ZKBioCVSecurity User Manual
ZKBioCVSecurity User Manual
User Manual
ZKBio CVSecurity
Version: 1.0.0
Date: March 2022
Software Version: ZKBio CVSecurity_2.1.1 and above
English
Thank you for choosing our product. Please read the instructions carefully before
operation. Follow these instructions to ensure that the product is functioning
properly. The images shown in this manual are for illustrative purposes only.
Trademark
is a registered trademark of ZKTeco. Other trademarks involved in this manual are owned by
their respective owners.
Disclaimer
This manual contains information on the operation and maintenance of the ZKTeco equipment. The
copyright in all the documents, drawings, etc. in relation to the ZKTeco supplied equipment vests in and
is the property of ZKTeco. The contents hereof should not be used or shared by the receiver with any
third party without express written permission of ZKTeco.
The contents of this manual must be read as a whole before starting the operation and maintenance of
the supplied equipment. If any of the content(s) of the manual seems unclear or incomplete, please
contact ZKTeco before starting the operation and maintenance of the said equipment.
It is an essential pre-requisite for the satisfactory operation and maintenance that the operating and
maintenance personnel are fully familiar with the design and that the said personnel have received
thorough training in operating and maintaining the machine/unit/equipment. It is further essential for
the safe operation of the machine/unit/equipment that personnel has read, understood and followed the
safety instructions contained in the manual.
In case of any conflict between terms and conditions of this manual and the contract specifications,
drawings, instruction sheets or any other contract-related documents, the contract
conditions/documents shall prevail. The contract specific conditions/documents shall apply in priority.
ZKTeco offers no warranty, guarantee or representation regarding the completeness of any information
contained in this manual or any of the amendments made thereto. ZKTeco does not extend the warranty
of any kind, including, without limitation, any warranty of design, merchantability or fitness for a
particular purpose.
ZKTeco does not assume responsibility for any errors or omissions in the information or documents
which are referenced by or linked to this manual. The entire risk as to the results and performance
obtained from using the information is assumed by the user.
ZKTeco in no event shall be liable to the user or any third party for any incidental, consequential, indirect,
special, or exemplary damages, including, without limitation, loss of business, loss of profits, business
interruption, loss of business information or any pecuniary loss, arising out of, in connection with, or
relating to the use of the information contained in or referenced by this manual, even if ZKTeco has been
advised of the possibility of such damages.
This manual and the information contained therein may include technical, other inaccuracies or
typographical errors. ZKTeco periodically changes the information herein which will be incorporated into
new additions/amendments to the manual. ZKTeco reserves the right to add, delete, amend or modify
the information contained in the manual from time to time in the form of circulars, letters, notes, etc. for
better operation and safety of the machine/unit/equipment. The said additions or amendments are
meant for improvement /better operations of the machine/unit/equipment and such amendments shall
not give any right to claim any compensation or damages under any circumstances.
ZKTeco shall in no way be responsible (i) in case the machine/unit/equipment malfunctions due to any
non-compliance of the instructions contained in this manual (ii) in case of operation of the
machine/unit/equipment beyond the rate limits (iii) in case of operation of the machine and equipment
in conditions different from the prescribed conditions of the manual.
The product will be updated from time to time without prior notice. The latest operation procedures and
relevant documents are available on http://www.zkteco.com.
ZKTeco Headquarters
Address ZKTeco Industrial Park, No. 32, Industrial Road,
The founders of ZKTeco have been determined for independent research and development of biometric
verification procedures and the productization of biometric verification SDK, which was initially widely
applied in PC security and identity authentication fields. With the continuous enhancement of the
development and plenty of market applications, the team has gradually constructed an identity
authentication ecosystem and smart security ecosystem, which are based on biometric verification
techniques. With years of experience in the industrialization of biometric verifications, ZKTeco was
officially established in 2007 and now has been one of the globally leading enterprises in the biometric
verification industry owning various patents and being selected as the National High-tech Enterprise for 6
consecutive years. Its products are protected by intellectual property rights.
All figures displayed are for illustration purposes only. Figures in this manual may not be exactly
consistent with the actual products.
Document Conventions
Conventions used in this manual are listed below:
GUI Conventions
For Software
Convention Description
Bold font Used to identify software interface names e.g. OK, Confirm, Cancel.
Multi-level menus are separated by these brackets. For example, File > Create >
>
Folder.
For Device
Convention Description
<> Button or key names for devices. For example, press <OK>.
Window names, menu items, data table, and field names are inside square brackets.
[]
For example, pop up the [New User] window.
Multi-level menus are separated by forwarding slashes. For example,
/
[File/Create/Folder].
Symbols
Convention Description
Not less than 500GB (the remaining space of the system disk is more than
hard disk
15GB)
At least one network card, the recommended network speed is not less than
Network card
1000Mbit/s
At least 21.5 inches, and the best resolution of the monitor is recommended:
1920 * 1080.
monitor
It is recommended to set the display resolution to 1920 * 1080. Using other
resolutions may cause the interface to be abnormal.
Instruction:
1. The number of live channels supported under the minimum configuration requirements:
2. In the video preview window, you can view the system CPU or memory usage in real time. If
the CPU reaches 80%, it is not recommended to increase the video preview window, which
will cause the video stream to freeze; if the CPU has reached 80% and the video window
does not meet the actual application, the system configuration needs to be improved.
Instruction
Before installing the software, it is recommended to close the anti-virus software in the system
to avoid failing the environment detection. If the antivirus software detects abnormality, you
can also choose to ignore it.
After running the application, there will be a few seconds of detection process, please be
patient. 。
STEP 2: Right-click the installation package installer, choose to run as an administrator, and the environment
detection tool will automatically perform system environment detection. If an abnormality is
detected during the installation process, the interface will give a prompt. The user can refer to the
prompt information to repair, and re-test after repairing until all the test items are passed before
proceeding to the next step.
STEP 4: Select "I agree to this agreement (A)" and click "Next".
STEP 5: After configuring the server port and other parameters, click "Next".
instruction
The default port is 8098, and the Adms service port defaults to 8088.
If the port is occupied, please modify the port number manually. When modifying, try
to avoid the occupied ports in the system, and can not overlap with the database port 5442,
redis port 6390, and 21 and 80 ports.
Check "Add firewall exception to this port" to prevent Windows Firewall from blocking
the program from running.
The https protocol is used by default.
STEP 6: After setting the installation directory, click Next.
instruction
The default installation path is C:\Program Files\ZKBioCVSecurityV6600. You can also click
“Browse” to customize the installation path. Please follow the interface prompts to
ensure that the selected installation path has enough disk space.
STEP 7: After setting the backup file storage path, click “Next”
instruction
The system scans the entire disk by default, locates the drive letter with the largest free
space, and creates a new SecurityDBBack folder. You can also click "Browse" to customize
the storage path of the backup file.
STEP 8: Click "Install" to start installing the software.
STEP 9: After the installation is complete, you will be prompted whether to restart the computer immediately
(the default is "Yes"). Click "Finish" to restart the computer to complete the software installation.
instruction
After the software installation is complete, it will take a long time (about 2 minutes) for
the service to start up. Please wait patiently for the service to start and then complete the
operation.
STEP 10: Enter the login page as shown in Figure 1-2, log in to the system.
The [Personnel] module can realize the input of basic information of personnel, and achieve
the function of adding, deleting and modifying personnel information. Before using other
modules, you need to complete the settings of the [Personnel] module.
This operation process is suitable for guiding users how to configure and manage the basic
personnel organization after the system is installed.
The flow of personnel organization configuration is shown in Figure 2-1.
There are two ways to configure new departments: batch import and single addition.
