Comelit IPTHPAN02FA User manual

Temperature Measurement &
Face Recognition Terminal
Art. IPTHPAN02FA
Please read this manual thoroughly before use and keep it for future
reference

Notes on Safet
This product is intended to be supplied by a Listed Power Unit, marked with
'Limited Power Source', 'LPS' on unit, output rated minimum 12V/1 A, no
more than 2000m altitude of operation and Tma=60 Deg.C.
Do not attempt to disassemble the device; in order to prevent electric shock, do
not remove screws or covers.
There are no user-serviceable parts inside. Please contact the nearest service
center as soon as possible if there is any failure.
Avoid from incorrect operation, shock vibration, heavy pressing which can cause
damage to product.
Do not use corrosive detergent to clean main body of the camera. If necessary,
please use soft dry cloth to wipe dirt; for hard contamination, use neutral
detergent. Any cleanser for high-grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as, sun,
as this may damage the image sensor.
Please follow the instructions to install the camera. Do not reverse the camera,
or the reversing image will be received.
Do not operate it in case temperature, humidity and power supply are beyond the
limited stipulations.
Keep away from heat sources such as radiators, heat registers, stove, etc.
Do not expose the product to the direct airflow from an air conditioner.
This manual is for using and managing the product. Wemay reserve the rights of
amending the typographical errors, inconsistencies with the latest version,
software upgrades and product improvements, interpretation and modification.
These changes will be published in the latest version without special notification.
All pictures, charts, images inthis manual are only for description and explanation
of our products. The ownerships of trademarks, logos and other intellectual
properties related to Microsoft, Apple and Google belong to the above-mentioned
companies.
This manual is suitable for face recognition network devices.

Disclaimer
With regard to the product with internet access, the use of product shall be wholly
at your own risks. Our company shall be irresponsible for abnormal operation,
privacy leakage or other damages resulting from cyber-attack, hacker attack,
virus inspection, or other internet security risks; however, our company will
provide timely technical support if necessary.
Surveillance laws vary from country to country.Check all laws in your local region
before using this product for surveillance purposes. We shall not take the
responsibility for any consequences resulting from illegal operations.
Regulatory Information
FCC Information
1.FCC compliance
The products have be tested and found in compliance with the council FCC rules
and regulations part 15 subpart B. These limits are designed to provide
reasonable protection against harmful interference. This equipment generates
uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio
communication. However, there is no guarantee that interference will not occur in
a particular installation. The user will be required to correct the interface at his
own expense in case the harmful interference occurs.
2. FCC conditions:
Operation of this product is subject the following two conditions: (1) this device
may not cause harmful interface, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
CE Information
The products have been manufactured to comply with the following
directives. EMC Directive 2014/30/EU
RoHS
The products have designed and manufactured in accordance with Directive EU
RoHS Directive 2011/65/EU and its amendment Directive EU 2015/863 on the
restriction of the use of certain hazardous substances in electrical and electronic
equipment.

2012/19/EU (WEEE directive): The Directive on waste electrical and
electronic equipment (WEEE Directive). To improve the environmental
management of WEEE, the improvement of collection, treatment and
recycling of electronics at the end of their life is essential. Therefore, the
product marked with this symbol must be disposed of in a responsible
manner.
Directive 94/62/EC: The Directive aims at the management of packaging and
packaging waste and environmental protection. The packaging and packaging waste
of the product in this manual refers to must be disposed of at designated collection
points for proper recycling and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization
and Restriction of Chemicals, which aims to ensure a high level of protection of human
health and the environment through better and earlier identification of the intrinsic
properties of chemical substances. The product in this manual refers to conforms to
the rules and regulations of REACH. For more information of REACH, please refer to
DG GROWTH or ECHA websites.

Table of Contents
1 Introduction ..........................................................................................................1
2 Network Connection.............................................................................................2
2.1LAN ……………………………………………………………………………..........2
2.1.1Access through IP-Tool................................................................................2
2.1.2Directly Access through IE...........................................................................4
2.2WAN ……………………………………………………………………….. .............5
3 Temperature Measurement & Face Recognition Configuration ............................9
3.1Temperature Measurement Settings................................................................9
3.2Face Match Configuration ..............................................................................10
3.3Face Database Management.........................................................................11
3.4Mask Detection...............................................................................................12
4 Live View.................................................................................................................14
4.1Temperature Measurement & Face Recognition View.....................................14
4.1.1Temperature Measurement Requirements.................................................14
4.1.2Temperature Measurement & Face Recognition View.................................15
4.2Live Viewvia Web..........................................................................................................16
5 Access Control Settings.....................................................................................19
5.1Door Lock Settings.........................................................................................19
5.2Wiegand Settings...........................................................................................19
5.3Tampering Alarm Settings...............................................................................20
6 Other Configurations..........................................................................................21
6.1System Settings .............................................................................................21
6.1.1Basic Information .......................................................................................21
6.1.2Date and Time ...........................................................................................21
6.1.3Local Config...............................................................................................22
6.1.4Storage ......................................................................................................22
6.2Image Configuration.......................................................................................25
6.2.1Display Configuration.................................................................................25
6.2.2Video / Audio Configuration .......................................................................27
6.2.3OSD Configuration.....................................................................................28
6.2.4Screen Brightness......................................................................................29
6.2.5White Light Control.....................................................................................29
6.2.6Face Exposure...........................................................................................30
6.3Alarm Configuration........................................................................................30
6.3.1Exception...................................................................................................30
6.3.2Micro-SD card Full .....................................................................................32
6.3.3Micro-SD card Error...................................................................................32
6.3.4IPAddress Conflict.....................................................................................33

