Biometrico Dahua Manual
Biometrico Dahua Manual
Biometrico Dahua Manual
Attendance
User's Manual
V1.0.1
Foreword
General
This manual introduces the functions and operations of the Face Recognition Time & Attendance
(hereinafter referred to as the "Device"). Read carefully before using the device, and keep the
manual safe for future reference.
Safety Instructions
Revision History
As the device user or data controller, you might collect the personal data of others such as their
face, audio, fingerprints, and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
I
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the Device, hazard prevention, and
prevention of property damage. Read carefully before using the Device, and comply with the
guidelines when using it.
Transportation Requirement
Transport, use and store the Device under allowed humidity and temperature conditions.
Storage Requirement
Installation Requirements
● Do not connect the power adapter to the Device while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the Device.
● Do not connect the Device to two or more kinds of power supplies, to avoid damage to the
Device.
● Improper use of the battery might result in a fire or explosion.
● Please follow the electrical requirements to power the Device.
Following are the requirements for selecting a power adapter.
○ The power supply must conform to the requirements of IEC 60950-1 and IEC 62368-1
standards.
○ The voltage must meet the SELV (Safety Extra Low Voltage) requirements and not exceed
ES-1 standards.
○ When the power of the device does not exceed 100 W, the power supply must meet LPS
requirements and be no higher than PS2.
We recommend using the power adapter provided with the Device.
When selecting the power adapter, the power supply requirements (such as rated voltage)
are subject to the Device label.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the Device in a place exposed to sunlight or near heat sources.
● Keep the Device away from dampness, dust, and soot.
● Install the Device on a stable surface to prevent it from falling.
● Install the Device in a well-ventilated place, and do not block its ventilation.
III
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
● The Device is a class I electrical appliance. Make sure that the power supply of the Device is
connected to a power socket with protective earthing.
Operation Requirements
IV
Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Overview...........................................................................................................................................................1
2 Local Operations.............................................................................................................................................. 2
2.1 Common Icons........................................................................................................................................2
2.2 Standby Screen...................................................................................................................................... 2
2.3 Initialization........................................................................................................................................... 3
2.4 Logging In...............................................................................................................................................3
2.5 Person Management..............................................................................................................................4
2.5.1 Adding Users................................................................................................................................4
2.5.2 Viewing User Information...........................................................................................................6
2.6 Attendance Management..................................................................................................................... 6
2.6.1 Configuring Verification Mode...................................................................................................7
2.6.2 Configuring Departments...........................................................................................................7
2.6.3 Configuring Shifts........................................................................................................................7
2.6.4 Configuring Holiday Plans.......................................................................................................... 9
2.6.5 Configuring Work Schedules....................................................................................................10
2.6.6 Configuring the Verification Time Interval............................................................................. 13
2.6.7 Configuring Attendance Modes............................................................................................... 13
2.7 Communication Settings.....................................................................................................................14
2.7.1 Configuring Auto Registration.................................................................................................14
2.7.2 Configuring Wi-Fi...................................................................................................................... 15
2.7.3 Configuring Wi-Fi AP.................................................................................................................16
2.8 System Settings................................................................................................................................... 17
2.8.1 Configuring Time.......................................................................................................................17
2.8.2 Configuring Face Parameters................................................................................................... 18
2.8.3 Setting the Volume................................................................................................................... 20
2.8.4 Configuring the Language........................................................................................................20
2.8.5 Screen Settings.......................................................................................................................... 20
2.8.6 Restoring Factory Defaults....................................................................................................... 21
2.8.7 Restarting the Device................................................................................................................21
2.9 Functions Settings............................................................................................................................... 21
2.10 USB Management.............................................................................................................................. 23
2.10.1 Exporting to USB..................................................................................................................... 23
2.10.2 Importing from USB................................................................................................................ 23
2.10.3 Updating the System.............................................................................................................. 23
2.11 Attendance Records.......................................................................................................................... 24
V
2.12 System Information...........................................................................................................................24
2.12.1 Viewing Data Capacity............................................................................................................24
2.12.2 Viewing Device Version.......................................................................................................... 24
3 Web Operations............................................................................................................................................. 25
3.1 Initialization......................................................................................................................................... 25
3.2 Logging In.............................................................................................................................................25
3.3 Resetting the Password.......................................................................................................................26
3.4 Home Page........................................................................................................................................... 26
3.5 Person Management........................................................................................................................... 27
3.6 Face Detection..................................................................................................................................... 29
3.6.1 Configuring Face Detection......................................................................................................30
3.6.2 Privacy Settings......................................................................................................................... 32
3.7 Attendance Configuration.................................................................................................................. 33
3.7.1 Configuring Departments.........................................................................................................33
3.7.2 Configuring Shifts..................................................................................................................... 34
3.7.3 Configuring Holiday..................................................................................................................36
3.7.4 Configuring Work Schedules....................................................................................................37
3.7.5 Configuring Attendance Modes............................................................................................... 40
3.8 Configuring Audio and Video............................................................................................................. 42
3.8.1 Configuring Video..................................................................................................................... 42
3.8.2 Configuring Audio Prompts..................................................................................................... 50
