Kedacom KSCA120 Series User manual

KEDACOM
User Manual for Access Control System
V1.1 (May, 2020)

Access Control System User Manual
Trademark
Kedacom™ and are trademarks of Suzhou Keda Technology Co., Ltd. in China and
various other countries. All other trademarks mentioned in this document are the property of their
respective holders.
Suzhou Keda Technology Co., Ltd.
131 Jinshan Road
New District, Suzhou, 215011
People's Republic of China
http://www.kedacom.com/en
Tel: +86-512-68418188
Fax: +86-512-68412699
© 2020 Suzhou Keda Technology Co., Ltd. All rights reserved.
Without the prior written permission of Suzhou Keda Technology Co., Ltd., any reproduction, translation
or retransmission of all or any part of this document for any purpose in either electronic or mechanical
form is not allowed.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied. Suzhou
Keda Technology Co., Ltd. is not responsible for printing or clerical errors.

Access Control System User Manual
Target Audience
Administrators and Operators of Video Surveillance Products
Document Version
V1.1
Applicable Models
KSCA120 series
Related Document
Quick Start Guide
Convention
Icon
Convention
Notes and warnings: necessary supplements to operations
BOLD
Menu, e.g. Drag to Zoom
>
Connector between menus of different levels, e.g. Settings > System
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to avoid danger or
property loss. Please read this Guide carefully before using the product, and keep it properly for future
reference. If the product cannot work normally or is damaged because the user does not follow the
safety instructions, we shall not assume any responsibility.

Access Control System User Manual
Contents
1. Product Brief .......................................................................................................................................... 5
2. Device Touch Screen............................................................................................................................. 7
2.1 Startup............................................................................................................................................. 7
2.1.1 Local Activation......................................................................................................................... 7
2.1.2 Stand-By Interface .................................................................................................................... 8
2.2 Login................................................................................................................................................ 8
2.3 Personnel Management .................................................................................................................. 9
2.3.1 Personnel Registration............................................................................................................ 10
2.3.2 Personnel Search.....................................................................................................................11
2.4 Access Control Configuration........................................................................................................ 13
2.5 Search Events ............................................................................................................................... 14
2.6 Network.......................................................................................................................................... 15
2.6.1 Ethernet................................................................................................................................... 15
2.6.2 WiFi......................................................................................................................................... 16
2.6.3 Peripheral................................................................................................................................ 17
2.7 User............................................................................................................................................... 18
2.8 Storage.......................................................................................................................................... 19
2.9 Function Test ................................................................................................................................. 21
2.9.1 Audio Test................................................................................................................................ 21
2.9.2 Card Reader Test.................................................................................................................... 22
2.9.3 IO Test..................................................................................................................................... 22
2.9.4 Network Test............................................................................................................................ 23
2.10 System........................................................................................................................................... 24
2.10.1 Device Information.................................................................................................................. 25
2.10.2 Device Log.............................................................................................................................. 25
2.11 Settings.......................................................................................................................................... 27
2.11.1 Basic........................................................................................................................................ 27
2.11.2 Time ........................................................................................................................................ 29
2.11.3 Face ........................................................................................................................................ 30
2.11.4 *Temperature Screening ......................................................................................................... 31
2.11.5 Advanced................................................................................................................................ 33
3. Web Client............................................................................................................................................. 36
3.1 Startup........................................................................................................................................... 36
3.1.1 Activate.................................................................................................................................... 36
3.1.2 Configure Network Parameters............................................................................................... 38
3.1.3 Login and Log Out of the Web Client...................................................................................... 39
3.1.4 Reset Password...................................................................................................................... 42
3.1.5 Main Interface ......................................................................................................................... 43
3.2 Basic Functions ............................................................................................................................. 43
3.2.1 Live View................................................................................................................................. 43
3.2.2 Playback.................................................................................................................................. 46
3.2.3 Snapshot................................................................................................................................. 47
3.2.4 Local Setting ........................................................................................................................... 48
3.3 Network.......................................................................................................................................... 51
3.3.1 IP and Port .............................................................................................................................. 51
3.3.2 Access Protocol ...................................................................................................................... 53
3.3.3 Other Protocol......................................................................................................................... 56

Access Control System User Manual
3.4 Camera.......................................................................................................................................... 61
3.4.1 Image ...................................................................................................................................... 61
3.4.2 OSD......................................................................................................................................... 65
3.4.3 Video....................................................................................................................................... 66
3.4.4 Audio....................................................................................................................................... 68
3.5 Event.............................................................................................................................................. 69
3.5.1 Alarm Input.............................................................................................................................. 69
3.5.2 Alarm Output........................................................................................................................... 71
3.5.3 Abnormality Linkage................................................................................................................ 72
3.6 Storage.......................................................................................................................................... 72
3.6.1 Storage Management.............................................................................................................. 72
3.6.2 Recording................................................................................................................................ 73
3.6.3 Snapshot................................................................................................................................. 75
3.7 System........................................................................................................................................... 77
3.7.1 Device Info.............................................................................................................................. 77
3.7.2 User Security........................................................................................................................... 78
3.7.3 Time ........................................................................................................................................ 80
3.7.4 Serial Port ............................................................................................................................... 81
3.7.5 Log .......................................................................................................................................... 82
3.7.6 System Maintenance............................................................................................................... 83
4. Appendix: Personnel Import Through Web Client ........................................................................... 84