Batch Import:When users use the system for the first time, they have planned the organizational
structure of departments. When creating the organizational structure of the system, they can
add them manually in batches.
Single addition:When a small number of departments are added, they can be added individually.
Steps
Before adding departments in batches, you need to fill in the template file as required. After filling out the
template file, you can import and add departments in batches in the "Department" interface.
Instruction
The superior department is an important parameter to determine the company's organizational
structure, and the company's organizational chart will be displayed in the form of a department
tree in the system interface.
When importing, pay attention to the uniqueness of the department number. When the
department number is repeated, the result of import and addition will fail.
STEP 1: In the [Personnel] module, choose “Personnel Management > Department”.
STEP 2: On the department interface, select and click the "Import > Download Department
STEP 3: Open the department template file "department template.xls"; fill in the corresponding content in
the template according to the addition requirements, please refer to Table 2-1 for parameter
filling instructions.
Parameter Instructions
Department Number Customize the department number, support letters and numbers.
Superior department name The department name corresponding to the superior department
number.
Step 5: Click the "Browse" button to import the batch imported department template data into the
system, as shown in Figure 2-2.
STEP 6: Click "OK", and the interface displays the result of importing and adding departments.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Department”.
Step 2: Click "Add" with the mouse, and the interface for adding a department will pop up.
Step 3: In the interface of adding a department, fill in the corresponding parameters according to the
adding requirements, as shown in Figure 2-3. Please refer to Table 2-2 for the description of
parameter filling.
Parameter Instructions
Department Number Customize the department number, support letters and numbers.
Superior department name The department name corresponding to the superior department
number.
Steps
Step 1: In the [Personnel]module, choose “Personnel Management > Position”.
Step 2: Click "Add" with the mouse, and the new job interface will pop up.
Step 3: On the new job interface, fill in the corresponding parameters according to the adding
requirements, as shown in Figure 2-4; please refer to Table 2-3 for parameter filling
instructions.
Parameter Instructions
Job number Customize the job number for easy memory.
Senior position Select the corresponding senior position from the drop-down radio
box. If you need to cancel, click Selected again.
When users use this management system, they need to register personnel in the system, or add
personnel through equipment, or import personnel information from other software or
materials into this system.
System batch import and addition: When there are a large number of personnel and there are electronic
files, they can be added by manual batch import and addition.
Including importing personnel information, personnel
biometrictemplate data (optional), and personnel photos
(optional).
System registration personnel: When a small number of new personnel are added, they can be added
by registering a single person in the system by the administrator.
Equipment registration personnel: When a small number of personnel are added, the administrator or
user manually registers the personnel information on the
equipment that supports the registration machine function, and
synchronizes it to ZKBioCVSecurityV6600.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.
Step 2: On the personnel interface, select and click the "Import > Download Personnel Import
Template" button, select the parameters to be filled in, and download the template
"personnel information template.xls" locally. The parameter selection is shown in Figure 2-5.
Step 3: Open the exported template file "Personnel Information Template.xls" for adding personnel
information.
Step 4: In the personnel interface, select and click the "Import > Import Personnel Information" button;
in the "Import Interface", click the "Browse" button to import the batch import template into
the system, as shown in Figure 2-6.
Step 6: Click "Close" to complete the import and addition of personnel information.
Preconditions
1. The system needs to have the basic information files of the personnel in order to support the import
of biometric template data.
2. The biometric template data of the current system personnel has been obtained.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.
Step 2: On the personnel interface, select and click the "Import > Import Biometric Template Data"
button; in the pop-up import personnel biometric template data interface, click the "Browse"
button to import personnel biometric template data into the system in batches, as shown in
Figure 2- 7 is shown.
Step 3: Click "OK", the interface displays the import and addition results.
Preconditions
1. The system needs to have the basic information files of the personnel in order to support the import
of personnel photos.
2. The personnel photos of the current system personnel have been obtained and correctly named
according to the personnel number.
3. The photo requirements for personnel are as follows:
Image format: support .jpg, .png format.
Image size: The recommended image size is 35KB~200KB, and the maximum size of a single image
is 5MB.
Image quality: Faces in images are clear and not blurred by lens defocus or face motion. The
minimum image depth is an 8-bit grayscale image.
Pixels: The recommended value of face pixels is 80*80~200*200, and the distance between the
eyes should be greater than or equal to 60 pixels, preferably greater than or equal to 90 pixels.
Brightness and Contrast: The ambient illumination is not less than 300Lux, the image brightness is
uniform, the contrast is moderate, and the face has no invisible, no backlight, no reflection, no
overexposure, no underexposure and no yin and yang faces.
Attitude: The portrait is upright, looking straight ahead, the horizontal rotation angle of the face
should be within ±10°, the elevation angle should be within ±10°, and the tilt angle should be
within ±10°.
Blocking: Eyebrows, eyes, mouth, nose and facial contours should not be blocked by bangs, masks,
accessories, glasses, etc. The lenses of glasses should be colorless and non-reflective, and the
frames of glasses should not be too thick to block human eyes.
Face area: The face is complete, the outline and facial features are clear, and there is no heavy
makeup. The face area of the image should not be processed by PS.
Expression: Natural expression, neutral or smiling (no missing teeth), eyes open naturally, mouth
closed naturally, no obvious expressions such as laughter or frown.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.
Step 2: On the Personnel interface, select and click the "Import > Import Personnel Photo" button, as
shown in Figure 2-8.
1. After selecting the photo method, click "OK" to enter the interface of importing personnel
photos, select the photo and click "Start uploading", as shown in Figure 2-9.
2. After selecting the compression package method, click "OK" to enter the interface of
importing personnel photos, click "Browse" to select the file and then click "Start uploading", as
shown in Figure 2-10.
3. After the upload is complete, the interface displays the results of the imported personnel
photos.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel Management >
Personnel”.
Step 2: Click "Add" with the mouse, and the interface for adding personnel will pop up.
Step 3: On the personnel adding interface, fill in the corresponding parameters according to the adding
requirements, as shown in Figure 2-11; please refer to Table 2-4 for parameter filling instructions.
Description
The following requirements exist for face images:
− Picture format: Support .jpg and .png formats.
−Image size: The recommended image size is 35KB~200KB, and the
maximum size of a single image is 5MB.
−Image quality: The face in the image is clear and not blurred by lens
defocus or face motion. The minimum image depth is an 8-bit
grayscale image.
Super user: Super user can be verified on any access control device (the
highest priority), including interlock, anti-passback, normally closed time
period, etc.
Extend passage: If checked, the waiting time for this person to pass can be
extended.
Forbidden list: The person who checked the forbidden list fails to verify
after being identified in the device, and prompts that they are forbidden
to pass.
Set effective time: Set the temporary access control authority, and the
door can only be opened within the effective time. If it is not checked, the
default is always effective.
Attendance settings Attendance area: If the corresponding area is authorized, the personnel
will be sent to all devices in the corresponding area.
Attendance mode: Yes, the staff must follow the scheduling rules to check
in; No, the staff is automatically full, and there is no need to clock in.
Elevator control settings Authority group setting: You can customize the elevator control authority
group of the person. After selecting a department, the authority group set
by the department will be issued to the person by default.
Super user: Super user is not limited by time period, holidays, etc., and has
a high priority.
Set effective time: Set the temporary elevator control authority, and you
can press the elevator floor button only during the effective time. If not
checked, the default is always valid.
License plate registration License plate number: The license plate that the user needs to register,
multiple license plates can be added, and one person can add 6 license
plates.
Witness settings Issue authority: You can choose whether the person issues authority, the
default is "No"; the information can be viewed on the witness card
issuance interface in the witness card system.
