0% found this document useful (0 votes)
519 views106 pages

ZKBioCVSecurity User Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
519 views106 pages

ZKBioCVSecurity User Manual

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 106

ZKBioCVSecurity V6600 User Manual

User Manual
ZKBio CVSecurity
Version: 1.0.0
Date: March 2022
Software Version: ZKBio CVSecurity_2.1.1 and above
English

Thank you for choosing our product. Please read the instructions carefully before
operation. Follow these instructions to ensure that the product is functioning
properly. The images shown in this manual are for illustrative purposes only.

For further details, please visit our Company’s website


www.zkteco.com.

Page |1 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Copyright © 2022 ZKTECO CO., LTD. All rights reserved.


Without the prior written consent of ZKTeco, no portion of this manual can be copied or forwarded in any
way or form. All parts of this manual belong to ZKTeco and its subsidiaries (hereinafter the "Company" or
"ZKTeco").

Trademark

is a registered trademark of ZKTeco. Other trademarks involved in this manual are owned by
their respective owners.

Disclaimer

This manual contains information on the operation and maintenance of the ZKTeco equipment. The
copyright in all the documents, drawings, etc. in relation to the ZKTeco supplied equipment vests in and
is the property of ZKTeco. The contents hereof should not be used or shared by the receiver with any
third party without express written permission of ZKTeco.

The contents of this manual must be read as a whole before starting the operation and maintenance of
the supplied equipment. If any of the content(s) of the manual seems unclear or incomplete, please
contact ZKTeco before starting the operation and maintenance of the said equipment.

It is an essential pre-requisite for the satisfactory operation and maintenance that the operating and
maintenance personnel are fully familiar with the design and that the said personnel have received
thorough training in operating and maintaining the machine/unit/equipment. It is further essential for
the safe operation of the machine/unit/equipment that personnel has read, understood and followed the
safety instructions contained in the manual.

In case of any conflict between terms and conditions of this manual and the contract specifications,
drawings, instruction sheets or any other contract-related documents, the contract
conditions/documents shall prevail. The contract specific conditions/documents shall apply in priority.

ZKTeco offers no warranty, guarantee or representation regarding the completeness of any information
contained in this manual or any of the amendments made thereto. ZKTeco does not extend the warranty
of any kind, including, without limitation, any warranty of design, merchantability or fitness for a
particular purpose.

ZKTeco does not assume responsibility for any errors or omissions in the information or documents
which are referenced by or linked to this manual. The entire risk as to the results and performance
obtained from using the information is assumed by the user.

ZKTeco in no event shall be liable to the user or any third party for any incidental, consequential, indirect,
special, or exemplary damages, including, without limitation, loss of business, loss of profits, business
interruption, loss of business information or any pecuniary loss, arising out of, in connection with, or
relating to the use of the information contained in or referenced by this manual, even if ZKTeco has been
advised of the possibility of such damages.

P a g e |1 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

This manual and the information contained therein may include technical, other inaccuracies or
typographical errors. ZKTeco periodically changes the information herein which will be incorporated into
new additions/amendments to the manual. ZKTeco reserves the right to add, delete, amend or modify
the information contained in the manual from time to time in the form of circulars, letters, notes, etc. for
better operation and safety of the machine/unit/equipment. The said additions or amendments are
meant for improvement /better operations of the machine/unit/equipment and such amendments shall
not give any right to claim any compensation or damages under any circumstances.

ZKTeco shall in no way be responsible (i) in case the machine/unit/equipment malfunctions due to any
non-compliance of the instructions contained in this manual (ii) in case of operation of the
machine/unit/equipment beyond the rate limits (iii) in case of operation of the machine and equipment
in conditions different from the prescribed conditions of the manual.

The product will be updated from time to time without prior notice. The latest operation procedures and
relevant documents are available on http://www.zkteco.com.

If there is any issue related to the product, please contact us.

ZKTeco Headquarters
Address ZKTeco Industrial Park, No. 32, Industrial Road,

Tangxia Town, Dongguan, China.