Access Control System User Manual
1. Product Brief
KSCA120 series are a kind of face recognition access control and attendance system. It supports
multiple opening modes, including face/card, face & card, and remote help. It manages access
electric lock and checks on work attendance through face recognition. Usually, it is applied to
communities, financial places, enterprises, governments, schools, public security bureaus, judiciary
authorities and buildings where people access needs to be controlled.
Picture 1-1 Product Appearance
Features:
2.0MP 1/2.8” high-performance image sensor, 0.0001 Lux starlight low illumination imaging;
H.265/H.264 encoding, 1080P@30fps HD live video;
5-inch capacitive touch screen, show face comparison information and provide good
man-machine interaction;

Access Control System User Manual
Binocular UHD wide-angle lens, face recognition distance 0.3~2m, suitable for height range 1.2
to 1.9m;
Deep-learning algorithm, support 2,0000-face archive and 100,000-card archive, fast
recognition speed and high accuracy rate;
Live face detection, prevent photo-fraud and video-fraud effectively;
Intelligent facial fill light, enable fill light automatically according to the light condition to suit
outdoor backlight;
Support multiple opening modes, including face/card, face & card, and remote help;
Support stand-alone off-line operation, input card and face information locally to manage
without platform or command center;
Real-time uploading data to the command center to manage the blacklist at real time;
Direct control over electric lock, door switch and door magnetism so as to manage access
control;
Support tamper-alarm and door magnetic detection;
Support RS485 port, to connect to access control system;
Built-in MIC and speaker, support two-way audio and voice broadcast;
Support WiFi for convenient internet service;
Support extending card reader, support people and card verification and registration;
TF card local storage (maximum 256 G), support ANR;
IP66-rated water-proof and dust-proof, -40°C~+60°C wide temperature range, to suit outdoor
severe environment.

Access Control System User Manual
2. Device Touch Screen
2.1 Startup
2.1.1Local Activation
Electrify and start the device. If the device is not activated before use, it will come to the
activation interface automatically.
Picture 2-1 Activation prompt
Operation steps are as follows:
Tap “Local Activation” on the interface;
Picture 2-2 Local activation
Enter password, confirm password, and the email address for claiming password;
Tap “Activate” to activate the device.

Access Control System User Manual
Note:
To ensure the safety of device on internet, it is strongly recommended that you
set a strong password composed of at least 2 kinds of the following, numbers,
upper-case letters, lower-case letters or specific symbols with length of 8 to 16
characters.
Please modify the password periodically such as once every 3 months. If the
device is used in highly risky environment, suggest modifying the password
monthly or weekly.
Please keep your username and password safe.
2.1.2Stand-By Interface
After being activated, the device enters stand-by mode. Face toward the screen to
activate face verification and display the live-view image.
Picture 2-3 Stand-by interface
If the man is in the database and the face recognition score reaches the standard, it
will show verification succeeded and display the man’s name at the bottom of the
screen.
If the man is out of the database, it will show verification failed.
2.2 Login
After logging into the device, user can perform operations such as personnel management,
access control configuration, event search and etc.

Access Control System User Manual
Picture 2-4 Menu
Login
1) Long-press on the touch screen for over 3 seconds and the login interface will pop
up;
2) Enter the password set during activation;
3) Click “OK” to enter menu interface.
Exit
Tap the “<” key at top left corner of the screen and tap “OK” to exit login and return to
stand-by interface.
2.3 Personnel Management
Tap Menu>Personnel to register and search personnels.

Access Control System User Manual
Picture 2-5 Personnel management
2.3.1Personnel Registration
Tap Menu>Personnel>Personnel Registration, and add new user and register
information such as name, ID type, Identity ID and etc.
1) Tap Menu>Personnel>Personnel Registration, face toward the camera with
optimum distance of 1 m, tap the button at the bottom to capture a snapshot.
Picture 2-6 Personnel registration
2) Tap “OK” to enter the information registration interface and input name, ID type,
Identity ID and etc.

Access Control System User Manual
Picture 2-7 Register information
3) Tap “Finish” to complete personnel registration;
Note: If the identity ID of the same ID type already exists when saving the information,
it will pop up “the identity ID already exists, please confirm if you would like to
save.” Tap “OK” to overwrite the old data.
4) After finishing registration, it will skip to the registration interface. Tap “<” at top left
corner and input the login password to exit.
Note: The snapshot may fail when not facing the camera rightly or the distance to the
camera being too close or too far. When it occurs, tap “Snapshot Again” to
re-capture.
2.3.2Personnel Search
Tap Menu>Personnel>Personnel Search, and view, edit or delete the information of
registered personnel.