Channel settings Permission group setting: You can customize the channel permission
group of the person.
Super user: Super user is not limited by time period, Anti-Passback, etc.,
and has a high priority.
Equipment operation authority: general staff, administrators, registrars.
General personnel can only verify on the device.
The administrator can enter the device menu and have the
operation authority of all menus.
The registrar can also enter the equipment menu and only has the
operation authority of equipment user management.
Information screen settings Information screen area: You can set the information screen area
corresponding to the person, and support multiple selection of
information screen areas
Identity category: Set the identity of the person on the information screen.
After verification, the prompts are different. There are three types:
ordinary, VIP, and banned list:
Normal indicates normal verification.
VIP has picture prompts such as applause.
Forbidden list will be prompted when verifying.
Details The fields in the detailed information are only for display and do not make
logical judgments.
Step 4: After filling in, click "OK" to complete the registration of this person.
Preconditions
On the computer terminal where the administrator registers the personnel information, connect the
fingerprint reader device through the USB port.
Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.
Step 2: Click "Add" with the mouse, and the interface for adding personnel will pop up.
Step 3: On the interface for adding personnel, click the " " button.
Step 4: (Optional) If the driver is not installed, click the icon to pop up the registration and driver
download box, download the driver and complete the installation.
Step 5: After the driver is installed, fingerprint registration can be performed, as shown in Figure 2-12.
Step 6: Select the fingers respectively, press the fingerprint on the connected fingerprint reader three
times in a row, and the system prompts the fingerprint to be registered successfully.
Step 7: Click "OK" to save and close the fingerprint registration interface.
Preconditions
Devices that support the enrollment function have been added to ZKBioCVSecurityV6600.
Steps
Step 1: In ZKBioCVSecurityV6600, set this access control tablet all-in-one machine as a registration
machine.
1. In the [Access Control] module, select "Device > Access Control Device".
2. Check the device that supports registration and choose to click "Settings > Set Registration
Machine" to pop up the setting registration machine interface.
3. Set the registration machine parameters, as shown in Figure 2-13.
Step 3: (Optional) Manually synchronize the personnel added to the device to ZKBioCVSecurityV6600.
Description
If the device has been set as the registration machine in step 1, and the network is kept unobstructed,
the new personnel on the device will be automatically synchronized to ZKBioCVSecurityV6600, and
this manual synchronization operation is not required.
If the registration machine is not set in step 1, or the network is disconnected during the period, it
may happen that the personnel data registered by the device is not uploaded to
ZKBioCVSecurityV6600. This synchronization operation step can be used to complete the uploading
of the personnel registered by the device.
1. In the [Access Control] module, select "Device > Access Control Device".
2. Select the device and choose to click "View and Acquire > Get Personnel Information" to pop up the
Get Personnel Information interface.
3. On the interface for obtaining personnel information, click "Start" to obtain personnel information, as
shown in Figure 2-14.
·
Figure 2-14 Obtaining personnel information interface
3. After the progress of personnel information acquisition is completed, click "Close" to complete the
synchronization of personnel data to ZKBioCVSecurityV6600.
Through the search method, the access control devices that have been set to point to the server can be
found, and the access control devices that have been searched can be added directly, which is convenient
to operate.
Preconditions
1. Before adding the access control device, perform IP allocation settings.
2. The device needs to set the server address in advance before searching and adding. The
configuration steps for the server are as follows:
a. In the access control device that has been connected to the power supply and the network, set it
directly on the device screen.
b. Select and click "Main Menu > Communication Equipment > Network Management Platform or
Cloud Server Settings"
c. Set the IP address and port of the current server, that is, the IP address and port of the current
ZKBioCVSecurityV6600 server, and complete the configuration to the server.
Steps
Step 1: In the [Access Control] module, select "Device > Access Control Device".
Step 2: On the device interface, click the "Search" button to pop up a search box.
Step 3: Click "Start Search" in the search box to display the access control devices that can be added, as
shown in Figure 3-2.
Step 4: Optional: Modify the IP address of the access control device, click "Modify IP Address", the
device will be restarted after modifying the IP address, and the IP address modification will be
completed after the restart.
Step 5: For the searched access control devices, click the "Add" button in the operation bar to add the
device; the device addition settings are shown in Figure 3-3, and the parameter settings are
described in Table 3-1.
New server address/port Set the IP address and communication port of the system to be
used (the default communication port is 8088).
Icon type Select the icon display type of the real-time monitoring interface:
door, channel.
Area Divide the device into regions and select the region to which the
device belongs.
Add to permission group The device is automatically added to the selected permission
group.
Delete data from device Set whether the original access control data in the device will be
when adding automatically cleared after the device is added.
Step 6: Click "OK" to complete the operation of adding access control devices. After the operation is
completed, the device will restart, and the device will be added after the restart is complete.
Step 7: Click "Close" to close the device search and add interface.
Access control rules are the core logic control part of access control, including door parameter
settings, time period settings, linkage settings, etc.
Operation Step
Step 1: In the [Access Control] module, select Devices > Door.
Step 2: In the management interface of the door, click the "Edit" button in the door operation bar to pop
up the door parameter setting box.
Step 3: In the door parameter setting interface, fill in the corresponding parameters according to the
addition requirements, as shown in Figure 3-4, please refer to Table 3-2 for parameter filling instructions.
instructions
The firmware of different access control devices supports different door parameters. Set the
parameters based on the actual door parameter page. Table 3-2 describes the parameter set
for different devices.
Device name/door number The basic information about the door is displayed. Reset is not
supported.
Name of the door Customize the name of the door for easy memory.
Not within the validity period of this door, even if the person has the
permission of this door, can not open the door inside.
Verify the way Set this parameter to the authentication mode supported by the device.
Lock drive duration Set the time range for unlocking a lock after authentication. For example,
if the value is set to 5 seconds, the door can be opened within 5 seconds
after the verification. If the door is not opened after 5 seconds, the door
will be automatically locked, and the door can be opened only after the
verification.
Weiganka format Select a Weigand card format that can be recognized by the door's
Weigand reader.
The card format and Settings are different, will not open the door;There
are 9 built-in formats in the software, the default is automatic matching
wiegand card format, automatic matching can identify a variety of
built-in wiegand card format.
Exit button state Set the status of the door exit button, locked, not locked. Lock: the door
lock does not open after pressing the exit button;Not locked: the door
lock is opened after pressing the exit button.
The exit button is delayed When the exit button is set to lock, set the delay time of the exit button,
that is, the delay time of the inspection door alarm after the exit button
is locked.
Effective time of exit button Select the time period for setting the exit button.
Magnetic door type Option No, normally open, normally closed, default none.
Behind closed doors to lock Set whether to lock back after the door is closed.
Magnetic door delay Set the delay for checking the door status sensor after the door is
opened. When the door is not "normally open", if it is open, it will start
timing, alarm will start after the door magnetic delay time, and alarm will
be cancelled when the door is closed.
Duration of Anti-Passback entry Set a limit on how long an intelligent entry can take.
Stress the password Set up the user to open the door when the threat password. An alarm
will be generated when the coerced code opens the door.
Emergency code Set a password for the user to use in an emergency. The password is
used by the administrator and is valid in any period and authentication
mode.
The door is normally open Select the time when this door is normally open.
Extended time of passage Set on the basis of the original opening time, additional limit time.
Common terms for participants, inconvenient personnel to extend the
passage time.
Open time delay Set the time for waiting for the delayed door opening after
authentication.
Disable alarm reminder If alarm event occurs on this door, whether there will be alarm sound
reminder on the real-time monitoring interface.