6.3.5Cable Disconnection..................................................................................33
6.3.6Alarm In ……………………………………………………………… ...............33
6.3.7Alarm Out………. .......................................................................................34
6.4Network Configuration....................................................................................35
6.4.1TCP/IP……………......................................................................................35
6.4.2Port ………… .............................................................................................37
6.4.3Server Configuration..................................................................................37
6.4.4DDNS…………. .........................................................................................37
6.4.5RTSP..…… ................................................................................................39
6.4.6UPnP………...............................................................................................40
6.4.7Email…..….................................................................................................40
6.4.8FTP…..…… ...............................................................................................41
6.4.9HTTPS……. ...............................................................................................41
6.5Security Configuration....................................................................................43
6.5.1User Configuration.....................................................................................43
6.5.2Online User................................................................................................45
6.5.3Block and Allow Lists..................................................................................45
6.5.4Security Management ................................................................................45
6.6Maintenance Configuration ............................................................................46
6.6.1Backup and Restore ..................................................................................46
6.6.2Reboot……….............................................................................................47
6.6.3Upgrade………. .........................................................................................47
6.6.4Operation Log............................................................................................48
7 Search................................................................................................................49
7.1Image Search.................................................................................................49
7.2Video Search..................................................................................................51
7.2.1Local Video Search....................................................................................51
7.2.2Micro-SD card Video Search......................................................................52
8 Face Match Result Search.................................................................................55
Appendix Troubleshooting......................................................................................56

1 Introduction
This series of product is specially designed and developed for face recognition and
temperature measurement applications, featuring non-contract temperature
measurement, high performance and reliability, faster recognition and higher accuracy
rate. Based on deep-learning algorithm, it combines temperature measurement,
identity authorization and access control.
It can be widely used in the entrances and exits of community, schools, hospitals,
scenicareas, hotels, shopping malls, office buildings, public services and construction
sites for body temperature measurement, identity authorization and access control.
Main Features
8 inch LCD screen
High-accuracy IR wrist temperature measurement
Non-contact body temperature measurement
Human-sounding voice prompt
Real-time face mask detection
Face liveness detection technology distinguishing real faces from non-real face
spoof attacks
Highly accurate face recognition using deep learning algorithm
Stand-alone device, ready for networking
1

Connect IP-Cam via LAN or WAN. The details are as follows:
1.1
LAN
In LAN, there are two ways to access: 1. access through IP-Tool; 2. directly access
through Internet Explorer browser.
1.1.1 Access through IP-Tool
Network connection:
①Make sure the PC and the device are connected to the LAN and the IP-Tool is
installed in the PC.
②Double click the IP-Tool icon on the desktop to run this software as shown below:
③Modify the IP address. The default IP address of this camera is 192.168.1.150.
Click the information of the camera listed in the above table to show the network
information on the right hand. Modify the IP address and gateway of the camera and
make sure its network address is in the same local network segment as the computer’s.
Please modify the IP address of your device according to the practical situation.
Network
Connection

For example, the IP address of your computer is 192.168.1.4. So the IP address of the
camera shall be changed to 192.168.1.X. After modification, please enter the password
of the administrator and click the “Modify” button to modify the setting.
④Double click the IP address and then the system will pop up the IE browser to
connect IP-CAM. Follow directions to download, install and run the Active X control.
Enter the username and password in the login window to log in.
The
default Password of the administrator is admin.
The default Username
is
admin
; the
default Password
is
admin
.

The system will pop up the above-mentioned textbox to ask you to change the default
password. It is strongly recommended to change the default password for account
security. If “Do not show again” is checked, the textbox will not appear next time.
1.1.2 Directly Access through Internet Explorer
The default network settings are as shown
below: IP address: 192.168.1.150
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port:
Use the above default settings when logging in the camera for the first time. Directly
connect the camera to the computer through network cable.
①Manually set the IP address of the PC and the network segment should be as the
same as the default settings of the IP camera. Open the network and share center.
Click “Local Area Connection” to pop up the following window.
9008

Select “Properties” and then select internet protocol according to the actual
situation (for example: IPv4). Next, click the “Properties” button to set the network
of the PC.
②Open the IE browser and enter the default address of IP-CAM and confirm.
③Follow directions to download and install the Active X control.
④Enter the default username and password in the login window and then enter to view.
1.2
WAN
Access through the router or virtual server

①Make sure the camera is connected to the local network and then log in the
Port Setup
②
IP Setup
③Go to the router’s management interface through IE browser to forward the IP
address and port of the camera in the “Virtual Server”.