3.8.3 Configuring Motion Detection................................................................................................. 50
3.9 Communication Settings.....................................................................................................................51
3.9.1 Configuring Wi-Fi...................................................................................................................... 51
3.9.2 Configuring Port........................................................................................................................52
3.9.3 Configuring Basic Service......................................................................................................... 53
3.9.4 Configuring Cloud Service........................................................................................................54
3.9.5 Configuring Auto Registration.................................................................................................55
3.9.6 Configuring CGI Actively Registers.......................................................................................... 56
3.9.7 Configuring Auto Upload......................................................................................................... 58
3.10 Configuring the System.................................................................................................................... 58
3.10.1 User Management................................................................................................................... 59
3.10.2 Configuring Time.....................................................................................................................61
3.11 Configuring the Shortcuts................................................................................................................ 63
3.12 Management Center..........................................................................................................................64
3.12.1 One-click Diagnosis.................................................................................................................64
3.12.2 System Information................................................................................................................ 64
3.12.3 Data Capacity...........................................................................................................................65
3.12.4 Viewing Logs........................................................................................................................... 65
3.12.5 Configuration Management...................................................................................................66
VI
3.12.6 Maintenance............................................................................................................................ 67
3.12.7 Updating the System.............................................................................................................. 67
3.12.8 Advanced Maintenance.......................................................................................................... 68
3.13 Security Settings(Optional) ..............................................................................................................69
3.13.1 Security Status.........................................................................................................................69
3.13.2 Configuring HTTPS..................................................................................................................70
3.13.3 Attack Defense........................................................................................................................ 70
3.13.4 Installing Device Certificate................................................................................................... 73
3.13.5 Installing the Trusted CA Certificate......................................................................................76
3.13.6 Data Encryption.......................................................................................................................77
3.13.7 Security Warning.....................................................................................................................78
3.13.8 Security Authentication..........................................................................................................78
4 Smart PSS Lite Configuration....................................................................................................................... 80
4.1 Installing and Logging In.................................................................................................................... 80
4.2 Adding Devices.................................................................................................................................... 80
4.2.1 Adding Device One By One.......................................................................................................80
4.2.2 Adding Devices in Batches....................................................................................................... 81
4.3 User Management............................................................................................................................... 83
4.3.1 Adding Users..............................................................................................................................83
4.3.2 Assigning Attendance Permissions......................................................................................... 86
Appendix 1 Important Points of Face Registration......................................................................................89
Appendix 2 Security Recommendation........................................................................................................ 92
VII
1 Overview
The Device can be used to track attendance of people. People can clock in/out through face and
password.
It is widely used in parks, communities, business centers and factories, and ideal for places such as
office buildings, government buildings, schools and stadiums.
Configurations might differ depending on the models of the product, please refer to the actual
product.
1
2 Local Operations
● Configurations might differ depending on the actual product.
● You might see some UI texts are not displayed because of the limited space. Long press the text
for 3 seconds and it will show.
Icon Description
Main menu icon
Confirm icon
Turn on
Turn off
Delete
Search
2
Figure 2-1 Standby screen
2.3 Initialization
For the first-time use or after restoring factory defaults, you need to select a language on Device,
and then set the password and email address for the admin account. You can use the admin
account to enter the main menu of the Device and its webpage.
● If you forget the administrator password, send a reset request to your registered e-mail address.
● The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
2.4 Logging In
Log in to the main menu to configure the Device. Only admin account and administrator account
can enter the main menu of the Device. For the first-time use, use the admin account to enter the
main menu screen and then you can create the other administrator accounts.
Background Information
● admin account: Can log in to the main menu screen of the Device, but does not have door
access permissions.
3
● Administrator account: Can log in to the main menu of the Device and has door access
permissions.
Procedure
Step 1 Press and hold the standby screen for 3 seconds.
Step 2 Select a verification method to enter the main menu.
● Face: Enter the main menu by face recognition.
● PWD: Enter the user ID and password of the administrator account.
● admin: Enter the admin password to enter the main menu.
The pictures in this manual are for reference only, and might differ from the actual product.
4
Table 2-2 Parameters description
Parameter Description
The No. is like employee ID, which can be numbers, letters,
No. and their combinations, and the maximum length of the
No. is 30 characters.
The name can have up to 32 characters (including
Name
numbers, symbols, and letters).
Position your face inside the frame, and a face image will
Face be captured automatically. You can register again if you are
not satisfied with the outcome.
5
Parameter Description
● Department Schedule: Apply department schedules to
the user.
● Personal Schedule: Apply personal schedules to the
user.
For how to configure personal or department
Schedule Mode schedules, see "2.6.5 Configuring Work Schedules".
Step 3 Tap .
6
2.6.1 Configuring Verification Mode
Procedure
Step 1 Select Attendance > Verification Mode.
Step 2 Select the attendance verification mode.
Step 3 Tap .
7
Tap to view more shifts. You can configure up to 24 shifts.
Step 3 Configure the parameters of the shift.
Figure 2-5 Create shifts
Parameter Description
Shift Name Enter the name of the shift.
Period 1 Specify a time range when people can clock in and clock out for
the workday.
If you only set one attendance period, employees need to clock
in and out by the designated times to avoid an anomaly
appearing on their attendance record. For example, if you set
Period 2 08:00 to 17:00, employees must clock in by 08:00 and clock out
from 17:00 onwards.
If you set 2 attendance periods, the 2 periods cannot overlap.
Employees need to clock in and clock out for both periods.
● When the time interval between 2 periods is an even number, you can divide the time
interval by 2, and assign the first half of the interval to the first period, which will be
the clock out time. The second half of the interval should be assigned to the second
period as the clock in time.
8
Figure 2-6 Time interval (Even number)
For example: If the interval is 120 minutes, then the clock-out time for period 1 is from
12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00.
If a person clocks out multiple times during period 1, the latest time will be valid, and if
they clock in multiple times during period 2, the earliest time will be valid.
● When the time interval between 2 periods is an odd number, the smallest portion of
the interval will be assigned to the first period, which will be the clock out time. The
largest portion of the interval will be assigned to the second period as the clock in
time.
Figure 2-7 Time interval (even number)
For example: If the interval is 125 minutes, then the clock-out time for period 1 is from
11:55 to 12:57, and the clock-in time for period 2 is from 12:58 to 14:00. Period 1 has 62
minutes, and period 2 has 63 minutes.
