Access Control Software - V2.3.2.11
Access Control Software - V2.3.2.11
Access Control Software - V2.3.2.11
Contents 1. Installation and Uninstall..................................................................... 7 1.1 Installs software......................................................................... 7 1.2 Uninstall software.................................................................... 12 2.1.1 Communication Setup .................................................. 14 2.1.2 Fingerprint Machine Information ................................. 17 2.1.3 Wiegand........................................................................ 18 2.1.4 Verification ................................................................... 20 2.1.5 Power Management ...................................................... 21 2.1.6 Access Control.............................................................. 22 2.1.7 Mifare Card .................................................................. 23 2.1.8 Other Setup................................................................... 24 2.2 Department Management ........................................................ 25 2.3 User Management.................................................................... 27 2.4. Load from the USB flash disk ................................................ 37 2.5 Management USB Flash Disk ................................................. 38 2.5.1 Load in the User Data................................................... 38 2.5.2 Export user data............................................................ 39 2.6 System Setup ........................................................................... 40 2.6.1 Automatic monitoring................................................... 41 2.6.2 Parameter of Server ...................................................... 42 2.6.3 Function Configuration ................................................ 42 3. Access Control Setup......................................................................... 43 3.1 Period Time ............................................................................. 43 3.2 Group....................................................................................... 44 Group Setting ........................................................................ 45 3.3 Unlock Combination ............................................................... 47 3.4 User Privileges ........................................................................ 48 3.5Holidays setting ........................................................................ 57 4. Base Operation .................................................................................. 62 4.1 Upload Setting......................................................................... 62 4.2 Upload Equipment........................................................... 62 4.2 Open Door ............................................................................... 65 4.3 Starting/Stopping Monitoring.................................................. 65 5. Query................................................................................................. 66 5.1 Record Query .......................................................................... 66 5.2 Alarm Record .......................................................................... 67
-2-
6. System Management ......................................................................... 68 6.1 Operator Management ............................................................. 68 6.2 System Operation Log............................................................. 69 6.3 Data Maintenance.................................................................... 70 6.3.1 Backup Database .......................................................... 70 6.3.2 Database Compress ...................................................... 71 6.3.3 Clear Old Data.............................................................. 71 6.4 Initialize System ...................................................................... 72 6.5 Set Database ............................................................................ 73 6.6 Set Password of Database........................................................ 75
-3-
About Software
Fingerprint Access Control, Access Control based on biometric solution from Granding is designed to help you with all solution which can be use with access control system to limit the areas where each person is authorized to go, it might every be good to know where an individual has been. Who is still doubt, among various biometric systems, the fingerprint recognition system takes up most of the market, because it is easy to use as well as economical and capable of developing various types of applications. The current software version is Version 2.0 and its main functions are as follows: l Multi-terminal networking, real-time monitoring
No matter Ethernet connection or 485 connections, fingerprint machine can be added into management software. After all fingerprint machines are added, click Start Monitoring and the system will start relative monitoring from the first unit to the last unit. l Real-time record download
Fingerprint records on each fingerprint machine can be downloaded in real time. After download, these records will be stored in database automatically. If there is a attendance software, you can set database directory of attendance software as directory of the database to store these records. Then you can check attendance records at any time. l Search records and output records in various formats
When there are many fingerprint records, you can search records. During search, various condition search functions are defined, such as ID of fingerprint machine, time period, department, etc. Also records can be outputted in various formats. l Upload Access control setting
This function is to upload basic Access control setting and user Access control setting.
