Table of Contents
1. Instruction for Use ..................................................................... 1
1.1 Finger Placement................................................................. 1
1.2 Instruction for Card Swipe ................................................... 2
1.3 Precautions.......................................................................... 2
2. Introduction of Device................................................................ 3
2.1 Overview of Device Functions............................................. 3
2.2 Product Appearance ............................................................ 4
2.3 Use of an External USB Keyboard...................................... 6
2.4 Verification State .................................................................. 7
2.5 Management Card............................................................... 7
2.6 System Password................................................................ 8
2.7 Operation Timeout ............................................................... 9
3. Device Operations................................................................... 10
3.1 Management Card............................................................. 10
3.1.1 Enroll a Management Card..............................................10
3.1.2 Enroll an Ordinary User....................................................11
3.1.3 Delete a Single User.........................................................17
3.2 USB Keyboard Operations ................................................ 20
3.2.1 Set Keyboard Password ..................................................20
3.2.2 Enroll a User Through Keyboard ....................................21
3.2.3 Delete a Specified User....................................................25
3.2.4 Delete All Users.................................................................27
3.2.5 Restore Factory Defaults .................................................27
3.3 Access Control Function.................................................... 28
3.4 User Verification................................................................. 30