If a person clocks out multiple times during period 1, the latest time will be valid, and if
they clock in multiple times during period 2, the earliest time will be valid.
All attendance times are precise down to the second. For example, if the normal clock-in
time is set to 8:05 AM, the employee who clocks in at 8:05:59 AM will not be considered as
arriving late. But, the employee that arrives at 8:06 AM will be marked as late by 1 minute.
Step 4 Tap .
9
Step 2 Click to add holiday plans.
Step 3 Configure the parameters.
Figure 2-8 Create holiday plans
Parameter Description
Attendance Holiday No. The number of the holiday.
Attendance Holiday The name of the holiday.
Start Time
The start and end time of the holiday.
End Time
Step 4 Tap .
10
Figure 2-9 Configuring work schedules
Procedure
Step 1 Select Attendance > Schedule Config.
Step 2 Set work schedules for individuals.
1. Tap Personal Schedule.
2. Enter the user ID, and then tap .
3. On the calendar, select a day, and then select a shift.
The shift is scheduled for the day.
You can only set work schedules for the current month and the next month.
● 0 indicates break.
● 1 to 24 indicates the number of the per-defined shifts. For how to configure shifts,
see "2.6.3 Configuring Shifts".
● 25 indicates business trip.
● 26 indicates leave of absence.
11
Figure 2-10 Schedule shifts to individuals
4. Tap .
Step 3 Set works schedules for departments.
1. Tap Department Schedule.
2. Tap a department, and then select shifts for a week.
Shifts are scheduled for the week.
● 0 indicates rest.
● 1 to 24 indicates the number of the per-defined shifts. For how to configure shifts, see
"2.6.3 Configuring Shifts".
● 25 indicates business trip.
● 26 indicates leave of absence.
Figure 2-11 Schedule shifts to a department
The defined work schedule is in a week cycle and will be applied to all employees in the
department.
Step 4 Tap .
12
2.6.6 Configuring the Verification Time Interval
When an employee clocks in and out multiple times within a set period, the earliest time will be
valid.
Procedure
Step 1 Select Attendance > Verification Interval (sec).
Step 2 Enter the time interval, and then tap .
Parameter Description
The screen displays the attendance status automatically after you
Auto/Manual Mode clock in or out, but you can also manually change your attendance
status.
The screen displays your attendance status automatically after you
Auto Mode
clock in or out.
Manual Mode Manually select your attendance status when you clock in or out.
When you clock in or out, the screen will display the per-defined
Fixed Mode
attendance status all the time.
Step 3 Select an attendance mode.
Step 4 Configure the parameters for the attendance mode.
13
Figure 2-13 Auto Mode/manual mode
Parameters Description
Check In Clock in when your normal workday starts.
Break Out Clock out when your break starts.
Break In Clock in when your break ends.
Check Out Clock out when your normal workday starts.
Overtime Check In Clock in when your overtime period starts.
Overtime Check Out Clock out when your overtime period ends.
To avoid exposing the system to security risks and data loss, control the management
platform permissions.
14
Figure 2-14 Auto registration
Step 2 Turn on the automatic registration function and set the parameters.
Parameter Description
Server Address The IP address of the management platform.
Port The port No. of the management platform.
Enter the device ID (user defined).
Registration ID When you add the Device to the management platform, the
registration ID you enter on the management platform must conform
to the defined registration ID on the Device.
15
Figure 2-15 Connect to Wi-Fi
Results
Use your computer to connect to Wi-Fi AP of the Device to access its webpage.
16
2.8 System Settings
2.8.1 Configuring Time
Configure system time, such as date, time, and NTP.
Procedure
Step 1 On the Main Menu, select System Settings > Time.
Step 2 Configure system time.
Figure 2-17 Time
Parameter Description
24-hour System The time is displayed in 24-hour format.
Date & Time Set up the date.
Time Set up the time.
Date Format Select a date format.
17
Parameter Description
NTP Time Sync 1. Tap NTP Check, and then enable it.
2. Configure the parameters.
● Server Address : Enter the IP address of the NTP server,
and the Device will automatically sync time with the NTP
server.
● Port : Enter the port of the NTP server.
● Interval : Enter the time synchronization interval.
18
Table 2-9 Description of face parameters
Name Description
Adjust the accuracy level of face recognition. Higher threshold
means higher accuracy and lower false recognition rate.
Face Recognition Threshold
When the threshold is too low such as 0, the false recognition rate
will be extremely high. Please be advised.
Set the largest angle that a face can be posed in for face detection.
Max Face Recognition Angle The larger the value, the larger the range for the face angle. If the
Deviation angle a face is positioned in is not within the defined range, it
might not be detected properly.
A certain number of pixels are required between the eyes for
recognition to be successful. The default number is 45 pixels. This
Pupillary Distance number changes based on the size of the face and the distance
between the face and the lens. If an adult is 1.5 meters away from
the lens, the pupillary distance is usually 50 - 70 px.
When the same face remains in front of the lens after the first
Valid Face Interval (sec) successful recognition, the Device will perform recognition again
for the face after a defined interval.
When the same face remains in front of the lens after the first
Invalid Face Interval (sec) failed recognition, the Device will perform recognition again for
the face after a defined interval.
This prevents people from being able to use photos, videos, mask
Enable Anti-spoofing
and other substitutes to gain unauthorized access.
19
Name Description
● Do Not Detect : Mask is not detected during face recognition.
● Mask Reminder : Mask is detected during face recognition. If
the person is not wearing a mask, the system will remind them
to wear a mask, but they will still be allowed access.
Mask mode
● No Authorization without Wearing Face Mask : Mask is
detected during face recognition. If a person is not wearing a
mask, the system will remind them to wear masks, and access
will be denied.