-4-
Department management
After created department, in User Management you can assign employees to corresponding department. l User management
This function mainly includes downloading user and fingerprint, editing users information and privilege, creating password for user, using U are U fingerprint sensor to add new user, uploading user and fingerprint. l Remote open door
In program, you can click Open Door button to remote unlock the selected door l l l Synchronizing time
-5-
l l
This is the first step. Connect all fingerprint machines and PC together. Use RS232 cable to connect when distance doesnt exceed 15 meters. Under the condition of distance over 15 meters, it is recommended to use Ethernet connection.RS485 cable can be used for connection when distance exceeds 80 meters and can connect for 1000 meters maximally. l User management
This step is mainly to register each fingerprint machine or upload users. When there are many fingerprint records, it is recommended to use U are U Fingerprint Sensor to register users first. Then upload users to each fingerprint machine respectively. In user management, you can edit employees information, create password for employee and set corresponding privilege. l Access control management
For Access control, we define that all users are initialized as invalid user. User can become valid user in effective time period only after user is assigned privilege. So we need to upload Access control setting after we finish uploading users
-6-
-7-
This interface fully provide with three way the software apply to, there use method ability to be shifted by the setting, this software mainly apply to the access control, so select the a Access
-8-
Control Device as example, Choose Access Control Device . Click Next, enter follow interface
Please read this license Agreement carefully, if you agree to the terms, select the I accept... button and click Next. If you do not agree above terms, select I dont accept., the step will exit the installing program and return, enter following interface
-9-
This interface applies to locate the folder of the fingerprint access control software, you may use the default folder, also can create or select a folder, and Click Next enters following interface:
interface
This window is to confirm the folder which is created in Start/Program item. Click Next, display following Interface
- 11 -
After enter into this interface, it is show that you have finish all configured to setup, if want to modify it, Click Back to return, Otherwise click Install, the installing program will copy and write corresponding information into hard disk, After finish installation, click Finish to complete the process
setup, Access Control, Base Operation, Query, Help. The equipment must be added before using it.
- 13 -
2. Base Setup
In the portion of the Base Setup, include Department Management, User Management, Equipment Management, and Load from USB flash disk, System Setup and Exit
Communication type: Change to Serial Port/RS485 Machine num: Input number of fingerprint machine according to the own requirement. For example, number of fingerprint machine is set to 1, and its identify ID is set to Machine 1. Communication Key: it is not required to set under default condition. If communication password is set in fingerprint machine, then it is required to enter communication password correctly. Port Number: Select communication port number that connects PC and fingerprint machine. Default value is COM1. Baud Rate: Select 9600 (recommended) Note: Above settings are used for RS485 connection. If RS232 connection is used, then Baud Rate should be changed to 115200, which will increase communication speed greatly. Ethernet 2If the Ethernet communication mode is selected, shown as following
- 15 -
Name: Enter name according to the own requirement. For example, name is set to Machine 1. Communication key: it is not required to set under default condition. If communication password is set in fingerprint machine, then it is required to enter communication password correctly. IP address: Default value is 192.168.1.201. IP address can be changed according the network segment of local area network, but IP address cannot conflict with other IP address of any machine in the same local area network. Please notice that to fill IP address of fingerprint machine should remain the same IP address as that is edit in fingerprint machine. Port: Default value is 4370 (no change) There are two connection modes that have been described above. You can select different modes to connect devices as requirement by yourself. After finishing setting, click Test Connection button on the bottom to test connection . After Connection Success appears, click Save button to save the setting of this fingerprint machine. If Connection Failure, please check the setting both fingerprint machine and communication setting. You can use the
- 16 -
same method to add next fingerprint machine to system. After all fingerprint machines are added, an icon of fingerprint machine that has been added will appear in List on the left of Device Manager. If you want to edit the information of fingerprint machine, ability to read the setup of fingerprint machine firstly, then you can directly modify it, click Apply Setup button below to complete modifying. If you want to delete one fingerprint machine, select the fingerprint machine and click Delete button below. Read Option If you want to check connection information of one fingerprint machine, click Read Option to get connection information of that fingerprint machine.