Allow superuser access when the Set whether the super user can verify access when the door is locked.
door is locked
The above Settings are copied to To set the door parameters above, the options are all doors of the
current device, all doors of all devices.
Operation scenario
After the camera is bound, if related Settings are set during linkage, the Reader/auxiliary input will
perform video linkage (capture) once corresponding events occur. The Reader and auxiliary input bind
cameras in the same way. This section uses the Reader as an example to describe how to bind cameras.
Operation Step
Step 1: In the access Control module, choose Device > Reader.
Step 2: In the Operation column of the corresponding Reader, click Bind/Unbind camera. The bind/unbind
camera page is displayed.
Step 3: On the Select Reader screen, set the Reader as required, as shown in Figure 3-5.
Operation Step
Step 1: In the access Control module, choose Access Control > Time Range.
Step 2: Click "Add", the interface for adding time segments is displayed.
Step 3: The time segment page is added. Set the content based on the new requirements, as shown in
Figure 3-6.For parameter Settings, see Table 3-3.
Time interval Set the start time and end time for each time range.The time
period includes one week and three holiday-type time periods.
Copy Monday's time You can quickly copy your Monday Settings to other weekdays.
to other weekdays
Operation Step
Step 1: In the access Control module, choose Access Control > Holidays.
Step 3: When a page is added during holidays, set the content as required, as shown in Figure 3-7.
Type of Holidays The holiday type can be: Holiday type 1, Holiday type 2, holiday type
3.Set holiday type to time Range.
According to the Set whether this holiday cycle by year: yes, no.
annual circulation
For example, if New Year's Day is January 1, set this parameter to
Yes.Mother's Day falls on the second Sunday in May. If the date is
uncertain, set it to No.
Operation Step
Step 1: In the [access Control] module, choose "Access control > Interlock" and click Add.
instructions
When you add a device for which interlock has been configured, the device cannot be
found in the drop-down list. After the configured interlock information is deleted, the
device is returned to the drop-down list.
Interlock Settings vary with the number of doors controlled by the device:
- Single-door controller: no interlock setting
- Dual door controller: 1-2 two door interlock Settings
- Four-door controller: 1-2 two-door interlock, 3-4 two-door interlock, 1-2-3 three-door
interlock, 1-2-3-4 four-door interlock, 1-2 and 3-4 door interlock
Step 3: Select the interlock rule, select -, and click OK to complete the Settings, as shown in Figure 3-8. The
new interlock Settings are displayed in the list.
Step 2: Optional: In the "System Management" module, choose "System Management > Mail Management"
to set the sender server. The Step of setting the sender server is as follows:
1. In the "System Management" module, choose "System Management > Mail Management".
2. Click "Sender Server Settings" to pop up the sender server Settings interface.
3. On the Sender server Settings screen, set parameters as required, as shown in Figure 3-9.For
parameter Settings, see Table 3-5.
Email server The email products that provide the SMTP server can be used, such
address/port as NetEase 163 email, Tencent QQ email, and Foxmail email. The
specific address and port configurations must be obtained from the
corresponding provider.
Name of sender Sets the name of the sender on the received message.
4. After setting, click "Test connection" to receive the email, indicating that the test has passed.
5. Click "OK" to finish setting email parameters.
Operation Step
Step 1: In the access Control module, choose Access Control > Linkage.
Step 2: On the linkage setting screen, click Add, as shown in Figure 3-10. Table 3-6 and Table 3-7 refer to the
linkage parameters.
Linkage departure Select the condition triggered by the linkage Operation, that is, the
condition event type generated by the selected device.
You can set the linkage action, including Operation, video linkage,
Linkage action
and email. Table 3-7 describes the configurations of the three
Setting
modes.
The output point of Set the output action type: close, open, normally open.
Operation Sets the delay time if the output action is on.
Operation Step
Step 1: In the [access Control] module, choose "Access Control > Anti-Passback" and click Add.
instructions
When you add an Anti-Passback device, the configured Anti-Passback device is not
displayed in the device list. After the antisubmarine information is deleted, the device
returns to the device list.
The Anti-Passback setting varies with the number of gates controlled by the equipment:
- Anti-Passback setting of single door controller: Anti-Passback between reading heads
- Two controllers: door 1 Anti-Passback between reading heads, door 2 Anti-Passback
between reading heads, door 1 and door 2 Anti-Passback
- Four door controllers: door 1 and door 2 Anti-Passback, door 3 and door 4 Anti-Passback,
door 1/ door 2 and door 3/ door 4 Anti-Passback, door 1 and door 2/ door 3/ door 4
Anti-Passback, door 1 and door 2/ door 3/ door 4 Anti-Passback, door 1/ door 2/ door 3/
door 4 Anti-Passback reading head
Step 3: Select the Anti-Passback rule and click "OK" to complete the Settings, as shown in Figure 3-11. The
new Anti-Passback Settings are displayed in the list.
Operation Step
Step 1: In the [access Control] module, choose "Access control > First person normally Open" and click Add.
Step 2: Select the specified device, add Settings for the specified door, and select the normally open time
period, and click 'OK', as shown in Figure 3-12.
Step 3: Click "Add People" on the interface of "Opening of the first person". After adding people, click "OK"
to complete the setting of "opening of the first person", as shown in Figure 3-13.
Operation Step
Step 1: In the [access Control] module, choose "Access Control > Multiple Door Opening Personnel Group"
and click Add. After filling in the corresponding parameters, click "OK" to save the settings.
Step 2: Click "Add Personnel" on the right of the list of created multi-person door opening personnel, select
the personnel to be added to the group in the pop-up function, and click "OK" to save the settings,
as shown in Figure 3-14.
Step 3: In the multi-person door opening interface, click "Add", set permissions for multi-person door
opening personnel group.
Step 4: On the page for adding multiple door users, select the specified door, group information for
multiple door users, and the number of verification personnel for each group, and click OK to save
the settings, as shown in Figure 3-15.
Step 5: In the Access Control module, choose Access Control > Authentication Mode Rule and click Add to
set the access control authentication rule for the corresponding period, as shown in Figure 3-16.
Figure 3-16 Adding the configuration of the multi-party door opening verification rule13
Step 4: Click Add Door on the right of the created authentication mode rule, select a door, and set the
authentication mode rule for the door, as shown in Figure 3-17.
Figure 3-17 Verification rule configuration for adding multiple door openers
Step 5: In the Access Control module, choose Access Control > Authentication Mode Rules Personnel Group,
click Add Personnel, and assign authentication rules to personnel, as shown in Figure 3-18.
Operation Step
Step 1: In the access Control module, choose Access Control > Access Control Permission Group.
Step 2: Click Add in the left column, and the page for adding access control permission groups is displayed.
Step 3: On the page for adding access permission groups, set parameters based on the new requirements,
as shown in Figure 3-19.For parameter Settings, see Table 3-8.
15
Access control Select the configured access time range to define the valid access
period time range for this permission group.
area Select the configured area from System > System Management >
Area Settings and define the area to which the access control group
belongs.
Operation Step
Step 1: In the access Control module, choose Access Control > Access Control Permission Group.
Step 2: Click Add Door, and the page for selecting a door is displayed. Add a door as required, as shown in
Figure 3-20.
Step 3: Click “OK” to finish configuring the door for the access control right group.
Operation Step
Step 1: In the access Control module, choose Access Control > Set by permission Group.
Step 2: In the Operation column of the corresponding permission group, tap Add Personnel. The Add
personnel page is displayed. Select personnel as required, as shown in Figure 3-21.
Operation Step
Step 1: In the [access Control] module, choose "Access control > Settings by Personnel".
Step 2: In the Operation column of the access control group, click Add Access Control group. The page for
adding access control groups is displayed. Select the access control group as required, as shown in
Figure 3-22.