Phone +86 769 - 82109991

Fax +86 755 - 89602394

For business related queries, please write to us at: [email protected].

To know more about our global branches, visit www.zkteco.com.

P a g e |2 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

About the Company


ZKTeco is one of the world’s largest manufacturer of RFID and Biometric (Fingerprint, Facial, Finger-vein)
readers. Product offerings include Access Control readers and panels, Near & Far-range Facial Recognition
Cameras, Elevator/Floor access controllers, Turnstiles, License Plate Recognition (LPR) gate controllers
and Consumer products including battery-operated fingerprint and face-reader door locks. Our security
solutions are multi-lingual and localized in over 18 different languages. At the ZKTeco state-of-the-art
700,000 square foot ISO9001-certified manufacturing facility, we control manufacturing, product design,
component assembly, and logistics/shipping, all under one roof.

The founders of ZKTeco have been determined for independent research and development of biometric
verification procedures and the productization of biometric verification SDK, which was initially widely
applied in PC security and identity authentication fields. With the continuous enhancement of the
development and plenty of market applications, the team has gradually constructed an identity
authentication ecosystem and smart security ecosystem, which are based on biometric verification
techniques. With years of experience in the industrialization of biometric verifications, ZKTeco was
officially established in 2007 and now has been one of the globally leading enterprises in the biometric
verification industry owning various patents and being selected as the National High-tech Enterprise for 6
consecutive years. Its products are protected by intellectual property rights.

About the Manual


This manual introduces the operations of ZKBioCVSecurity.

All figures displayed are for illustration purposes only. Figures in this manual may not be exactly
consistent with the actual products.

P a g e |3 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Document Conventions
Conventions used in this manual are listed below:

GUI Conventions

For Software

Convention Description

Bold font Used to identify software interface names e.g. OK, Confirm, Cancel.
Multi-level menus are separated by these brackets. For example, File > Create >
>
Folder.
For Device

Convention Description

<> Button or key names for devices. For example, press <OK>.
Window names, menu items, data table, and field names are inside square brackets.
[]
For example, pop up the [New User] window.
Multi-level menus are separated by forwarding slashes. For example,
/
[File/Create/Folder].

Symbols

Convention Description

This represents a note that needs to pay more attention to.

The general information which helps in performing the operations faster.

The information which is significant.

Care taken to avoid danger or mistakes.

The statement or event that warns of something or that serves as a cautionary


example.

P a g e |4 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

1 Installation and Login

1.1 Operating Environment Requirements

Category Minimum configuration requirements

CPU At least Intel quad-core (above intel core i5-6600)

RAM Not less than 8GB

Not less than 500GB (the remaining space of the system disk is more than
hard disk
15GB)

OS Support 64-bit Windows 7 Professional Edition, 64-bit Windows 10 OS

Intel integrated graphics, video memory greater than 2.0G (Intel® HD


Graphics card
Graphics 530 and above recommended)

At least one network card, the recommended network speed is not less than
Network card
1000Mbit/s

At least 21.5 inches, and the best resolution of the monitor is recommended:
1920 * 1080.
monitor
It is recommended to set the display resolution to 1920 * 1080. Using other
resolutions may cause the interface to be abnormal.

Browser Support Chrome33+ (recommended)/Firefox27+/Explorer11+

Instruction:

1. The number of live channels supported under the minimum configuration requirements:

Resolution Configuration a (H.264 Configuration a (H.265


format) format)
CIF (512K) 38 38
4CIF/D1(2M) 22 22

720P (2M 25fp) 10 10

1080P (4M 25fps) 6 6

2. In the video preview window, you can view the system CPU or memory usage in real time. If
the CPU reaches 80%, it is not recommended to increase the video preview window, which
will cause the video stream to freeze; if the CPU has reached 80% and the video window
does not meet the actual application, the system configuration needs to be improved.

