run the cable of the temperature monitoring module through the module bracket joint and
secure the temperature monitoring module to the module bracket joint using the provided mounting
screws from the screw package.
Step 4: Run the cable of the temperature monitoring module through the top of the stand and secure
the module bracket joint to the top of the stand using the provided mounting screws from the screw
package.
Step 5: Place the vertical bracket on the back of the access control terminal and secure the unit to
the vertical bracket. Place the access control terminal and vertical bracket into the stand and secure
the vertical bracket to the stand. The access control terminal should be flush with the with the front of
the stand.

9
Step 6: Connect the temperature monitoring module to the temperature monitoring port on the back
of the access control terminal. Run the cabling of the access control terminal through the stand and
feed it into the base of the stand.
Step 7: Connect the power adapter and applicable cabling inside the base of the stand and run the
power cable through the base of the stand.
Step 8: Secure the rear cover and base cover to the stand and place the completed kiosk into a
suitable area and plug the power cable into a wall outlet or applicable power source.

10
Kiosk Wall Mount Installation
The access control terminal can be installed on a wall or similar surface as well without using the
kiosk stand. For more information on how to mount the access terminal, please refer to the
information below.
Recommended Places
Recommended Places Not to Use
Installation
When installing the device, make sure the distance between the camera and ground is 4.59ft (1.4
meters).

11
Installation Procedures
Step 1: Place the temperature monitoring device to the bracket and secure it using the 3 smaller
installation screws.
Step 2: Place the mounting bracket onto the mounting surface. Use a marker or similar tool to mark
the installation holes on the bracket to the installation surface.
Step 3: Use a drill to drill the installation holes on the installation surface and place the included wall
anchors into the holes.
Note: If running wires through a wall, an additional hole can be drilled into the wall and the wires of
the device can be run through the mounting bracket and through the additional hole.
Step 4: Connect any applicable cabling as per the connections.
Step 5: Hang the device on the hook provided on the mounting bracket.
Step 6: Tighten the screws at the bottom of the device.
Step 7: Apply silicon sealant to the cable outlet of the device.

12
System Operations
Initialization
An administrator password and an email should initially set in the device. A device initialization
screen will be displayed upon powering on the device. If an administrator password and email are
not initialized, the system cannot be used.

13
●The admin administrator username and password set in the interface can be used to access a web
management platform using a web browser on a computer.
●The administrator password can be reset through the email address you entered in the interface.
●The password must consist of 8 to 32 characters and contain at least two types of characters, upper
case, lower case, numbers, and special characters (excluding ‘ “ ; : &).
Adding New Users
The administrator can add new users to the system by entering user IDs, names, face images,
cards, passwords, selecting user levels, and more.
Note: The following images are for reference purposes only and may differ
Step 1: On the main menu, select, User > New User.
Step 2: Configuring parameters on the interface.
Parameter
Description
User ID
Enter user IDs. The IDs can be numbers, letters, and their combinations, and
the maximum length of the ID is 32 characters. Each ID is unique.
Name
Enter names with at most 32 characters (including numbers, symbols, and
letters).

14
Parameter
Description
Face
Make sure that your face is centered on the picture capturing frame and the
access controller will take a picture of the new user’s face automatically.
Card
You can register five cards at most for each user. On the card registration
interface, enter your card number or swipe your card, and then the card
information will be read by the access controller.
You can enable the Duress Card function on the card registration interface.
Alarms will be triggered if a duress card is used to unlock the door.
Note: Only certain models support card unlock.
PWD
The door unlocking password. The maximum length of the password is 8
digits.
Note: If the device does not have a touch screen, the device will need to be
hooked up to a peripheral card reader. There are buttons on the card reader.
User Level
You can select a user level for new users. There are two options:
User: Users only have door unlock permission.
Admin: Administrators can unlock the door and also have parameter
configuration permission.
Note: Administor login credentials will be needed to authenticate this option.
Period
You can set a period in which the user can unlock the door.
Holiday Plan
You can set a holiday plan in which the user can unlock the door.
Valid Date
You can set a period during which the unlocking information of the user is valid.
User Level
There are six levels:
General: General users can unlock the door normally.
Blacklist: When users in the blacklist unlock the door, service personnel will
get a prompt.
Guest: Guests can unlock the door certain times. Once they exceed the
maximum times, they cannot unlock the door again.
Patrol: Paroling users can get their attendance tracked, but they have no
unlock permission.
VIP: When VIP unlocks the door, service personnel will get a prompt.
Special: When special people unlock the door, there will be a delay of 5
seconds before the door is closed.
Use Time
When the user level is Guest, you can set the maximum number of times that
the user can unlock the door.
Step 3: Tap the icon to save and the configuration.
Viewing User Information
All user information such as, user lists, admin lists, and administrator passwords can be accessed
through the User interface.
Access Management
Access management allows the user to set periods, unlock modes, alarms, door statuses, lock
holding times, etc. To open the access management interface, tap on the Access option.
Periods Management
This section allows you to set periods, holiday periods, holiday plan periods, door open/closed
periods, and remote verification periods.
Period Configuration