Click Read Option, the base information of fingerprint machine will be list. Like following Figure
2.1.3 Wiegand
Click Wiegand in the Equipment Management, display interface is following:
- 18 -
Click Read Option to obtain all kinds of wiegand parameter which store in the fingerprint machine; there are four Defined Formats in the drag down volume to select. to choose a wiegand 26 or 44444444444444444wiegand 34 is avaliable. Defined Format: this format has been defined and built in the system; User doesnt need to define the length of Bit and the location of information. There are four default defined format: wiegand26 with device ID wiegand34 with device ID wiegand26 without device IDwiegand34 without device ID. The wiegand 26 with device ID means that the W26 output format along with equipment ID and the wiegand26 without device ID point that the W26 output format doesnt own the unit ID, Here the equipment ID is defined by following condition: if there is no set of the site code, then it will output machine code. And if the site code has been set, it will output the defined site code (which is similar the machine code, there different is that this code is defined by user and can recycle to use, range is 0-255) Fail ID: Export Fail ID after verified is failure, if it has been selected; its output range is 0-65534. Site Code: similar the machine code, which different is that this
- 19 -
code is defined by user and it can be recycled in different unit, range is 0-255) Self-define Format: User define Wiegand output format by herself Total Bit: the length of output format ID begin: The start location of the ID code in the total bit ID Bit: The length of ID code Pulse Width: the default value of to send pulse width time is 100s, if the controller isnt able to receive the Weigand signal, can adjust value from 20 to 800 Pulse Interval: the default value is 900 s, ability to adjust it from 200 to 20000.
2.1.4 Verification
Click Verification in the Equipment item to read setting, following interface display
biometric system administrator, which establishes the degree of correlation necessary for a comparison to be deemed a match. If the score resulting from template comparison exceeds the threshold, the templates are a match (though the templates themselves are not identical).the default value is high, you can modify it 1:1 Match Threshold: It mean that match fingerprint threshold after presenting the Card, the default value is high. Only Verification No. Card: It is mainly designed for ID card, if the item is choused as Yes, a user directly use ID card to verify enough, to verify procedure doesnt need to press fingerprint. If the item is choused as NO, you must verify fingerprint after present the card until pass Only 1:1 Match: This feature is only available to that an user own fingerprint, ID card or Mifare card for verification, can configure Only 1:1 Match, if the item is choused as Yes to this setup, to verify must first present a card, and then press fingerprint. If doesnt slide a card, there is no response to fingerprint in the unit. Must Register Mifare Card: there are two statuses to register a Mifare card, if the card was configured to Must Register, it is only to verify the user whos ID has stored in the fingerprint machine. The user No. to be store will not be verifying. When you choose the item as NO, no matter there are users ID information in the unit or not, it will export as the user and fingerprint template which is store in the card are verified successfully. You can change the option according you actual statue to achieve the best result.
- 21 -
Firstly read the parameter of Power Management, modify the state of Idle Setup and minutes of Idle Time, then click the Application Option to complete set. When the idle time is 0, then the idle setup function is invalid. When the value more than 0, the machine will enter into idle state after arrives at define time.
- 22 -
Delay time of lock control apply to determine unlock hour, the min measured unit is20ms, in the normal condition is 100200ms.
Mifare card Fingerprint First Sector: the first sector of Mifare card to store fingerprint Fingerprint Total Sector: fingerprint hold total sector. Password of card: Read and write password of card, you only can set it, cant obtain it.
This module provide with mainly convenience to configure equipment. Restart Unit: in the list, select a device and Click the name of the device to restart fingerprint machine. Clear Administer Privilege: this function can clear all administer privilege which has registered in the fingerprint machine. Firstly choose the name of the device from the list, then to do it
- 24 -
Upgrade Firmware: We remind that user doesnt use the function random, except user receive the manufactory notice, according to the guide which factory offer to do. Initialize Equipment: This function is mainly used to clear all data in the reader. Seize Fingerprint Image: This function can be used to view fingerprint image, if want to inspect fingerprint image, please place finger on the sensor window, don't move, and then click the button, and will see the fingerprint Date formats: Select the date formats from drag- drown box, this data formats appear on the starting interface of fingerprint machine. Voice function: Utilize this function to determine the prompt voice of the fingerprint device on or off.
- 25 -
Click department
or
After established a new department, if want to shift a staff to anther department, first select the head-office, then click Enrolling Department Staff button, pop-up following interface.
- 26 -
Select the staff of corresponding department and add it to column, click enroll staff button.