Operation Step
Step 1: In the access Control module, choose Access Control > Set by department.
Step 2: In the Operation column of the access control group, click Add Access Control group. The page for
adding access control groups is displayed. Select the access control group as required, as shown in
Figure 3-23.
Operation Step
Step 1: In the [access Control] module, choose "Advanced Access Control > Access Control Area" and click
"Add".
Step 2: On the page that is displayed, set related parameters, and tap OK, as shown in Figure 3-24.
Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > Read Head Definition" and
click “Add”
Step 2: On the page that is displayed, set related parameters and tap OK, as shown in Figure 3-25.
Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > View Personnel in the Area"
Step 2: On the page for viewing personnel in a region, you can select the area on the left to view and delete
personnel in the area, as shown in Figure 3-26.
Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > Global Anti-Passback" and
click Add
Step 2: On the page for adding global Anti-Passback Settings, set related parameters and click OK, as shown
in Figure 3-27. For parameter description, see Table 3-9.
Entrance guard area Select an option from the Access Control Area drop-down list box.
The door list controls The corresponding door information is displayed.The same gate
access to the access shall not be used to control two independent Anti-Passback
control area boundaries.
instructions
Logical Anti-Passback: strictly follow the "one in, one out" rule in the
Anti-Passback area, otherwise the verification will not open
Timed logical Anti-Passback: the user can open the door normally
only after following the exit and entry rules of logical
Anti-Passback.Timing logic antisubmarine is only used in abnormal
situations.For example: if the logical Anti-Passback time is set and
the personnel follows others out, the personnel cannot swipe the
card machine within the set locking time. The Anti-Passback state
will be reset after the set locking time, and the traffic can continue.
The locking time You can set the locking period only when you select timing
Anti-Passback or logic Anti-Passback type.
Reset global Clear the Anti-Passback status of personnel in the system and restore
Anti-Passback status the initialization status.
Reset Anti-Passback The reset time can be selected only when reset global Anti-Passback
time status is selected.
Applied to the All personnel, selected personnel, except selected personnel three
types:
Instructions
All personnel: This type can only be edited. Personnel selection is not
supported
Selected Personnel: If you select this type, you can add personnel.
This Anti-Passback type takes effect only for these personnel.
Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Global Linkage and click Add.
Step 2: On the page for adding global linkage, set related parameters and tap OK, as shown in Figure 3-28.
Table 3-10 describes the parameter description to complete global linkage Settings.
It works for everyone After this parameter is selected, the linkage Settings take effect on all
personnel
Linkage trigger Select the condition triggered by the linkage Operation, that is, the
condition event type generated by the selected device
Video linkage Pop-up video and display duration: Select pop-up video on the
real-time monitoring screen and set the pop-up duration.
Valid time The reset time can be selected only when reset global Anti-Passback
status is selected
mail Set the email address that receives the linkage content when a
linkage event occurs
Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Global Interlock Group and click Add.
Step 2: On the page for adding a global interlock group, set related parameters and click OK, as shown in
Figure 3-29.
Step 3: On the global interlock group page, tap Add Door next to the configured group name on the left, as
shown in Figure 3-30.
Step 4: In the access Control module, choose Advanced Access Control > Global Interlock and click Add.
On the page for adding global interlock, set related parameters and click OK, for example
Step 6: On the global interlock screen, click Add Group next to the configured global interlock on the left, as
shown in Figure 3-32.
Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Effectiveness of Personnel > Set
Access Control Area Properties, and click Add.
Step 2: On the access control area properties page, set related parameters and click OK, as shown in Figure
3-33.
Step 3: In the properties of the access control area that has been set, click Add Personnel on the left to add
the corresponding personnel, and click OK, as shown in Figure 3-34.
Step 4: On the personnel validity screen, tap Add, set related parameters, and tap OK, as shown in Figure
3-35.
Operation Step
Step 1: In the [access Control] module, choose "Advanced Access Control > Number Control" and click
Add
Step 2: On the Add Person control screen, set related parameters and tap OK, as shown in Figure 3-36
3.7 Results
Operation Step
Step 1: Check whether the device is online.
1. In the access Control module, choose Access Control Device > Real-time Monitoring.
2. Check whether the icon status of the added device is online. For details about the icon status, see
Table 3-11.
Note: If there is no relay status, the current firmware does not support the "Check
relay Status" function.
Table 3-11 Description of door types10
1. Select the online door device, click "Remote door opening", enter the user password in the pop-up
security verification, and click "OK".
2. On the remote door opening screen, enter the time to open the door and tap OK, as shown in Figure
3-37.
3. If "Operation succeeded" is displayed, the remote door opening Operation is complete.
Introduces the configuration steps of searching for additional channel devices in ZKBioSecurity.
Precondition
1. Set up IP allocation before adding channel devices.
2. Before searching and adding the device, it is necessary to set the address pointing to the server in
advance, and set the IP address and port of the current server, that is, the IP address and adms port
installed by the current.
Operating steps
Step 1: In the Channel module, select Device Management > Devices.
Step 2: In the device interface, click "Search" to pop up the search box.
Step 3: Click "Start Search" in the search box to display the channel devices that can be added, as shown
in Figure 13-3.
Step 4: For the channel Device found, click the "Add" button in the operation bar to add the device, and
fill in the parameters of device addition, as shown in Figure 13-4. Please refer to Table 13-2 for
parameter description.
Delete data in device when When the device is added, the data in the device
adding except the event record is deleted.
--End
Gates added to the system should be set in the form of permission groups. Set the corresponding
permission group, add gates to the permission group, and define the area where the permission group
belongs.
Introduces the steps of creating and configuring the access control authority group in ZKBioCVSecurity.
Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Gate Permission Group". In the gate
permission group interface, click "Add" in the left column of the mouse to pop up the gate
permission group adding interface.
Step 2: In the new interface of gate permission group, set the corresponding content according to the
new requirements, as shown in Figure 13-5; Please refer to Table 13-3 for parameter filling
instructions.
Step 3: Click "OK" to complete the configuration of the access control authority group.
Step 4: In the gate permission group interface, click "Add Gate" on the right side of the created gate
permission group, and the interface of selecting Add Gate will pop up, and the corresponding
gate will be added according to the requirements, as shown in Figure 13-6.
--End
Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Setting by Permission Group".
Step 2: Click "Add Person" in the operation bar of the corresponding permission group to open the
interface of adding person. Select the corresponding person as needed, as shown in Figure 13-7.
--End
At present, it supports Anti-Passback in and out. On some occasions, people who require card swiping
verification must swipe their cards from another channel when they come in from one channel, and the
card swiping records must be strictly corresponding to one entry and one exit. Users can use this function
when they enable it in settings, which is generally used in special units, scientific research, bank vaults
and other occasions.
This paper introduces the configuration steps of adding Anti-Passback effect in.
Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Anti-Passback" and click Add.
Description
When adding Anti-Passback, you can't see the device that has been set up in Anti-Passback in the
device list. After deleting the set Anti-Passback information, the device returns to the device list.
Anti-Passback settings of all-in-one machine: Anti-Passback, Anti-Passback and Anti-Passback.
Step 3: Select the Anti-Passback rule and click 'OK' to complete the setting, as shown in Figure 13-8. The
newly added Anti-Passback settings are displayed in the list of selected Anti-Passback rules.
--End
After a specific event is triggered at a certain input point in the channel system, a linkage action will be
generated at the specified output point to control the events such as verification opening, alarm and
anomaly in the system, which will be displayed in the corresponding event list monitored.
Precondition
Before linking new configurations, you need to do the following:
Gate device, input point, output point, read head binding camera add settings.