15
The device can configure up to 128 periods (weeks) with number ranges from 0-127. The user can
set up to four periods for each day of the week. Users can only unlock the door in the periods that
were set by the user.
Holiday Groups
The user can group holidays in the system. This allows the user to configure up to 128 groups with
numbers ranging from 0-127. The system can support up to 16 holidays in one group. Once a
holiday group has been set, the door will only unlock on the specific start and end times set by the
user in the system.
Note: You can enter names with up to 32 characters (including numbers, symbols, and letters). Tap
on the icon to save a holiday group name.
Holiday Plan
The user can add holiday groups into holiday plans. Holiday plans are used to manage user access
permissions in different holiday groups. A user can only unlock the door in the period that was set by
the user in the system.
NO Period
If a period is added to NO period, the door will only open during a set period.
Note: The NO/NC period permissions take higher priority than other periods set in the system.
NC Period
If a period is added to the NC period, the door will remain closed in a set period. Users can not
unlock the door in these periods.
Remote Verification Period
When the remote verification period is set in the system, to unlock the door, remote verification will
be required. To unlock the door in this set period, a door unlock instruction will need to be sent by
the management platform.
Note: The user will need to enable the remote verification period open in the interface.
: The remote verification period option is enabled.
: The remote verification period option is disabled.
Web Operations
The device can be configured and used on the web using a web browser. The web interface allows
the user to set network parameters, video parameters, and access controller parameters, as well as
maintain and update the system via a web browser.
Note: When accessing the web user interface (web UI), it is highly recommended to use Internet
Explorer (IE). The web UI may have issues with other browsers.
Initialization
The device initialization will appear if the device has not been previously initialized. This menu allows
you to set a password as well as an email address before logging into the system.

16
Step 1: Open the IE web browser and enter the IP address for your system. Please note, the device
must be on the same network segment as your computer to access the web UI. The default IP
address for the system is 192.168.1.108. Press Enter to access the interface.
Note: To avoid issues, use a browser version newer than IE 8. If the system features dual NICs, the
default IP address for the 1000M port is 192.168.1.108 and the default IP address for the100M
network port is 192.168.2.108.
Step 2: Enter a new password, confirm the password, and enter a valid email address. Please note,
the email address entered in the system will be used to recover or reset the password in the system.
Once all information has been entered, press the Next.
Note: The password must consist of 8 to 32, non-blank characters and contain at least two types of
characters, upper and lower case, numbers, and special characters (excluding ‘ “ ; : &). It is highly
recommended to set a password according to the password strength prompt provided in the
interface. For security, it is highly recommended to update your password regularly.
Step 3: Click Next.

17
Step 4: Enable the Auto Check checkbox to allow the system to inform the user of the latest
firmware upgrades.
Step 5: Click Next.
Step 6: Click Complete to complete initialization to display the web login interface.
Step 7. Enter the login credentials and click Login to access the homepage.
Appendix 1 Notes of Temperature Monitoring
●Do not place or install the device in an area exposed to direct sunlight or near an extreme heat
source.
●Keep the device away from damp areas or in areas prone to high levels of dust or soot.
●When installing the device, ensure it is installed horizontally on a stable surface to prevent it from
falling or being damaged.