The higher the threshold, the more accurate face recognition will
Mask Recognition Threshold be when a person is wearing a mask, and there will be a lower
false recognition rate.
Multi-face Recognition
The number of face images which are supported might differ
depending on the model of the product.
The logout time must be less than the screen off time.
20
2.8.6 Restoring Factory Defaults
Procedure
Step 1 On the Main Menu, select System Settings > Factory Defaults.
Step 2 Restore factory defaults if necessary. Restore the factory default settings if necessary.
● Factory Defaults : Resets all configurations and data except for IP settings.
● Restore to Default Settings (except for user information and logs) : Resets all the
configurations except for user information and logs.
21
Table 2-10 Function description
Parameter Description
● Password Reset: The password can be reset when you turn on
this function.
● Enable HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a
protocol for secure communication over a computer network.
When HTTPS is enabled, HTTPS will be used to access CGI
commands; otherwise HTTP will be used.
22
2.10 USB Management
You can use a USB to update the Device, and export or import user information or attendance
records through USB.
● Make sure that a USB is inserted to the Device before you export data or update the system. To
avoid failure, do not pull out the USB or perform any operation of the Device during the process.
● You can use a USB to export the information from a Device to another Device. Face images are
not allowed to be imported through USB.
● Importing/exporting attendance records is only available on select models.
23
2.11 Attendance Records
On the main menu, select Record Management > Search for Attendance Records. The
attendance records are displayed. You can search for record by user ID.
24
3 Web Operations
On the webpage, you can also configure and update the Device.
3.1 Initialization
Initialize the Device when you log in to the webpage for the first time or after the Device is restored
to the factory defaults.
Prerequisites
Make sure that the computer used to log in to the webpage is on the same LAN as the Device.
Procedure
Step 1 Open a browser, go to the IP address of the Device.
● The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: upper case, lower case, numbers, and special
characters (excluding ' " ; : &). Set a high-security password by following the password
strength prompt.
● Keep the password safe after initialization and change the password regularly to
improve security.
3.2 Logging In
Procedure
Step 1 Open a browser, enter the IP address of the Device in the Address bar, and press the
Enter key.
Step 2 Enter the user name and password.
● The default administrator name is admin, and the password is the one you set up
during initialization. We recommend you change the administrator password regularly
to increase security.
● If you forget the administrator login password, you can click Forget password? to
reset password.
Step 3 Click Login.
25
3.3 Resetting the Password
Reset the password through the linked e-mail when you forget the admin password.
Procedure
Step 1 On the login page, click Forgot password.
Step 2 Read the on-screen prompt, and then click OK.
Step 3 Scan the QR code, and you will receive a security code.
Figure 3-1 Reset password
● Up to two security codes will be generated when the same QR code is scanned. If the
security code becomes invalid, refresh the QR code and scan again.
● After you scan the QR code, you will receive a security code in your linked e-mail
address. Use the security code within 24 hours after you receive it. Otherwise, it will
become invalid.
● If the wrong security code is entered 5 times in a row, the administrator account will
The password should consist of 8 to 32 non-blank characters and contain at least two of
the following types of characters: upper case, lower case, number, and special character
(excluding ' " ; : &).
Step 7 Click OK.
26
Figure 3-2 Home page
No. Description
1 Main menu.
27
Figure 3-3 Add users
Parameter Description
The User ID. is like employee ID, which can be numbers,
User ID letters, and their combinations, and the maximum length
of the number. is 30 characters.
The name can have up to 32 characters (including
Name
numbers, symbols, and letters).
28
Parameter Description
Department Add users to a department. If a department schedule is
assigned to the person, they will follow the established
department schedule. For how to create department, see
"2.6.2 Configuring Departments".
● Department Schedule: Assign department schedule to
the user. For details, see "2.6.5 Configuring Work
Schedules".
● Personal Schedule: Assign personal schedule to the
Schedule Mode user. For details, see "2.6.5 Configuring Work
Schedules".
The face image is in jpg format and must be less than 100
KB.
29
3.6.1 Configuring Face Detection
Configure face detection parameters. Face parameters might differ depending on models of the
product.
Procedure
Step 1 Log in to the webpage, select Face Detection > Face Detection.
Figure 3-4 Face detection parameters
Name Description
Set the largest angle that a face can be posed in for face detection.
Max Face Recognition Angle The larger the value, the larger the range for the face angle. If the
Deviation angle a face is positioned in is not within the defined range, it
might not be detected properly.
This prevents people from being able to use photos, videos, mask
Anti-spoofing Level
and other substitutes to gain unauthorized access.
When the same face remains in front of the lens after the first
Valid Face Interval (sec) successful recognition, the Device will perform recognition again
for the face after a defined interval.
30
Name Description
When the same face remains in front of the lens after the first
Invalid Face Interval (sec) failed recognition, the Device will perform recognition again for
the face after a defined interval.
The higher the threshold, the more accurate face recognition will
Face Mask Threshold be when a person is wearing a mask, and there will be a lower
false recognition rate.
Beautifier Beautify captured face images.
Multi-face Recognition
The number of face images which are supported might differ
depending on the model of the product.
31
Figure 3-5 Exposure parameters
Parameter Description
● Channel 1 is the white light mode.
Channel No. ● Channel 2 is the infrared light mode.
Face Exposure After the face exposure function is enabled, the face will be
exposed at the defined brightness to detect the face image
Face Target Brightness clearly.
Face Exposure Interval Detection The face will be exposed only once in a defined interval.
Step 4 Draw the face detection area.
1. Click Detection Area.
2. Right-click to draw the detection area, and then release the left button of the mouse to
complete drawing.
The face in the defined area will be detected.