Mailbox parameter configuration
Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Linkage".
Step 2: In the linkage setting interface, select and click the "Add" button to fill in the corresponding
parameters, as shown in Figure 13-9. Please refer to Table 13-4 and Figure 13-5 for linkage
parameters.
Linkage Select the condition under which the linkage operation is triggered,
departure that is, the type of event generated by the selected device.
conditions
Input point Select the input point to set the device input.
Output point Select the output point to set the output of the device.
Video linkage Pop-up video, display duration: check the pop-up video in the
real-time monitoring interface, and set the pop-up duration.
Mail Set the email address of the received linkage content when the
linkage event occurs.
--End
Set the passage time period and passage mode of the gate, so that the gate can set different entry and
exit passage modes in different time periods. It can be applied to wing Barrier and swing Barrier.
This paper introduces the configuration steps of gate traffic rules in ZKBioCVSecurity.
Operating steps
Step 1: In the "Channel" module, select "Channel Settings > Gate Traffic Rules".
Step 2: Click "Add" with the mouse, and the interface for adding gate traffic rules will pop up.
Step 3: In the new interface, set the corresponding contents according to the new requirements, as
shown in Figure 13-10; Please refer to Table 13-6 for parameter setting instructions.
Remarks The explanation of the current time period and the main
application occasions shall consist of 5 0 characters at most.
Time interval A gate passage rule contains up to five time intervals in a week.
Time Set the start and end time in each time interval.
interval-start/end
time
Time interval-traffic Set the traffic mode in each time interval and select it from
mode drop-down.
Copy Monday time You can quickly copy Monday settings to other workdays.
to other working
days
Step 4: Click "OK" to complete the addition of the gate traffic rules.
--End
Operating steps
Step 1: In the Channel module, select Channel Settings > Wing Barrier.
Step 2: In the wing Barrier interface, click the "Edit" button under the name or operation of the wing Barrier
to enter the wing Barrier parameter editing interface, as shown in Figure 13-11. Please refer to
Table 13-7 for parameter description.
Gate traffic rules Drop-down selection to select the data of gate traffic rules.
Opening Low speed, medium speed and high speed, set the speed of opening
speed/closing speed and closing the gate.
Delayed shutdown After passing through the last pair of infrared channels, set the delay
time closing time. You can set 0 to 10s, and the default is 0s.
Unmanned time The maximum waiting time after verification is 5 ~ 60s, and the
default value is 10s. If no pedestrians pass beyond the set time, the
gate will be closed.
--End
This paper introduces the parameter configuration steps of swing Barrier in ZKBioCVSecurity.
Operating steps
Step 1: In the Channel module, select Channel Settings > Swing Barrier.
Step 2: In the swinging interface, click the "Edit" button under the swinging name or operation to enter the
swinging parameter editing interface, as shown in Figure 13-12. Please refer to Table 13-8 for
parameter description.
Gate name The gate name corresponding to the swing gate device is generally
one all-in-one device corresponding to one gate, which cannot be
edited.
Gate traffic rules Drop-down selection, the option is taken from the data of "Channel
Settings" > "Gate Traffic Rules".
Opening Low speed, medium speed and high speed, set the speed of
speed/closing opening and closing the gate.
speed
Delayed shutdown After passing through the last pair of infrared channels, set the
time delay closing time. You can set 0 ~ 10s, and the default is 0s.
Unmanned time The maximum waiting time after verification is 5 ~ 60s, and the
default value is 10s. If no pedestrians pass beyond the set time, the
gate will be closed.
--End
13.6.1 Report
In the Channel report, you can query the All Records, Today's Access Records, Person's Last Access
Location, and All Exception Records reports. You can choose to export all or export records after querying.
This paper introduces the configuration steps of report query and export in, taking "all records" report
operation as an example.
Operating steps
Step 1: In the Channel module, select Report > All Records.
Step 2: In the All Records interface, fill in the corresponding query information and click the 'Query'
symbol to complete the query of all record tables, as shown in Figure 13-13.
Step 3: In the full record interface, click "Export", enter the user password in the pop-up security
verification, and click "OK". Select whether to encrypt and export the file format, and click OK, as
shown in Figure 13-14.
Step 4: After selecting the address where the corresponding file is stored, the export of the file can be
completed.
14 Temperature Detection
Under the epidemic situation, the device measures the body temperature of real-time monitoring
personnel, alarms and monitors the abnormal body temperature records, and summarizes and
warns these records, so that managers can take timely measures and play an active role in epidemic
prevention.
Precondition
In "Access Control Management", add device supporting body temperature detection, please refer to
3.3 for adding device.
Operating steps
Step 1: In the Access Control module, select device > device.
Step 2: After selecting the device, click "Settings > Setting Extension Parameters" to pop up the interface.
Step 3: In the interface of setting extended parameters, you can view the epidemic prevention
parameters on the device, as shown in Figure 14-2. Please refer to Table 14-1 for parameter
configuration.
Description
Epidemic prevention parameters are set and changed on the device side.
Parameter Description
Body temperature Open: turn on the temperature measurement function
detection attribute
Close: Turn off the temperature measurement function
Abnormal body Open: abnormal body temperature passes
temperature is
Close: Abnormal body temperature does not pass
impassable
Upper limit of Set the threshold of device body temperature, if it exceeds, the
temperature detection body temperature will be abnormal
threshold
Precondition
In the "Epidemic Prevention" module, select "Epidemic Prevention Management > Parameter Setting"
to set the temperature threshold setting, which is used for the data statistical basis in the epidemic
prevention report, as shown in Figure 14-3.
Operating steps
Step 1: In the "Epidemic Prevention" module, select "Epidemic Prevention Management > Real-time
Monitoring".
Step 2: After opening the real-time monitoring interface, carry out temperature measurement
verification on the temperature measuring device.
Step 3: In the real-time monitoring interface, events are generated, and data are displayed correctly,
which represents the completion of epidemic prevention management business configuration,
as shown in Figure 14-4.
--End
15 Intelligent Scene
Scene Description
The "Intelligent Scene" module focuses on intelligent scene business, and realizes design concepts such
as enabling application, data analysis, process management and access control linkage based on scene
application and data display through the perception and analysis ability of intelligent NVR or Intelligent
cameras, providing intelligent and convenient intelligent scene solutions for small and micro customers.
The whole module includes three menus: scenario application, business configuration and report. Scene
application includes target finding, key personnel monitoring, Tailing Detection monitoring, Perimeter
Protection, leaving the post and leaving the post, and number control functions.
Operation scenario
Taking personnel name, ID and certificate number as retrieval conditions or uploading personnel pictures,
the intelligent scene event records of personnel within a certain time range are searched and the
corresponding trend report is generated.
Operating steps
Step 1: In the Intelligent Scenario module, select Scenario Application > Target Finding.
Step 2: In the target search interface, fill in the time period and data source, enter the name or job
number of the person in the search box and click "Search" to find the target, as shown in Figure
15-2.
Step 3: After the retrieval, the retrieval results appear, as shown in Figure 15-3.
Step 4: In the retrieval result, you can click "Generate Trend Report" in the upper right corner of the
interface to export the trend report in PDF format, as shown in Figure 15-4.
Description
---- End
Operating steps
Step 1: In the [Intelligent Scene] module, select "Scenario Application > Target Search".
Step 2: In the target search interface, click the icon, in the pop-up interface, select the personnel picture
on the local computer, click OK, and directly jump to the target search interface, as shown in
Figure 15-5.
Step 3: After the search is over, the search results will appear, as shown in Figure 15-6.
Step 4: In the search results, you can click "Generate Trend Report" in the upper right corner of the
interface to export the trend report in PDF format. The export trend report interface is shown in
Figure 15-7.