P a g e | 21 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

1.2 System Installation

STEP 1: Obtain the installation package。

Instruction
 Before installing the software, it is recommended to close the anti-virus software in the system
to avoid failing the environment detection. If the antivirus software detects abnormality, you
can also choose to ignore it.
 After running the application, there will be a few seconds of detection process, please be
patient. 。
STEP 2: Right-click the installation package installer, choose to run as an administrator, and the environment
detection tool will automatically perform system environment detection. If an abnormality is
detected during the installation process, the interface will give a prompt. The user can refer to the
prompt information to repair, and re-test after repairing until all the test items are passed before
proceeding to the next step.

STEP 3: If the detection is normal, click "Continue".

STEP 4: Select "I agree to this agreement (A)" and click "Next".

STEP 5: After configuring the server port and other parameters, click "Next".

instruction
 The default port is 8098, and the Adms service port defaults to 8088.
 If the port is occupied, please modify the port number manually. When modifying, try
to avoid the occupied ports in the system, and can not overlap with the database port 5442,
redis port 6390, and 21 and 80 ports.
 Check "Add firewall exception to this port" to prevent Windows Firewall from blocking
the program from running.
 The https protocol is used by default.
STEP 6: After setting the installation directory, click Next.

instruction
 The default installation path is C:\Program Files\ZKBioCVSecurityV6600. You can also click
“Browse” to customize the installation path. Please follow the interface prompts to
ensure that the selected installation path has enough disk space.
STEP 7: After setting the backup file storage path, click “Next”

instruction
 The system scans the entire disk by default, locates the drive letter with the largest free
space, and creates a new SecurityDBBack folder. You can also click "Browse" to customize
the storage path of the backup file.
STEP 8: Click "Install" to start installing the software.

STEP 9: After the installation is complete, you will be prompted whether to restart the computer immediately
(the default is "Yes"). Click "Finish" to restart the computer to complete the software installation.

P a g e | 22 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

instruction
 After the software installation is complete, it will take a long time (about 2 minutes) for
the service to start up. Please wait patiently for the service to start and then complete the
operation.
STEP 10: Enter the login page as shown in Figure 1-2, log in to the system.

Figure 1-2 Login page

P a g e | 23 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2 Personnel Management Business Configuration

2.1 Operation Scene

The [Personnel] module can realize the input of basic information of personnel, and achieve
the function of adding, deleting and modifying personnel information. Before using other
modules, you need to complete the settings of the [Personnel] module.

2.2 Operating Procedures

This operation process is suitable for guiding users how to configure and manage the basic
personnel organization after the system is installed.
The flow of personnel organization configuration is shown in Figure 2-1.

Figure 2-1 Flowchart of personnel configuration

2.3 Configure Add Department

There are two ways to configure new departments: batch import and single addition.
Batch Import:When users use the system for the first time, they have planned the organizational
structure of departments. When creating the organizational structure of the system, they can
add them manually in batches.

Single addition:When a small number of departments are added, they can be added individually.

P a g e | 24 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2.4 Add Departments in Batches by Importing


Introduce the configuration steps of manual batch import of departments in ZKBioCVSecurityV6600.
It is suitable for adding a large number of departmental organizations. Compared with the manual
single-department adding method, the automatic batch adding method is faster, but it is necessary to
plan the departmental organization in advance and fill in the import template.

Steps
Before adding departments in batches, you need to fill in the template file as required. After filling out the
template file, you can import and add departments in batches in the "Department" interface.
Instruction
 The superior department is an important parameter to determine the company's organizational
structure, and the company's organizational chart will be displayed in the form of a department
tree in the system interface.
 When importing, pay attention to the uniqueness of the department number. When the
department number is repeated, the result of import and addition will fail.
STEP 1: In the [Personnel] module, choose “Personnel Management > Department”.

STEP 2: On the department interface, select and click the "Import > Download Department

Import Template" button to download the template "Department Template.xls" locally.

STEP 3: Open the department template file "department template.xls"; fill in the corresponding content in
the template according to the addition requirements, please refer to Table 2-1 for parameter
filling instructions.

Parameter Instructions
Department Number Customize the department number, support letters and numbers.

Department name Customize the department name.

Superior department number Fill in the number of the superior department.

Superior department name The department name corresponding to the superior department
number.