Step 5 Draw the target size.
1. Click Draw Target.
2. Draw the face recognition box to define the minimum size of detected face.
Only when the size of the face is larger than the defined size, the face can be detected
by the Device.
Step 6 Draw the detection area.
Step 7 Click OK.
32
Step 2 Enable snapshot function.
Face images will be captured automatically when people clock in or clock out.
Figure 3-6 Enable snapshot
Related Operations
You can click Default to restore departments to default settings.
33
3.7.2 Configuring Shifts
Configure shifts to define time attendance rules. Employees need to work at the time scheduled for
their shift to start, and leave at the end time, except when they choose to work overtime.
Procedure
Step 1 Select Attendance Config > Shift Config.
Step 2 Click to configure the shift.
Figure 3-8 Create shifts
Parameter Description
Shift Name Enter the name of the shift.
34
Parameter Description
Period 1 Specify a time range when people can clock in and clock out for
the workday.
If you only set one attendance period, employees need to clock
in and out by the designated times to avoid an anomaly
appearing on their attendance record. For example, if you set
Period 2 08:00 to 17:00, employees must clock in by 08:00 and clock out
from 17:00 onwards.
If you set 2 attendance periods, the 2 periods cannot overlap.
Employees need to clock in and clock out for both periods.
● When the time interval between 2 periods is an even number, you can divide the time
interval by 2, and assign the first half of the interval to the first period, which will be
the clock out time. The second half of the interval should be assigned to the second
period as the clock in time.
Figure 3-9 Time interval (even number)
For example: If the interval is 120 minutes, then the clock-out time for period 1 is from
12:00 to 12:59, and the clock-in time for period 2 is from 13:00 to 14:00.
If a person clocks out multiple times during period 1, the latest time will be valid, and if
they clock in multiple times during period 2, the earliest time will be valid.
● When the time interval between 2 periods is an odd number, the smallest portion of
the interval will be assigned to the first period, which will be the clock out time. The
largest portion of the interval will be assigned to the second period as the clock in
time.
35
Figure 3-10 Time interval (even number)
For example: If the interval is 125 minutes, then the clock-out time for period 1 is from
11:55 to 12:57, and the clock-in time for period 2 is from 12:58 to 14:00. Period 1 has 62
minutes, and period 2 has 63 minutes.
If a person clocks out multiple times during period 1, the latest time will be valid, and if
they clock in multiple times during period 2, the earliest time will be valid.
All attendance times are precise down to the second. For example, if the normal clock-in
time is set to 8:05 AM, the employee who clocks in at 8:05:59 AM will not be considered as
arriving late. But, the employee that arrives at 8:06 AM will be marked as late by 1 minute.
Step 3 Click OK.
Related Operations
You can click Default to restore shifts to factory defaults.
36
Figure 3-11 Create holiday plans
Parameter Description
Attendance Holiday No. The number of the holiday.
Attendance Holiday The name of the holiday.
Start Time
The start and end time of the holiday.
End Time
Step 4 Click OK.
37
Figure 3-12 Configuring work schedules
Procedure
Step 1 Select Attendance Config > Schedule Config.
Step 2 Set work schedules for individuals.
1. Click Personal Schedule.
2. Select a person in the person list.
3. On the calendar, select a day, and then select a shift.
You can also click Batch Configure to schedule shifts to multiple days.
38
Figure 3-13 Personal schedule
You can only set work schedules for the current month and the next month.
● 0 indicates break.
● 1 to 24 indicates the number of the per-defined shifts. For how to configure shifts, see
"2.6.3 Configuring Shifts".
● 25 indicates business trip.
39
Figure 3-14 Schedule shifts to a department
The defined work schedule is in a week cycle and will be applied to all employees in the
department.
40
Figure 3-15 Attendance modes
Parameter Description
The screen displays the attendance status automatically after you
clock in or out, but you can also manually change your attendance
status.
● Check In: Clock in when your normal workday starts.
Auto/Manual Mode ● Break Out: Clock out when your break starts.
● Break In: Clock in when your break ends.
● Check Out: Clock out when your normal workday starts.
● Overtime Check In: Clock in when your overtime period starts.
● Overtime Check Out: Clock out when your overtime period ends.
Manual Mode Manually select your attendance status when you clock in or out.
When you clock in or out, the screen will display the per-defined
Fixed Mode
attendance status all the time.
41
Step 5 Click Apply.
Related Operations
● Refresh: If you do not want to the save the current changes, click Refresh to cancel changes and
restore it to previous settings.
● Default: Restore the attendance settings to factory defaults.
Procedure
Step 1 Select Audio and Video Config > Video.
Step 2 Select 1 from the Channel No. list.
Step 3 Configure the bit rate.
Figure 3-16 Date rate
42
Table 3-8 Bit rate description
Parameter Description
43
Table 3-9 Parameters description of status
Parameter Description
44
Figure 3-18 Exposure
Parameter Description
45
Parameter Description
When you select Outdoor from the Anti-flicker list, you can
select Shutter Priority as the exposure mode.
Exposure mode might differ depending on models of Device.
Gain When the gain value range is set, video quality will be improved.
Exposure
The video will be brighter by adjusting exposure compensation value.
Compensation
3D NR When 3D Noise Reduction (RD) is turned on, video noise can be reduced
to ensure higher definition of videos.
NR Level You can set its grade when this function is turned on. Higher grade
means clearer image.
Parameter Description
Brightness The brightness of the image. Higher value means brighter images.
46
Parameter Description
Contrast is the difference in the luminance or color that makes an
Contrast object distinguishable. The larger the contrast value is, the greater
the color contrast will be.
When the function is turned on, images will be displayed with the
Mirror
left and right side reversed.
Flip When this function is turned on, images can be flipped over.