Description
---- End
15.3 Preset
Intelligent scene detection based on video face recognition function, need to set specific function
detection time period.
Operating steps
Step 1: In the “Intelligent Scenario” module, select "Service Configuration > Time Period".
Step 2: Click the "Add" button and set the daily time period in the pop-up time period new function
pop-up window, as shown in Figure 15-8.
---- End
Introduces the operation of the personnel list library creation function set in the key personnel
monitoring pre-set.
Operating steps
Step 1: In the “Personnel” module, select "Personnel Management > List Library"
Step 2: Click "Add", configure the relevant parameters, and complete the new list library, as shown in
Figure 15-9.
Step 3: Click the "Add Person" button on the right side of the list database information to add the
personnel registered to the system to the list database, as shown in Figure 15-10.
---- End
Introduce the operation steps to realize the key personnel monitoring function.
Operating steps
Step 1: Introduce the operation steps to realize the key personnel monitoring function。
Step 2: Click the "Add" button on the application configuration interface, and in the pop-up new
function pop-up window, select the "Key Personnel Monitoring" option page, and set the
corresponding control detection conditions, as shown in Figure 15-11. For parameter
descriptions, please refer to Table 15 -1 shown.
Effective time The key personnel monitoring strategy detection period. Only the
period time period list can test the content of "16.4 Pre-settings".
---- End
Operating steps
Step 1: In the “Intelligent Scenario” module, select "Scenario Application > Key Personnel Monitoring".
Step 2: The information displayed on the "Key Personnel Monitoring" interface is the real-time monitoring
information of the control settings that have taken effect in the system, as shown in Figure 15-12,
and the interface description is shown in Table 15-2.
The total number of The curve chart visually displays the occurrence trend of key
snapshots and the situation personnel monitoring events, including four-time dimensions of
day, week, month, and year. 。
---- End
Operating steps
Step 1: In the “Intelligent Scenario” module, select "Service Configuration > Application Configuration".
Step 2: In the “Intelligent Scenario” module, select "Service Configuration > Application Configuration".
Effective time Set the effective time period of the Tailing Detection monitoring function,
period and the time period list can refer to the content in "15.4 Pre-settings".
Binding Door Binding Door Select the door information bound to the camera with the
Tailing Detection monitoring function.
Binding Channel Select the channel information that the Tailing Detection monitoring
function is bound to the camera.
---- End
Operating steps
Step 1: In the "Intelligent Scenario" module, select "Scenario Application > Tailing Detection Monitoring".
Step 2: Perform real-time monitoring and viewing of relevant records according to the Tailing Detection
monitoring doors, as shown in Figure 15-14.
---- End
Operating steps
Step 1: Access the camera background, set the line statistics and draw lines, as shown in Figure 15-15.
Figure 15-9 Set the camera over-the-line statistics to draw the line
Step 2: In the "Intelligent Scenario" module, select "Service Configuration > Application Configuration".
Step 3: In the application configuration interface, click the "Add" button, select the "Perimeter
Protection" tab, and set the relevant parameters, as shown in Figure 15-16. For parameter
descriptions, please refer to Table 15-4.
Effective time Set the effective time period of the Tailing Detection monitoring
period function, and the time period list can only test the content of "15.4
Pre-settings".
---- End
Operating steps
Step 1: In the "Intelligent Scene" module, select "Scenario Application > Perimeter Protection".
Step 2: View real-time monitoring data on this interface, as shown in Figure 15-17.
---- End
Preconditions
The camera supports (D series) and the Population Density function parameter is turned on. See
"Population Density"
Operating steps
Step 1: Log in to the camera settings interface, select the "Population Density" tab in the "Advanced
Configuration > Intelligent Analysis > General Intelligence" interface, and check to enable the
Population Density function, as shown in Figure 15-18.
Step 2: In the “Intelligent Scenario” module, choose Scenario Application > Retirement.
Step 3: Click the location to be configured on the Attendance Checking and off-duty monitoring
application configuration interface, click the "Add" button, select the "Cross Line Fence" tab, and
interfaceset
orthe
on relevant
the parameters, as shown in Figure 15-19. For parameter descriptions, please refer to
Table 15-5 shown.
Effective time Set the effective time period of the Tailing Detection monitoring
period function, and the time period list can only test the content of "15.4
Pre-settings".
---- End
Operating steps
Step 1: In the “Intelligent Scenario” module, select "Scenario Application > Retirement".
Step 2: The relevant data can be viewed in this real-time monitoring interface, as shown in Figure 15-20.
---- End
Operating steps
Step 1: Access the camera background, and set the line statistics to draw lines, as shown in Figure 15-21.
Figure 15-15 Set the camera to draw a line across the line fence
Step 2: In the “Intelligent Scenario” module, choose "Business Configuration > Statistical Scope
Management".
Step 3: Click the "Add" button to set the parameters of the statistical range of the number of people, as
shown in Figure 15-22. For parameter descriptions, please refer to Table 15-6.
Statistical The information of the face recognition camera selected under the
equipment statistical rule (multiple choices).
---- End
Operating steps
Step 1: In the "Intelligent Scene" module, select "Scenario Application > People Control".
Step 2: The relevant dynamic data can be viewed in the real-time monitoring interface of regional
people statistics, as shown in Figure 15-23
---- End
16 Service Center
16.2 Devcenter
16.2.1 Equipment
Devices added to the access control and video module are displayed on the screen, and basic device
information is displayed, as shown in Figure 16-1.
The software has four default event levels: Critical, Abnormal, Normal, and cannot be edited.See Figure
16-2.
The software contains event types by default. You cannot add new event types. You can customize the
level of the event type.
This section describes how to modify Step.
Operation Step
Step 1: In the Service Center module, choose Event Center > Event Type.
Step 2: On the event type page, select the event type to be modified and click Set Level. The Set level
dialog box is displayed, as shown in Figure 16-3.
Step 3: After selecting the desired level, click OK to complete changing the event type level.
---- End
This screen records all events generated on the platform, as shown in Figure 16-4.
By importing the map and configuring the corresponding monitoring points, the distribution of the
current monitoring points can be intuitively displayed.
instructions
Table 16-1 describes the ICONS on the map configuration page.
Icon Instructions
Full screen.
The refresh.
Add submaps.
Add a map.
The editor.
Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".
Step 2: In the map configuration screen, click on the left bar the page for adding a map is displayed, as
shown in Figure 16-6. For details about the parameters, see Table 16-2.
Normal mapping name Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
(Using the map drawn Settings.
by the user, as the
background loading,) Map path Select the map you want to add, that is, the map image
file that exists on the local server in advance.
instructions
Map is supported formats. Jpe \. JPG \. Jpeg \. GIF \.
PNG \. BMP \. Ico \. SVG \. SVGZ \. Tif \. Tiff \. Ai \.
DRW \. PCT \. PSP \. XCF \. PSD \. Raw \. Webp image
file
Map image file size should not exceed 1120 × 380px
hypergraph name Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.
Map path To set up a GIS server, set parameters on the server, and
then set these parameters.
Route analysis
path
projection
Initialize the The general choice for initial scaling is around 13.
scaling level
Google maps area Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.
instructions
You need to turn on the Directions API on Google's
platform to map people's movements.
Initialize the The general choice for initial scaling is around 13.
scaling level
Baidu map area Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.
Initialize the The general choice for initial scaling is around 13.
scaling level
Step 3: Set parameters based on the type of the map to be added and click OK to finish adding the map.
---- End
Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".
Step 2: On the map configuration screen, select a region map and click on the right to add submaps.