- 27 -
(1) User list Sort Order: Click the name of field. Choose a triangle symbol which is beside the field, according to ascending order to arrange when the triangle symbol point upwards, otherwise, the triangle symbol point downwards that means the sort order follow the descending order, you can click triangle symbol to change the rise or down rank. Statistic: the software can automatically count the total record and also can count grouping record. Left side is a user list and right side is a user maintenance setting area. If one staff is redeployed from a headquarter to other department, click corresponding the department from down drag buttons of Department, a dialog will appear and ask whether the staff is redeployed to this department or not. Here, you can set users privilege. If you want to change one user to other identity, for example an administrator, first select this user in list on the left and then select Administrator from down drag options of Privilege on the right. If you want to add password to one user, first select this user in list on the left and then click Set Password to add password. After this user is uploaded to fingerprint machine,
- 28 -
one user number will be added in password registration. Therefore, this user can not only use fingerprint, but also use password when identifying. (2) Enroll fingerprint State: this item will show every user enrolling State: (3)Import: This function can realize to import data, this importing software support all kinds of format users data file. This system support following format data to import MS ExcelMS AccessDBFXMLText FileCSV filewe recommend use the CSV file to import, the following example which take CSV file to import users data is used to illustrate how to import data. (1)First click the radio button of CSV file, then select the file that want to be import.
The left side list is a field list, the right side is a import file rank, there are Skip line(s) on the right-up part, that means want to skip amount of the line, if the first line to be import isnt material data, you can fill 1 here, that show to skip the first line to import data. Fields List Explain UserID The ID only is used in the system interior, it is useless to import the fields, please dont use the field BadgeNumber User code, this code is that user adopts the number in the fingerprint machine and the software. Name User name, these fields must exist. VerificationMethodUsers verification method. This item can be neglected. DefaultDeptIDDepartment ID. If you wan to import the data from other origin, this item can be neglected. Gender Males or Females TitleTitle
- 30 -
Photo Photo can be neglected PrivilegePrivilege can be neglected. Password Password can be neglected. CardNoID card number can be neglected. (3)First choose the field in the Fields list as to import, then select the corresponding rank in the right side list. The Fields list will automatically attach the corresponding number to the name of field, such as it is, arrange all fields and corresponding rank after to complete, click next. If you want to cancel a fields setup, first choose the field, and then click corresponding rank, the software will cancel this fields setup. (4)Click Execute button to run input operation. ExportThis function can realize that the software export users data via all kinds of format which can be support by the software. In order to it is convenient to supply third party to use. Following, take the exporting MS Excel file as an example to explain: Click the Export button, appear following interface 1. Select the object file which is to be exported
- 31 -
2Click Start Export button to export the file via default format, otherwise, can configure exporting content through to click the different option card. FieldsSelect the field to be export, the default format is all, it is only to export fields content after selected field. FormatsBe exporting format of defined all kinds of field value. Header & Footer The file is starting and ending of the text. Caption & WidthThe title and width of field Excel Options Set font Transfer Users Information and Fingerprint 5 Photo: There are two ways to attach photo, one way is directly import photo into the file, and other way is to utilize a
- 32 -
Enroll Fingerprint by The Fingerprint Sensor: To use U.are.U sensor can enroll user's fingerprint under the connecting condition, click shortcut + button to add new user in the staff maintenance item, choose fingerprint sensor to enroll fingerprint after finishing the enrollment procedure and close enrolling interface, the system will store the users fingerprint into the local Database, the new users info can be send to the fingerprint machine via From PC to Fingerprint machine. The enrollment interface like as following figure illustration.
Select the finger which want to be enrolled to enroll; if want to delete this fingerprint, please double click this finger.