Procedure
Step 1 Select Audio and Video Config > Video.
Step 2 Select 2 from the Channel No. list.
Step 3 Select 2 from the Channel No..
Step 4 Configure the video status.
We recommend you turn on the WDR function when the face is in back-lighting.
Figure 3-20 Configure status
47
Table 3-12 Status description
Parameter Description
● Disable : Compensation is turned off.
● BLC : Backlight compensation automatically brings more light to
darker areas of an image when bright light shining from behind
obscures it.
● WDR : The system dims bright areas and compensates for dark
Compensation Mode areas to create a balance to improve the overall image quality.
● HLC : Highlight compensation (HLC) is a technology used in
CCTV/IP security cameras to deal with images that are exposed to
lights like headlights or spotlights. The image sensor of the
camera detects strong lights in the video and reduces exposure
in these spots to enhance the overall quality of the image.
Parameter Description
48
Parameter Description
When you select Outdoor from the Anti-flicker list, you can
select Shutter Priority as the exposure mode.
Exposure mode might differ depending on models of Device.
Exposure
The video will be brighter by adjusting exposure compensation value.
Compensation
3D NR When 3D Noise Reduction (RD) is turned on, video noise can be reduced
to ensure higher definition of videos.
NR Level You can set its grade when this function is turned on. Higher grade
means clearer image.
Parameter Description
Brightness The brightness of the image. Higher value means brighter images.
Contrast is the difference in the luminance or color that makes an
Contrast object distinguishable. The larger the contrast value is, the greater
the color contrast will be.
49
3.8.2 Configuring Audio Prompts
Set audio prompts during identity verification.
Procedure
Step 1 Select Audio and Video Config > Audio.
Step 2 Configure the audio parameters.
Figure 3-23 Configure audio parameters
Parameters Description
Speaker Set the volume of the speaker.
Audio File Click Upload audio files to the platform.
Step 3 Click to upload audio files to platform for each audio type.
Only supports MP3 files that are less than 20 KB with a sampling rate of 16 K.
Step 4 Click Apply.
50
Figure 3-24 Motion detection area
51
3.9.2 Configuring Port
You can limit access to the Device at the same time through webpage, desktop client and mobile
client.
Procedure
Step 1 Select Communication Settings > Network Setting > Port.
Step 2 Configure the ports.
Figure 3-25 Configure ports
Except for Max Connection and RTSP Port, you need to restart the Device to make the
configurations effective after you change other parameters.
Parameter Description
You can set the maximum number of clients (such as
Max Connection webpage, desktop client and mobile client) that can access
the Device at the same time.
TCP Port Default value is 37777.
Default value is 80. If you have changed the port number,
HTTP Port add the port number after the IP address when access the
webpage.
HTTPS Port Default value is 443.
RTSP Port Default value is 554.
Step 3 Click Apply.
52
3.9.3 Configuring Basic Service
When you want to connect the Device to a third-party platform, turn on the CGI and ONVIF
functions.
Procedure
Step 1 Select Network Settings > Basic Services.
Step 2 Configure the basic service.
Figure 3-26 Basic service
Parameter Description
53
Parameter Description
Emergency Maintenance It is turned on by default.
Private Protocol
Security risks might present when TLSv1.1 is enabled. Please be
advised.
Step 3 ClickApply.
54
Figure 3-27 Cloud service
Procedure
Step 1 On the home page, select Communication Settings > Network Setting > Auto
Registration.
Step 2 Enable the auto registration function and configure the parameters.
55
Figure 3-28 Auto Registration
Parameter Description
Server Address The IP address or the domain name of the server.
Port The port of the server that is used for automatic registration.
The registration ID (user defined) of the device. Adding the device to
Registration ID
the management by entering the registration ID on the platform.
Step 3 Click Apply.
Procedure
Step 1 On the home page, select Communication Settings > Network Settings > CGI actively
registers.
Step 2 Enable this function, and then configure the parameters.
Step 3 Click Add, and then configure parameters.
56
Figure 3-29 CGI active registration
Parameter Description
Supports up to 32 bytes, including Chinese, numbers, letters, and
Device ID
special characters.
Address Type Supports 2 methods to register.
Host IP ● Host IP: Enter the IP address of the third-party platform.
Domain Name ● Domain Name: Enter the domain name of the third-party platform.
57
3.9.7 Configuring Auto Upload
Send user information and attendance records through to the management platform
Procedure
Step 1 On the home page, select Communication Settings > Network Settings > Auto
Upload.
Step 2 Enable HTTP upload mode.
Step 3 Click Add, and then configure parameters.
Figure 3-30 Automatic upload
Parameter Description
IP/Domain Name The IP or domain name of the management platform.
Port The port of the management platform.
Access the management platform through HTTPS. HTTPS
HTTPS
secures communication over a computer network.
Enable account authentication when you access the
Authentication management platform. Login username and password are
required.
58
3.10.1 User Management
You can add or delete users, change users' passwords, and enter an email address for resetting the
password when you forget your password.
● The username cannot be the same with existing account. The username consists of up
to 31 characters and only allows for numbers, letters, underscores, midlines, dots, or @.
● The password must consist of 8 to 32 non-blank characters and contain at least two
types of the following characters: Upper case, lower case, numbers, and special
characters (excluding ' " ; : &).
Set a high-security password by following the password strength prompt.
Figure 3-31 Add administrators
Only admin account can change password and admin account cannot be deleted.
59
3.10.1.2 Adding ONVIF Users
Background Information
Open Network Video Interface Forum (ONVIF), a global and open industry forum that is established
for the development of a global open standard for the interface of physical IP-based security
products, which allows the compatibility from different manufactures. ONVIF users have their
identities verified through ONVIF protocol. The default ONVIF user is admin.