Step 3: In the Add Map list on the left of the page, drag a submap to place it on the map, as shown in
Figure 16-7.
Step 3: Click "Submit" under add map on the left to complete the configuration of the sub-map.
---- End
Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".
Step 2: On the map configuration screen, select the map of the desired area and click on the right of the
Step 3: In the Add Door list on the left of the page, drag the required access control device to place it on the
map, as shown in Figure 16-8.
Step 4: Click "Submit" under the left door bar to complete the operation of adding a door on the map.
---- End
Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".
Step 2: On the map configuration screen, select the map of the desired area and click on the right of the
Step 3: In the Add Camera list on the left of the screen, drag the required camera device to place it on the
map, as shown in Figure 16-9.
Step 4 Click submit in the left column of Adding a camera to complete the configuration of adding a
camera to the map.
---- End
Alarms generated in the access control and video modules are displayed on the real-time monitoring
interface. You can query access control and video events by category. When an alarm is generated, you
can view the location of the alarm source and surrounding conditions, select a suitable monitoring point,
and view the live video, playback, and personnel movement.Operation that can handle doors in batches.
Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".
Step 2: On the real-time monitoring screen, click the icon on the right in the personnel Trend window
that is displayed, set related parameters, as shown in Figure 16-10.
---- End
Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".
Step 2: On the real-time monitoring screen, select a video alarm in the left pane and click to display
detailed information. As shown in Figure 16-11.
instructions
Function description of the detailed information interface:
Preview: Displays the live view of the current video device.
Playback: Plays back the records generated by alarm events.
Trend: record the corresponding trend record of personnel.
Report: You can note the event status.
Step 3: After viewing the detailed information and remarks, click "Submit".
Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".
Step 2: On the real-time monitoring page, select the event for which the access control alarm is generated
in the left pane and click the detailed information is displayed, as shown in Figure 16-12.
17 System Management
During user creation, the super user needs to assign new users with different rights. To avoid setting a
role for each user, you can configure a role with specific rights in role management. When a user is added,
the role is assigned to the user.
The super user has all rights and can assign new users and set corresponding roles (rights) as required.
Operation Step
Step 1: In the System Management module, choose Rights Management > Roles.
Step 3: On the Add role page, set role rights as required, as shown in Figure 17-1.Table 17-1 describes the
parameters to be set.
Parameter Instructions
Role id/name You can customize the role name and number, such as monitor.
Assign Select the module system and select permissions for different levels
permissions of users in the project.
This section describes how to configure Step to add an administrator user in ZKBio CVSecurity.
Operation Step
Step 1: In the system Management module, choose Rights Management > User.
Step 3: On the Add role page, set role rights as required, as shown in Figure 17-2.Table 17-2 describes
parameters to be set.
state Set whether the user can log in and operate the system.
Superuser status This parameter specifies whether the user has all rights by
default. If you click this parameter, the user is a super user and no
role is required.
Authorized Authorization Sets the area rights that the user has.
permission
email Customizes this user's mailbox, which can be used to retrieve the
password.
17.1.4 Results
Log in to the system again as the new user. If the login succeeds, the new user configuration is complete.
After the login, check whether the rights of the user are the same as those of the configured role. If the
rights are correct, the role is successfully configured. Verify that a user is added.
Operation Step
Step 1: The ZKBio CVSecurity login page is displayed. Enter the added username and password to log in.
Step 3: Check whether the function displays of each module match the role permission assignment of the
user.
Operation Step
Step 1: In the System Management module, choose System Management > Region Settings.
Step 2: On the area setting screen, tap Add and set parameters, as shown in Figure 17-3. For parameter
description, see Table 17-3.
Parameter Instructions
Section number A user-defined area id cannot be repeated.
18 Q&A
Step 2: Choose Intelligent Video > Device Management > Master Device to check whether the
subscription status of the device is normal. If not, you can manually subscribe (choose Master
Device > More, and click Subscribe) :
Question 3: The NVR800 master device fails to deliver the list library personnel, prompting "No permission".
Solution: Users that are added to the NVR800 master device do not have personnel management rights.
ZKBio CVSecurity platform must use the apiadmin account to add the NVR800 master device.
Question 4: The time on the video playback page displayed in the live alarm is inconsistent with the event
generated event, and the "Snapshot ID does not exist" message is displayed when you view the
linkage snapshot.
Solution: Log in to the AS1700 OMU Portal, and manually change the server time to the same as the
camera time. (Disabling the NTP service may cause problems.)
Question 5: The AS1700 main device setting video storage by day does not take effect.
Solution: Log in to the AS1700 OMU Portal, choose Storage Management > Storage Alarm Management,
and change the video recovery policy to Recycle by Retention period.
Question 6: The AS1700 primary device fails to create a video structured analysis task. Check the cause, and
the message "Camera intelligence does not support the analysis task type" is displayed.
Solution: A camera whose intelligence attribute is non-human cannot create a video structure analysis
task. You need to set the intelligence attribute to Common in camera Device List > More > Basic
Configuration > Video Channel > Video Settings.
Question 7: The AS1700 main device-camera list shows that the camera is online, but there is no channel
number.
Solution: Log in to the AS1700 OMU Portal, choose User Management > User List > User Rights Settings,
and check whether the camera permission of the current user is selected.If not checked, all
checked:
Question 8: AS1700 Primary device - Adding the primary device Displays a message indicating that the
number of online users of the same account exceeds the upper limit.
Solution: Log in to the AS1700 OMU Portal, choose User Management > User List > New User, and set the
login times. (You are not advised to log in as the admin user. The admin user can log in only
once.)
Question 9: The captured target attributes (age, gender, etc.) are unknown.
Step 1: First check whether the camera is supported. Currently, only 9.0.0 or later cameras are supported.
Step 2: Select Enable Target Properties for target intelligence Settings.
Question 10: How can I troubleshoot the fault that the primary device is offline, or the request is abnormal?
Solution: Intelligent Video > Maintenance configuration > CU Request. Click Details to view the specific
cause.
Question 11: Alarm linkage on the active device How to configure email sending?
Solution: Email parameters must be configured on the active device and the network is normal. ZKBio
CVSecurity is configured for linkage.
Question 12: Personnel are not automatically sent to the access list database.
Solution: Manually added personnel will be automatically sent to the access list of the device, import and
equipment to manually add (add personnel list, and then add in the target list of the device).
Question 13: Using ZKTeco camera and onVIF protocol to connect to AS1700 main device; After task
management and Face Fortify are successfully created, the target identification alarm is not pushed.
Solution: After logging in to the camera web, RTSP authentication is removed.
Question 14: Setting Intelligent Overlay for NVR800 playback does not work.
Solution: Check the NVR800 version number. The NVR800 version is supported only in 9.1. Upgrade the
NVR800 and try again
Question 15: How do I upgrade the NVR800 using a USB flash drive?
Step 1: Create a directory named uboot_upgrade under the root directory of the USB flash drive.
Step 2: Insert the upgrade package starting with uboot and restart the upgrade.
Question 16: Setting the face recognition function does not work when the NVR800 is connected to half of
the disk.
Solution: The face analysis function of the 1/2 disk NVR800 is disabled by default. When the face analysis
function is disabled, the device cannot use the face intelligence function.Face intelligence is
required. Target analysis is enabled on the main device.
Note:
1. When the face analysis function is enabled, the decoding capability of the 1/2 disk NVR800 is halved.
For example, one disk supports four channels of 1080P video decoding by default. After the face
analysis function is enabled, two channels of 1080P video decoding are supported.
2. The face analysis function of the 4/8 NVR800 is enabled by default.The 4/8 disk NVR800 has the same
decoding capability regardless of whether the face analysis function is enabled or not.