Table 2-1 Instructions for filling in department parameters

STEP 4: On the department interface, click the "Import" button.

Step 5: Click the "Browse" button to import the batch imported department template data into the
system, as shown in Figure 2-2.

P a g e | 25 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 2-2 Import Department

STEP 6: Click "OK", and the interface displays the result of importing and adding departments.

STEP 7: Click "Close" to complete the import and addition of departments.

2.5 Add a Single Department by Manually Adding


Introduce the configuration steps for manually adding a single department in ZKBioCVSecurityV6600.
It is suitable for scenarios where a small number of departmental organizations are added. After most
departmental organizations have been created, individual departments can be added individually.

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Department”.

Step 2: Click "Add" with the mouse, and the interface for adding a department will pop up.

Step 3: In the interface of adding a department, fill in the corresponding parameters according to the
adding requirements, as shown in Figure 2-3. Please refer to Table 2-2 for the description of
parameter filling.

Figure 2-3 Adding a new department

P a g e | 26 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter Instructions
Department Number Customize the department number, support letters and numbers.

Department name Customize the department name.

Superior department number Fill in the number of the superior department.

Superior department name The department name corresponding to the superior department
number.

Table 2-2 Instructions for filling in new parameters for departments

Step 4: Click "OK" to finish adding the department.

2.6 Configure Adding Position

2.7 Add a Position by Adding Manually


Introduces the configuration steps of manually adding a job in ZKBioCVSecurityV6600, and adding a job is
used to define the job information of a person.

Steps
Step 1: In the [Personnel]module, choose “Personnel Management > Position”.

Step 2: Click "Add" with the mouse, and the new job interface will pop up.

Step 3: On the new job interface, fill in the corresponding parameters according to the adding
requirements, as shown in Figure 2-4; please refer to Table 2-3 for parameter filling
instructions.

Figure 2-4 New Jobs

P a g e | 27 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter Instructions
Job number Customize the job number for easy memory.

Job Title Customize job title.

Sequence Sort job listings, only numbers are supported.

Senior position Select the corresponding senior position from the drop-down radio
box. If you need to cancel, click Selected again.

Table 2-3 Description of new parameters for positions

Step 4: Click "OK" to finish adding the position.

2.8 Configure Adding Personnel

When users use this management system, they need to register personnel in the system, or add
personnel through equipment, or import personnel information from other software or
materials into this system.
System batch import and addition: When there are a large number of personnel and there are electronic
files, they can be added by manual batch import and addition.
Including importing personnel information, personnel
biometrictemplate data (optional), and personnel photos
(optional).
System registration personnel: When a small number of new personnel are added, they can be added
by registering a single person in the system by the administrator.
Equipment registration personnel: When a small number of personnel are added, the administrator or
user manually registers the personnel information on the
equipment that supports the registration machine function, and
synchronizes it to ZKBioCVSecurityV6600.

2.8.1 Add People in Batches by Importing


Introduce the configuration steps of manually importing personnel in batches in ZKBioCVSecurityV6600.
It is suitable for scenarios where a large number of personnel information is added. Compared with the
manual registration method of individual personnel, the batch import and addition method is faster.
Before adding departments in batches, you need to fill in the template file as required. After filling out the
template file, you can import and add departments in batches in the "Department" interface.
instruction
 The import and addition of personnel includes importing personnel information, personnel
biometrictemplate data (optional), and personnel photos (optional), which need to be imported
separately.
 Importing is to pay attention to the uniqueness of the personnel number. When the personnel
number is repeated, the result of import and addition will fail.

P a g e | 28 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2.8.1.1 Import Personnel Information


Before adding people in batches, you need to obtain or fill in a template file as required. After filling in the
template file, you can import and add people in batches on the Personnel Management > Personnel
interface.

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.

Step 2: On the personnel interface, select and click the "Import > Download Personnel Import
Template" button, select the parameters to be filled in, and download the template
"personnel information template.xls" locally. The parameter selection is shown in Figure 2-5.

Figure 2-5 Import personnel information template

Step 3: Open the exported template file "Personnel Information Template.xls" for adding personnel
information.