18
●Do not drop or splash liquid on the device. Please keep all objects filled with liquid away from the
device to prevent damage to the unit.
●Ensure the device is installed in a well-ventilated area. Do not block any vents on the device.
●Only use the device within the rated range of power. The rated input power range is DC12V, 2.0A.
●Do not attempt to disassemble or repair the device.
●Do not transport, use, or store the device in environments that exceed the recommended humidity or
temperature conditions of 14°F ~ 131°F (-10°C ~ 55°C) with a humidity of 0%RH ~ 90%RH.
●While installing the device, install the temperature monitoring unit in a windless, indoor environment
with an ambient temperature of 59°F to 89.6°F (15°C to 32°C).
●Allow the device 20 minutes to power on when initially turning on the unit. This will allow the device
to reach thermal equilibrium.
Appendix 2 Notes of Face Recording/Comparison
•Glasses, hats, and beards might influence face recognition performance.
•Do not cover your eyebrows when wearing hats.
•If a beard or other facial feature is changed the image will need to be updated in the system,
otherwise, the system may not recognize the face.
•Keep your face clean before use.
•Keep the device at least two meters (6.5ft) away from a light source and at least 3 meters (9.8ft)
away from windows or doors; otherwise backlight and direct sunlight might influence face recognition
performance of the device.
During Registration
All face recognition information is registered through the device or via the platform.
When registering a face to the system, ensure our head is centered in the photo capture frame. A
picture of your face will be captured automatically.

19
Note: Do not shake your head or body while registering a face otherwise it may fail. Avoid multiple
faces in the captured frame as it may interfere with the facial recognition image.
Face Position
If your face is not in the appropriate position the face recognition effect may be influenced.
Note: When importing face images through the management platform, make sure the image
resolution is within the range of 150 x 300-600 x 1200 image pixels; image pixels are more than 500
x 500; the image size is less than 75KB, and the image name and person ID are the same. Also,
ensure that the face does not take up more than 2/3 of the whole image area. The aspect ratio
should not exceed 1:2.
Appendix 3 Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
⚫The length should not be less than 8 characters.
⚫Include at least two types of characters; character types include upper- and lower-case letters,
numbers, and symbols.
⚫Do not contain the account name or the account name in reverse order.
⚫Do not use continuous characters, such as 123, abc, etc.;
⚫Do not use overlapped characters, such as 111, aaa, etc.;

20
2. Update Firmware and Client Software in Time
⚫According to the standard procedure in Tech-industry, we recommend keeping your equipment (such
as NVR, DVR, IP camera, etc.) firmware up to date to ensure the system is equipped with the latest
security patches and fixes. When the equipment is connected to the public network, it is recommended
to enable the “auto-check for updates” function to obtain timely information of firmware updates
released by the manufacturer.
⚫We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices. For
example, place the equipment in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from carrying out
physical contacts such as damaging hardware, unauthorized connection of removable equipment
(such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for password reset
in time, including the end user’s mailbox and password protection questions. If the information
changes, please modify it in time. When setting password protection questions, it is suggested not to
use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend the user to keep it on to guarantee
the account security. If an attacker attempts to log in with the wrong password several times, the
corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest the user to change default HTTP and other service ports into any set of numbers between
1024~65535, reducing the risk of outsiders being able to guess which ports you are using.
6. Enable HTTPS
We suggest the user to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. Enable Whitelist
We recommend the user to enable whitelist function to prevent everyone, except those with specified
IP addresses, from accessing the system. Therefore, please be sure to add your computer’s IP
address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend the user to bind the IP and MAC address of the gateway to the equipment, thus
reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a minimum
set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce
risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
⚫SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords.
⚫SMTP: Choose TLS to access mailbox server.
⚫FTP: Choose SFTP and set up strong passwords.
⚫AP hotspot: Choose WPA2-PSK encryption mode and set up strong passwords.
11. Audio and Video Encrypted Transmission
Table of contents
Popular Measuring Instrument manuals by other brands

Starrett
Starrett W2900-6ME user guide

Tektronix
Tektronix RSA6100A Series instructions

TMI Products
TMI Products 49-85 manual

MARS Company
MARS Company MK-I/II Installation and programming guide

Afikim
Afikim Afi-lite Plus user manual

BERTHOLD TECHNOLOGIES
BERTHOLD TECHNOLOGIES FlowStar2 LB 514 operating manual