Router Setup
④Open the IE browser and enter its WANIP and http port to access. (for example, if
the http port is changed to 81, please enter “192.198.1.150:81” in the address bar of
web browser to access).
Access through PPPoE dial-up
Network connection
Access the camera through PPPoE auto dial-up. The setup steps are as follow:
①
②
enter the user name and password from your internet service provider.
③he DDNS, please apply
for a domain name first. Please refer to DDNS configuration for detail information.
④Open the IE browser and enter the domain name and http port to access.

Access through static IP
Network connection
The setup steps are as follow:
①
②
following IP address” and then enter the static IP address and other parameters.
③Open the IE browser and enter its WANIP and http port to access.

3 Temp Measurement & Face
Recognition Config
3.1
Temperature Measurement Settings
After the network is connected, go to the web client. Click
Measurement to go to the following interface.
1.
Enable Temperature Measurement, select Celsius or Fahrenheit temperature as
needed and then set the high temperature threshold and the low temperature
threshold. When the wrist temperature measured is higher or lower than the set value,
it will trigger alarms.
2.
Set the alarm holding time.
3.
Set the alarm trigger options.
Trigger Alarm Out: If enabled, the alarm output device will be triggered when
detecting abnormal temperature.
Trigger Audio Alarm: If enabled, the system will broadcast the current wrist
temperature detected. No matter whether the detected wrist temperature is normal or
not, the corresponding voice prompt will be heard. If this item is disabled, the detected
temperature will be not broadcasted.
Trigger SD Snap: If enabled, the system will capture images on detecting abnormal
9

temperature alarm and save the images on an Micro-SD card.
Trigger SD Recording: If selected, video will be recorded on an Micro-SD card
on detecting abnormal temperature alarm.
Trigger Email: If “Trigger Email” and “Attach Picture” are checked (email address
must be set first in the Email configuration interface), the captured pictures and
triggered event will be sent into those addresses.
Trigger FTP: If “Trigger FTP” is checked, the captured pictures will be sent into FTP
server address. Please refer to FTP configuration chapter for more details.
4.
Click “Save” to save the settings.
3.2
Face Match Configuration
The setting steps are as follows.
1. interface.
2. Enable “Save Source Information” or “Save Face Information”.
Save Source Information: if checked, the whole picture will be saved to the Micro-SD
card when detecting a face.
Save Face Information: if checked, the captured face picture will be saved to the Micro-
SD card when detecting a face.
Note: To save images to the local PC, please enable the local smart snapshot storage
o the Micro-SD card, please
install an Micro-SD card first.
3. Set alarm holding time and alarm trigger options.
3. Set face comparison options.
10

Deduplication Period: In the set period, delete the repeated comparison results.
Similarity threshold: When the similarity of the captured face picture and the face
picture added into the face database exceeds the similarity threshold, alarms will
be triggered (check the box Alarm Out 1, Alarm Out 2).
3.3
Face Database Management
Click “Face Database Management” tab. This will enter the following interface.
There are four ways to add face pictures.
①Adding face pictures one by one
Click to pop up an adding user box. Then click
to select a face picture
saved onthe local PC. Please select the picture according to the specified format and
size limit. After that, fill out the relevant information of the face picture and click “Entry”
to add.
②Adding multiple face pictures at a time
Click and then add multiple face pictures once according to the promptedrules.
③Add face pictures by using face album management tool
④Add the captured picture in the live mode (See Add captured face pictures to
the face database).
11

After adding face pictures, you can search them by name, gender, ID number and so on.
Click “Modify” to change people information and click “Delete” to delete this face picture.
3.4
Mask Detection
12

Enable “Mask Detection” as
needed. Set the alarm holding
time.
Set the alarm trigger options.
Alarm Out: If enabled, alarm output will be triggered when the detected person
doesn wear a mask.
Trigger Audio Alarm: If enabled, the alarm voice will be heard when the detected person
doesn’t wear a mask.
The setup steps of other alarm trigger options are the same as temperature
measurement settings. Please refer to temperature measurement settings
chapter for details.
13
t

4 Live View
4.1
Temperature Measurement & Face Recognition View
4.1.1 Temperature Measurement Requirements
Somerecommendations:
1.
The face image of the detected person shall be within the pre-defined face
detection area. The detected face shall be 30cm~40cm away from the
temperature measurement sensor.
2.
Please remove the hat/cap/helmet/hair covering the forehead.
14
Other manuals for IPTHPAN02FA
1
Table of contents