Step 4: In the personnel interface, select and click the "Import > Import Personnel Information" button;
in the "Import Interface", click the "Browse" button to import the batch import template into
the system, as shown in Figure 2-6.

Figure 2-6 Import personnel information


Step 5: Click "OK", and the interface displays the result of personnel import and addition.

Step 6: Click "Close" to complete the import and addition of personnel information.

P a g e | 29 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2.8.1.2 Importing Biometric Template

Preconditions
1. The system needs to have the basic information files of the personnel in order to support the import
of biometric template data.
2. The biometric template data of the current system personnel has been obtained.

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.

Step 2: On the personnel interface, select and click the "Import > Import Biometric Template Data"
button; in the pop-up import personnel biometric template data interface, click the "Browse"
button to import personnel biometric template data into the system in batches, as shown in
Figure 2- 7 is shown.

Figure 2-7 Importing personnel biometrictemplate data

Step 3: Click "OK", the interface displays the import and addition results.

Step 4: Click "Close" to complete the import of personnel biometrictemplate data.

2.8.1.3 Import Persommel Photos

Preconditions
1. The system needs to have the basic information files of the personnel in order to support the import
of personnel photos.
2. The personnel photos of the current system personnel have been obtained and correctly named
according to the personnel number.
3. The photo requirements for personnel are as follows:
 Image format: support .jpg, .png format.
 Image size: The recommended image size is 35KB~200KB, and the maximum size of a single image
is 5MB.
 Image quality: Faces in images are clear and not blurred by lens defocus or face motion. The
minimum image depth is an 8-bit grayscale image.
 Pixels: The recommended value of face pixels is 80*80~200*200, and the distance between the
eyes should be greater than or equal to 60 pixels, preferably greater than or equal to 90 pixels.

P a g e | 30 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

 Brightness and Contrast: The ambient illumination is not less than 300Lux, the image brightness is
uniform, the contrast is moderate, and the face has no invisible, no backlight, no reflection, no
overexposure, no underexposure and no yin and yang faces.
 Attitude: The portrait is upright, looking straight ahead, the horizontal rotation angle of the face
should be within ±10°, the elevation angle should be within ±10°, and the tilt angle should be
within ±10°.
 Blocking: Eyebrows, eyes, mouth, nose and facial contours should not be blocked by bangs, masks,
accessories, glasses, etc. The lenses of glasses should be colorless and non-reflective, and the
frames of glasses should not be too thick to block human eyes.
 Face area: The face is complete, the outline and facial features are clear, and there is no heavy
makeup. The face area of the image should not be processed by PS.
 Expression: Natural expression, neutral or smiling (no missing teeth), eyes open naturally, mouth
closed naturally, no obvious expressions such as laughter or frown.

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.

Step 2: On the Personnel interface, select and click the "Import > Import Personnel Photo" button, as
shown in Figure 2-8.

Figure 2-8 Import staff photos

Step 3: Optional: upload photos and compressed packages.

1. After selecting the photo method, click "OK" to enter the interface of importing personnel
photos, select the photo and click "Start uploading", as shown in Figure 2-9.

Figure 2-9 Photos - Importing staff photos

P a g e | 31 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2. After selecting the compression package method, click "OK" to enter the interface of
importing personnel photos, click "Browse" to select the file and then click "Start uploading", as
shown in Figure 2-10.

Figure 2-10 Compressed Package - Importing Staff Photos

3. After the upload is complete, the interface displays the results of the imported personnel

photos.

4. Click "Close" to complete the import and addition of personnel photos.

2.8.2 Add Personnel by Manual Registration in the System


Introduce the configuration steps of manual registration of personnel in ZKBioCVSecurityV6600.
It is suitable for the scenario of manual registration of a small number of personnel. Personnel registration
includes registration of personnel information and biometricdata.

2.8.2.1 Registration of Basic Information of Personnel


Introduce the configuration steps of manual registration of personnel in ZKBioCVSecurityV6600.