- 33 -
Select a user you want cancel, Click shortcut - button to delete the user. Enroll Fingerprint by The Fingerprint Machine: Use the fingerprint machine to enroll. Select the fingerprint machine on the blank area, Click Connect Enrollment Equipment to connect fingerprint machine, after to connect successfully, the disconnection will appear, click Enroll to begin registration fingerprint. Note: this function only is used for black-write LCD fingerprint machine, Now the TFT Screen Fingerprint does not support this function. Enroll Mifare Card: Choose the user who wants to register the Maifare Card, then click Through Fingerprint Machine to Write Card, the software will remind Punch Card, to slide the card near an appropriate place in the fingerprint machine, after to show Write Card successfully on the unit, this user's code and the fingerprint will store in the card. Click Through Fingerprint Machine to Clear Card to delete user's data in the Mifare, the program remind Present Card, to slid the card near an appropriate place in the fingerprint Machine, after to notice Clear Card successfully to show the operation well. Note: this feature is available only to the fingerprint machine which support the Mifare card enrollment Fingerprint Register Status: to show the detail of user and fingerprint register Sort Order: can arrange the record according to the ascending or descending order in the record list, directly click the head of rank to achieve, following figure is the process of sort order which according to the name.
6
Form PC to Fingerprint Machine: the user which is store in the database will be uploaded to the fingerprint machine, click From PC to fingerprint machine, pop up the interface to upload users fingerprint.
- 34 -
UploadBase on your need, Select a staff and an uploading fingerprint machine, click Upload, it is able to upload users data to the defined fingerprint machine. NoticeUsers data include user information and fingerprint. Delete If you want to delete a user in a fingerprint machine, first choose user and corresponding fingerprint machine, and then click Cancel button. Operation LogThat is an error log during operating process BatchUtilize the function to speed up communication when there a lot of users are need to be uploaded, if there a few user, do not use it. (E.g... 30user) From Fingerprint machine to PC: The user which is store in the fingerprint machine will be downloaded to the local database, click From fingerprint machine to PC, pop up the interface to download users data.
- 35 -
Select a fingerprint machine No. to download users information which is on the left side list, click View User in the Fingerprint machine, it is able to display all user in the fingerprint machine, Select a user to be downloaded, click the Download button to download the user information and fingerprint from fingerprint machine to local database View User in the Fingerprint machineDisplay all users in the fingerprint machine DownloadDownload user data to be selected. Delete If you want to delete a user in a fingerprint machine, first choose user, and then click click button. BatchUtilize the function to speed up communication when there are a lot of users to be Downloaded, it isnt need to a few user. Note: this function only apply to Blackwhite LCD serial fingerprint machine, the TFT screen serial fingerprint machine do not support this
- 36 -
function. Operation Logthat is a error log during operating process NoteIn the process of the user management, if the fingerprint and user will be upload or download, the monitor function should be shut down firstly, if want to uploadthe download operation will be priors, the operation must enter user management once again.
Load in On the left side list choose the data you want load in. click Load in to load data to system.
- 37 -
Delete DataOn the left side list choose the data you want delete. Click Cancel to delete the data from system
Click Load the User Data from the USB disk button. The system will automatically search the user data and load it into the system from the USB flash disk, if a new use is found, the system will prompt whether add the new user to system or not. In the list the records with red color show this record do not
- 38 -
synchronization with data of software, click override to cover asynchrony data up by the data of computer. Delete Data of U Flash disk Delete user data of user data of U flash disk Clear List: clear list on left side
Left side is a department list. Ability to choose a department from the list, all staff information will be appear on the information list, Double click staff record or selected staff and click move the selected record to right side add an employee information in the right side. If there are a lot of staff record, ability to show all staff information of the staff to be queried through staff information query function. Maintained Staff Information
- 39 -
Add: Add a piece of information of staff. Modify: modify selected staffs information Delete: delete selected staffs information. Click export user data to U flash diskette. Then all record accessories in the ready exporting to U flash to data list will be exported to U flash disk
- 40 -
You can define a time to synchronize time of all fingerprint machines that have been added into device. Please pay attention to time format, such as 10:00
- 42 -
time interval. Valid time period for user unlocks: all day open (00:00-23:59) or time period with end time larger than start time. Click Time period from Drag-down menu of Access Control Setting, window of adding Time period will pop up. Click Add button and system will pop up a timetable from Sunday to Saturday. Here, you can define any time period you may use. Then click Confirm to save the time period automatically. If you want to use several time periods, continue to click Add. In addition, time period can be edited and deleted.