Access Control System User Manual
Picture 2-8 Personnel search
Input name, identity ID and/or card number and tap “Search” to enter the information
interface.
Picture 2-9 Search result
The searched personnel will show on the list; select any one and tap to view the details.
Tap “Filter” to return to the personnel search interface and re-input the search conditions.

Access Control System User Manual
2.4 Access Control Configuration
Tap Menu>Access Control to configure default verification mode, temporary authorization
mode, smoke sensor, door magnetism, closing delay, opening exception detection time, alarm
threshold and tamper alarm. Tap “Save” to finish configuration.
Picture 2-10 Access control
Default Verification Mode: Tap “Default Verification Mode” and select a verification mode
on the popup interface, options including “Face”, “Card”, “Face & Card” and “Face/Card”.
Temporary Authorization Mode: Configure the authorization mode for different verification
modes. Tap “Temporary Authorization Mode” and select the mode(s) on the popup
interface, options including “Face”, “Card” and “Face and Card”. Tap “OK”.
Smoke Sensor: Select “Close” or “Open”, by default “Open”.
Door Magnetism: Select “Close” or “Open”, the default being “Close”. When selecting
“Close”, the door magnetism port SENS connects to the door magnetism switch NC port,
and GND to door magnetism COM port; when selecting “Open”, the door magnetism port
SENS connects to the door magnetism switch NO port, and GND to door magnetism
COM port.
Closing Delay: Configure the delay time from door opening to door closing, the range
being 1~255 s, the default being 5 s.

Access Control System User Manual
Opening Exception Detection Time: Configure the alarm threshold for door opening
timeout, the range being 0~3600 s, the default being 30 s; when the door opening
exceeds the threshold, an alarm will be triggered.
Alarm Threshold: Configure the maximum times of recognition failures, the range being
1~255 times, the default being 5 times; if the recognition failure exceeds the maximum
times, an alarm will be triggered.
Tamper Alarm: Turn on “Tamper Alarm” to enable tamperproof button alarming. After
enabling this function, when the tamperproof button is triggered, the device will alarm.
Card Type: Configure the supported card types for card recognition, options including
“Citizen Card”, “CPU Card”, “M1 Card” and “IC Card”.
2.5 Search Events
Tap Menu>Search Events and search event records.
Picture 2-11 Search events
Input name, identity ID, event type and/or trigger time and tap “Search” to search expected
event records; options for event type include “All”, “Face”, “Card”, “Face and Card Verification”,
“Door Switch”, “Help Center”, “Fire Alarm”, “Abnormal Unlocked”, “Help User”, “Authorization
Code” and etc.; options for trigger time include “Today”, “Yesterday”, “This week”, “Last week”,
“This month”, “Last month”, “All” or “Custom”, which requires manual input of start time and

Access Control System User Manual
stop time; tap “Search” to view the events filtered by name, identity ID, event type and trigger
time.
Picture 2-12 Search result
2.6 Network
Tap Menu>Network and configure Ethernet, WiFi and Peripheral.
Picture 2-13 Network
2.6.1Ethernet
Tap Menu>Network>Ethernet and configure Ethernet parameters.

Access Control System User Manual
Picture 2-14 Ethernet
Select “Mode”. If selecting “Static”, input “IP Address”, “Subnet Mask” and “Default
Gateway” manually; tap “Save” to finish configuration.
2.6.2WiFi
Tap Menu>Network>WiFi and configure WiFi parameters. WiFi mode options include
“Disable” and “Station Mode”.
Picture 2-15 WiFi
Station Mode
Under “Station Mode”, the device can be connected to AP hotspot.

Access Control System User Manual
Picture 2-19 Station mode
Tap “Refresh” and the nearby AP hotspots will show on the list below. Select a
hotspot from the list and enter the “WiFi Setting” interface; select mode according to
actual request, including “Static” and “Dynamic”, the latter being the default and if
selecting the former, configure IP address manually; input “Password” and tap “Save”
to connect to the selected WiFi network.
2.6.3Peripheral
Tap Menu>Network>Peripheral and select a peripheral for the access control device.

Access Control System User Manual
Picture 2-20 Peripheral
Select a peripheral device, options including “Access Control Host”, “Entrance Control
Module”, “Elevator Control Module”, “Card Reader” and “No external equipment”. Tap
“Save” to finish.
2.7 User
Tap Menu>User and edit the password for “admin” user.
Picture 2-21 User
Tap user to select and enter the “Administrator” interface; tap “Change Password” to enter
password changing interface; input the “Old Password” and “New Password”, and “Confirm
Password”; tap “Save” to finish changing password.

Access Control System User Manual
Picture 2-22 Change password
Note:
To ensure the safety of device on internet, it is strongly recommended that you set a
strong password composed of at least 2 kinds of the following, numbers, upper-case
letters, lower-case letters or specific symbols with length of 8 to 16 characters.
Please modify the password periodically such as once every 3 months. If the device is
used in highly risky environment, suggest modifying the password monthly or weekly.
Please keep your username and password safe.
2.8 Storage
Tap Menu>Storage and view the “Storage Status” and “Storage Strategy”.
Other manuals for KSCA120 Series
1
Table of contents
Other Kedacom IP Access Controllers manuals