Face Recognition Terminal User Manual
v
Table of Contents
Chapter 1 Overview.................................................................................................................7
1.1 Introduction .........................................................................................................................7
1.2 Main Features ......................................................................................................................7
Chapter 2 Appearance .............................................................................................................9
Chapter 3 Installation ............................................................................................................11
3.1 Installing with Gang Box.....................................................................................................11
3.2 Installing without Gang Box ...............................................................................................12
Chapter 4 Terminal Connection..............................................................................................15
Chapter 5 Basic Operation .....................................................................................................17
5.1 Activate Device...................................................................................................................17
5.1.1 Activating via Device ......................................................................................................17
5.1.2 Activating via SADP Software .........................................................................................18
5.1.3 Activating via Client Software ........................................................................................19
5.2 Login...................................................................................................................................22
5.3 General Parameters Settings..............................................................................................23
5.3.1 Communication Settings ................................................................................................23
5.3.2 System Settings ..............................................................................................................26
5.3.3 Setting Time ...................................................................................................................30
5.4 User Management..............................................................................................................31
5.4.1 Adding User ....................................................................................................................31
5.4.2 Managing User ...............................................................................................................35
5.5 Setting Access Control Parameters ....................................................................................36
5.6 Other Managements ..........................................................................................................37
5.6.1 Managing Data ...............................................................................................................37
5.6.2 Managing Log Query ......................................................................................................39
5.6.3 Importing/Exporting Data ..............................................................................................39
5.6.4 Testing ............................................................................................................................41
5.6.5 Viewing System Information..........................................................................................43
5.7 Authenticating Identity ......................................................................................................44
5.7.1 Authenticating via 1:1 Matching....................................................................................44
5.7.2 Authenticating via 1:N Matching ...................................................................................45
5.7.3 Authenticating via 1:1 Matching and 1:N Matching ......................................................45
Chapter 6 Tips for Scanning Fingerprint .................................................................................47
Appendix A Tips When Collecting/Comparing Face Picture .......................................................49