3.2 Group
Group function can divide users into groups and combine different
- 44 -
groups to different unlock combinations, which make group management of Access control more convenience. So user can define many unlock combinations. System has defined 5 groups: Group 1, Group 2, Group 3, Group 4, and Group 5. Under system default, new registered user is in Group 1 and can be re-assigned to other group. Under system default, a new registered user uses time period of Group 1. After the user is re-assigned to other group, the user uses default time period of the corresponding group. So please make sure to define default time periods for each group.
Group Setting
Entered the "group" setting ,there are two ways to enter: 1) Through bar options of the system menu: Access Control Settings -> Group, set up group access interface. 2) Through shortcuts button options of the system : Time Period, Enter the group setting interface. Enter the "group setting" interface, shown as following figure.
Group editing. left click item that need to edit with cursor to enter the editing state.
- 45 -
If you want to holiday Time Period take effective, selected it by cursor clicks, if you want the holidays is invalid, it can not selected.
- 46 -
- 47 -
3Click on "Edit Privilege" button and enter the Access Control Privilege to edit the interface, shown such following.
4 default users belong to Group 1, if need be assigned to other user groups, the need for users to re-allocation group. Here we illustrate:
- 49 -
No. 1 users assigned to Group 1. First selected No. 1 users, shown as following.
5 Click on the "Set Group" button and enter "the group setting" interface, select group 2.
6 through the above steps, the users will be assigned to the second group, shown as following.
- 50 -
7 follow the 4-6 steps, set up the group those users respective. After the setting completed, through ">/>>" button, a single or all of users will be moved to the right critical areas, waiting for the Privilege setting. Shown as following
8 in the equipment list choose the equipment that need to upload Privilege.
- 51 -
9 through ">/>>" button, single or all of the equipment will be moved to the right the critical region, waiting for Privilege setting. Like following equipment known as the NEW UNIT_1 , the equipment has been moved to the critical region, waiting for Privilege setting
10 after users and equipment is selected, click on "allows" button, the group Time period which is used by user in the critical periods will be assigned to the selected devices. After distribution is successful, prompt will appear shown as following
- 52 -
11 In the "User Access Control Privilege" interface, click "exit" button and enter the "Access Control Privilege Setting" and synchronize set up information of user groups will display in the list. Shown as following, NEW UNIT_1 in the No. 1 user group 1 Time Period.
2) Set up the Access Control Privilege When a user do not use group 1 if a user belongs to the group, but she/he does not use group Time Period, then in the "User Access Control Privilege" setting interface, select the Time Period to be used, shows as below, No. 10 users belong to the third group, but he/she does not use group Time Period, and use the 1,2,3 Time Period
- 53 -
2 After completing, in the "user Access Control Privilege" interface, click "exit" button and enter the "Access Control Privilege Setting" and synchronize set information of user groups will display in the list. shown as following, in the NEW UNIT_1 the No. 1 user use the 2 group Time Period. in the NEW UNIT_1 the No. 10 user use group 3 Time Period, the non-use group, but use 1,2,3 Time Period
1 After choose the user who will ready to be deleted and his group , move their to the critical areas, and moved equipment whose the Privilege will be deleted to the critical, shown as below, delete the No. 1 users in NEW UNIT_1 , who use the Group 2 Time Period .
2 Click on the "AccessDeny " button, the group Time Period the user use will be deleted in critical area from the selected equipment. After deleted successfully, the system will prompt shown as in the dialog box.
3 after completion, in the "User Access Control Privilege" interface click "exit" button and enter the "Access Control Privilege Setting" , and synchronize the set information of user groups will display in the list. shown as following , only in the NEW UNIT_1 the No. 10 user use group 3 Time Period, Do not use group, but use 1,2,3 Time Period
- 55 -
After assigned the privilege, ability to automatically produce a privilege table, click exit to exit, the following figure will appear
- 56 -
4 through shortcuts delete user privileges. in the Access Control Privilege setting interface, select the user to be removed , and then right click this item, the pop-up "delete" button. Click this button to delete users.