Procedure
Step 1 On the home page, select System > Account > ONVIF User.
Step 2 Click Add, and then configure parameters.
Figure 3-32 Add ONVIF user
Parameter Description
The username cannot be the same with existing account. The
Username username consists of up to 31 characters and only allows for
numbers, letters, underscores, midlines, dots, or @.
The password must consist of 8 to 32 non-blank characters
and contain at least two types of the following characters:
Password
Upper case, lower case, numbers, and special characters
(excluding ' " ; : &).
60
Parameter Description
If you forgot the password, you can receive security codes through the linked email
address to reset the password.
Step 4 Click Apply.
61
Figure 3-34 Date settings
62
Table 3-22 Time settings description
Parameter Description
● Manual Set: Manually enter the time or you can click Sync Time to
sync time with computer.
● NTP: The Device will automatically sync the time with the NTP
Time server.
Server : Enter the domain of the NTP server.
Port : Enter the port of the NTP server.
Interval : Enter its time with the synchronization interval.
63
Table 3-23 Parameters description
Parameter Description
Password The icon of the password is displayed on the standby screen.
64
3.12.2.1 Viewing Version Information
On the webpage, select System > Version, and you can view version information of the Device.
65
Step 2 Select Log > Admin Log.
Step 3 Enter the admin ID, and then click Search.
Click Export to export admin logs.
● Make sure that a USB is inserted to the Device before you export data or update the
system. To avoid failure, do not pull out the USB or perform any operation of the
Device during the process.
● You have to use a USB to export the information from the Device to other devices.
66
● Import the configuration file.
1. Click Browse to select the configuration file.
2. Click Import configuration.
Configuration files can only be imported to devices that have the same model.
Procedure
Step 1 Select Maintenance Center > Manager > Config..
Restoring the Device to its default configurations will result in data loss. Please be
advised.
Step 2 Restore to the factory default settings if necessary.
● Factory Defaults : Resets all the configurations of the Device and delete all the data.
● Restore to Default (Except for User Info and Logs) : Resets the configurations of the
Device and deletes all the data except for user information and logs.
3.12.6 Maintenance
Regularly restart the Device during its idle time to improve its performance.
Procedure
Step 1 Log in to the webpage.
Step 2 Select Maintenance Center > Manager > Maintenance.
Step 3 Set the time, and then click Apply.
The Device will restart at the scheduled time, or you can click Restart to restart it
immediately.
● Use the correct update file. Make sure that you get the correct update file from technical
support.
● Do not disconnect the power supply or network, and do not restart or shutdown the Device
during the update.
Procedure
Step 1 On the home page, Maintenance Center > Update.
Step 2 In File Update , click Browse, and then upload the update file.
67
Step 3 Click Update.
The Device will restart after the update finishes.
Procedure
Step 1 On the home page, select Maintenance Center > Update.
Step 2 In the Online Update area, select an update method.
● Select Auto Check for Updates, and the Device will automatically check for the latest
version update.
● Select Manual Check, and you can immediately check whether the latest version is
available.
Step 3 (Optional) Click Update Now to update the Device immediately.
3.12.8.1 Exporting
Procedure
Step 1 On the home page, select Maintenance Center > Advanced Maintenance > Export.
Step 2 Click Export to export the serial number, firmware version, device operation logs and
configuration information.
Procedure
Step 1 On the home page, select Maintenance Center > Advanced Maintenance > Packet
Capture.
Figure 3-38 Packet Capture
changes to .
Step 3 After you acquired enough data, click .
Captured packets are automatically downloaded to your local computer.
68
3.13 Security Settings(Optional)
3.13.1 Security Status
Scan the users, service, and security modules to check the security status of the Device.
Background Information
● User and service detection: Check whether the current configuration conforms to
recommendation.
● Security modules scanning: Scan the running status of security modules, such as audio and
video transmission, trusted protection, securing warning and attack defense, not detect
whether they are enabled.
Procedure
Step 1 Select > Security Status.
Step 2 Click Rescan to perform a security scan of the Device.
Hover over the icons of the security modules to see their running status.
Figure 3-39 Security Status
Related Operations
After you perform the scan, the results will be displayed in different colors. Yellow indicates that the
security modules are abnormal, and green indicates that the security modules are normal.
● Click Details to view the details on the results of the scan.
● Click Ignore to ignore the abnormality, and it will not be scanned. The abnormality that was
ignored will be highlighted in grey.
● Click Optimize to troubleshoot the abnormality.
69
3.13.2 Configuring HTTPS
Create a certificate or upload an authenticated certificate, and then you can log in to the webpage
through HTTPS on your computer. HTTPS secures communication over a computer network.
Procedure
Step 1 Select > System Service > HTTPS.
Step 2 Turn on the HTTPS service.
If you turn on the compatible with TLS v1.1 and earlier versions, security risks might occur.
Please be advised.
Step 3 Select the certificate.
70
Figure 3-41 Firewall
71
3.13.3.2 Configuring Account Lockout
If the incorrect password is entered for a defined number of times, the account will be locked.
Procedure
Step 1 Select > Attack Defense > Account Lockout.
Step 2 Enter the number of login attempts and the time the administrator account and ONVIF
user will be locked for.
Figure 3-43 Account lockout
● Login Attempt: The limit of login attempts. If the incorrect password is entered for a
defined number of times, the account will be locked.
● Lock Time: The duration during which you cannot log in after the account is locked.
72
Figure 3-44 Anti-DoS attack
73
Figure 3-45 Certificate information
74
● Region: The name of region must not exceed 3 characters. We recommend you enter
the abbreviation of region name.
Figure 3-46 Certificate information (2)
75
Step 2 Click Install Device Certificate.
Step 3 Select Install Existing Certificate , and click Next.
Step 4 Click Browse to select the certificate and private key file, and enter the private key
password.
Figure 3-47 Certificate and private key
76
Figure 3-48 Install the trusted certificate
77
Table 3-24 Data encryption description
Parameter Description
Streams are encrypted during transmission
Enable
through private protocol.
Private Protocol Encryption Type Keep it as default.
Update Period of Secret Ranges from 0 h -720 h. 0 means never update
Key the secret key.
RTSP stream is encrypted during transmission
Enable
through TLS tunnel.
RTSP over TLS Create or import certificate. For details, see
Certificate Management "3.13.4 Installing Device Certificate". The
installed certificates are displayed in the list.
78
Figure 3-51 Security Authentication
79
4 Smart PSS Lite Configuration
This section introduces how to manage and configure the device through Smart PSS Lite. For
details, see the user's manual of Smart PSS Lite.
Set the password is for the first-time use, and then set security questions to reset your
password when you forgot it.
Step 3 Enter your username and password to log in to Smart PSS Lite.
80
Figure 4-1 Add devices
Parameter Description
We recommend you name devices with the monitoring area for easy
Device Name
identification.
Select IP/Domain.
Method to add ● IP/Domain: Enter the IP address or domain name of the device.
● SN: Enter the serial number of the device.
Enter the port number, and the port number is 37777 by default. The
Port
actual port number might differ according to different models.
User Name Enter the username of the device.
Password Enter the password of the device.
Step 3 Click Add.
You can click Add and Continue to add more devices.
● We recommend you add devices by automatically search when you need to add devices in
batches within the same network segment, or when the network segment is known but the
exact IP addresses of devices are not known.
● Close ConfigTool and DSS when you configure devices; otherwise, you may not be able to find
all devices.
81
Procedure
Step 1 On the Device Manager page, click Auto Search.
Step 2 Select a search method.
● Auto Search: Enter the username and the password of the device. The system will
automatically search for devices that are on the same network to your computer.
● Device Segment Search: Enter the username and the password of the device, and then
define the start IP and the end IP. The system will automatically search for devices in
this IP range.
You can select both methods for the system to automatically search for devices on the
network your computer is connected to and other networks.
Figure 4-2 Search for devices
82
4.3 User Management
4.3.1 Adding Users
Procedure
Step 1 Select Personnel > Personnel Manager > Add.
Step 2 Enter basic information of staff.
1. Select Basic Info.
2. Add basic information of staff.
Figure 4-4 Add basic information
Step 3 Click Extended information to add extended information of the personnel, and then
click Finish to save.
83
Figure 4-5 Add extended information
84
Figure 4-6 Configure permission groups
After completing adding, you can click to modify information or add details in the list
of staff.
85
4.3.2 Assigning Attendance Permissions
Create a permission group that is a collection of time attendance permissions, and then associate
employees with the group so that they can punch in/out through defined verification methods.
Procedure
Step 1 Log in to the Smart PSS Lite.
Step 2 Click Access Solution > Personnel Manger > Permission configuration.
Step 3 Click .
Step 4 Enter the group name, remarks (optional), and select a time template.
Step 5 Select the access control device.
Step 6 Click OK.
86
Figure 4-7 Create a permission group
The Time & Attendance only supports punch-in/out through password and face
attendance.
Step 7 Click of the permission group you added.
Step 8 Select users to associate them with the permission group.
87
Figure 4-8 Add users to a permission group
88
Appendix 1 Important Points of Face
Registration
Before Registration
During Registration
● You can register faces through the Device or through the platform. For registration through the
platform, see the platform user manual.
● Make your head center on the photo capture frame. The face image will be captured
automatically.
● Do not shake your head or body, otherwise the registration might fail.
● Avoid 2 faces appear in the capture frame at the same time.
Face Position
If your face is not at the appropriate position, face recognition accuracy might be affected.
The face position below is for reference only, and might differ from the actual situation.
89
Appendix Figure 1-1 Appropriate face position
Requirements of Faces
● Make sure that the face is clean and forehead is not covered by hair.
● Do not wear glasses, hats, heavy beards, or other face ornaments that influence face image
recording.
● With eyes open, without facial expressions, and make your face toward the center of camera.
● When recording your face or during face recognition, do not keep your face too close to or too
far from the camera.
Appendix Figure 1-2 Head position
90
Appendix Figure 1-3 Face distance
● When importing face images through the management platform, make sure that image
resolution is within the range 150 × 300 pixels–600 × 1200 pixels; image pixels are more than
500 × 500 pixels; image size is less than 100 KB, and image name and person ID are the same.
● Make sure that the face takes up more than 1/3 but no more than 2/3 of the whole image area,
and the aspect ratio does not exceed 1:2.
91
Appendix 2 Security Recommendation
Account Management
Service Configuration
1. Enable HTTPS
It is recommended that you enable HTTPS to access web services through secure channels.
2. Encrypted transmission of audio and video
If your audio and video data contents are very important or sensitive, it is recommended to use
encrypted transmission function in order to reduce the risk of your audio and video data being
eavesdropped during transmission.
3. Turn off non-essential services and use safe mode
If not needed, it is recommended to turn off some services such as SSH, SNMP, SMTP, UPnP, AP
hotspot etc., to reduce the attack surfaces.
If necessary, it is highly recommended to choose safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption and authentication passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up complex passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up complex passwords.
92
Network Configuration
Security Auditing
Software Security
Physical Protection
It is recommended that you carry out physical protection for devices (especially storage devices),
such as placing the device in a dedicated machine room and cabinet, and having access control
93
and key management in place to prevent unauthorized personnel from damaging hardware and
other peripheral equipment (e.g. USB flash disk, serial port).
94