3.5Holidays setting
These steps is shown 1 entered the holidays set. Choose Access Control Settings -> holidays set. Shown as following.
2 Click on the "New" button, can add a holiday. The default date is the date you choose.
- 57 -
3 move the cursor to the "start date", it is start date to revise holiday,
5 moved the cursor to the Time Period to be set, choose the valid Access Control Time Period .
- 59 -
6 set is completed, click on the "Save" button, the setting will be saved. After complete assigned the user privilege, next step is to upload the user access control setup and the basic access control setup to fingerprint machine, exit to the main program interface, may see upload setup, must upload the privilege to N machine prior selecting N machine, if want to upload many fingerprint, may hold down Ctrl to select and click Upload setting again, a dialog box will pop-up, As counting the need to click confirm to upload Access Control Setup. Note: when the privilege is assigned to user, because all the group period time of users is defaulted as 1 group, therefore there are two kinds of situations occurring: 1st, user use group time period, designated a user in the left side user list (may hold down the Ctrl key to select), then click redistribute the group in the user privilege assign which the group is designated user . 2nd, user does not use the group time period and directly uses the time period, add a user to privilege distribution list in the right side , from three time period option in the top right corner the time period
- 60 -
- 61 -
4. Base Operation
The base operation fully provide with three sub-moduleUpload Setting, Open Door, Starting/Stopping Monitoring
Select the Access control setting which you want, the two kind of setting ability to be choused at same time
- 62 -
Select "upload set up" interface, there are two ways to enter: 1) through bar options of the system menu: basic operation -> upload settings, enter upload interface. 2) through the system shortcuts button options: upload settings, enter upload interface. There are two choices to upload interface elements, the basic setup and user Access Control Access Control setting, and it is better the two selected together at the same time to upload. This can choose to upload multiple machines.
- 63 -
Upload success, in its lower right corner the successful operation prompt will be displayed, shown as below
- 64 -
- 65 -
5. Query
These modules include record and alarm record
Click Output to output fingerprint records in various formats, such as Excel format, etc. this operation like as user management exporting operation.
- 66 -
When the fingerprint identify fail or the Duress fingerprint has been verified the alarm record will produce.
- 67 -
6. System Management
System Management includes that Operator Management, System Operation Log, Backup Database, Clear old Data, Initialize System and Set Password of Database. Eight sub-modules
Click AdministerPop-up the two item of Add Administer and Cancel Administer, and then pop-up a user list frame, Select a user to be add a administer, and the click Confirm to pop-up a distributing privilege list. Like as follow
- 68 -
Put a tick in front of the administer privilege, and then click Confirm. If want to cancel administer, click Administer firstly, and then click Cancel Administer to complete the operation process. It is able to modify administer password and operation privilege after a administer is added In the administer interface, Choose a administer and click modify, then follow the system prompt to click privilege to reset its privilege. If there is only one administer in the system, a administer want to be canceled, you firstly find the Database Att2000, and open the list of Userinfo, delete the field Securityflags
operation. Click Cancel, this operation is availed to delete operation log to the defined previous date, appear following figure.
- 70 -
- 71 -
Click the Menu to choose the date, and than Confirm to clear old data at once, then old record data will backup in the installation directory automatically. NoteThe delete content doesnt include the ending date be selected. You can choose the operation to backup record data which is before the close data to your folder.
- 72 -
- 73 -
Click button, Can select the database file, the default name is att200.mdb, according to real condition to renew setup of the database connection. SQL Server Database Connecting Setup First you should establish the empty database on the database server. you can find a script file with the name of sqlserver.sql in the directory of instating CD, the empty database is established in the front of the searcher of SQL Server, and then open the sqlserver.Sql script files, to run database which is to create this software. In the Provider Select Microsoft OLE DB Provider for SQL Server, click next or connect to enter this following interface
- 74 -
Confirm the server name for storing this database, information for logging on this serve, and the database name. After run test connection successfully Click (OK) button to complete settings
password, enter the set database password interface to input the new password once more.
- 76 -