P a g e | 32 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel Management >
Personnel”.
Step 2: Click "Add" with the mouse, and the interface for adding personnel will pop up.
Step 3: On the personnel adding interface, fill in the corresponding parameters according to the adding
requirements, as shown in Figure 2-11; please refer to Table 2-4 for parameter filling instructions.

Figure 2-11 Personnel registration interface

Parameter name Parameter description

Basic information of Including personnel number, name, department, position, personnel


personnel photo and other basic personnel information customization settings.
Device Authentication Password: Set the password used to authenticate
the access control device.
Biometric Type: Displays the number of entered biometric templates
(fingerprint, face, finger vein, palm print, comparison photo). This
biometric data is used for verification identification on access control/time
attendance devices.

Description
The following requirements exist for face images:
− Picture format: Support .jpg and .png formats.
−Image size: The recommended image size is 35KB~200KB, and the
maximum size of a single image is 5MB.
−Image quality: The face in the image is clear and not blurred by lens
defocus or face motion. The minimum image depth is an 8-bit
grayscale image.

P a g e | 33 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter name Parameter description

−Pixel: The recommended value of face pixels is 80*80~200*200, and


the distance between the eyes should be greater than or equal to 60
pixels, preferably greater than or equal to 90 pixels.
−Brightness and Contrast: The ambient illumination is not less than
300Lux, the image brightness is uniform, the contrast is moderate,
and the face has no invisible, no backlight, no reflection, no
overexposure, no underexposure and no yin and yang faces.
−Attitude: The portrait is upright, looking straight ahead, the
horizontal rotation angle of the face should be within ±10°, the
elevation angle should be within ±10°, and the tilt angle should be
within ±10°.
-Blocking: Eyebrows, eyes, mouth, nose and facial contours should
not be blocked by bangs, masks, accessories, glasses, etc. The lenses
of glasses should be colorless and non-reflective, and the frames of
glasses should not be too thick to block human eyes.
−Face area: The face is complete, the outline and facial features are
clear, and there is no heavy makeup. The face area of the image
should not be processed by PS.
-Expression: Natural expression, neutral or smiling (no missing teeth),
eyes open naturally, mouth closed naturally, no obvious expressions
such as laughter or frown.
Access control settings Permission group setting: Set the permission group for the personnel
individually.

Super user: Super user can be verified on any access control device (the
highest priority), including interlock, anti-passback, normally closed time
period, etc.

Device operation authority: After being set as the administrator, it will be


delivered to the device, and it has the administrator authority of the
device.

Extend passage: If checked, the waiting time for this person to pass can be
extended.

Forbidden list: The person who checked the forbidden list fails to verify
after being identified in the device, and prompts that they are forbidden
to pass.

Set effective time: Set the temporary access control authority, and the
door can only be opened within the effective time. If it is not checked, the
default is always effective.

Attendance settings Attendance area: If the corresponding area is authorized, the personnel
will be sent to all devices in the corresponding area.

Attendance mode: Yes, the staff must follow the scheduling rules to check
in; No, the staff is automatically full, and there is no need to clock in.

Device operation authority: Set the personnel's device operation authority


and send it to the corresponding device.

Verification method: Select the verification method of attendance


personnel.

P a g e | 34 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter name Parameter description

Elevator control settings Authority group setting: You can customize the elevator control authority
group of the person. After selecting a department, the authority group set
by the department will be issued to the person by default.

Super user: Super user is not limited by time period, holidays, etc., and has
a high priority.

Set effective time: Set the temporary elevator control authority, and you
can press the elevator floor button only during the effective time. If not
checked, the default is always valid.

License plate registration License plate number: The license plate that the user needs to register,
multiple license plates can be added, and one person can add 6 license
plates.

Parking space number: corresponding to the parking space where the


vehicle is parked. It cannot be edited and entered. It will be filled in
automatically through the parking space authorization operation.

Witness settings Issue authority: You can choose whether the person issues authority, the
default is "No"; the information can be viewed on the witness card
issuance interface in the witness card system.

Channel settings Permission group setting: You can customize the channel permission
group of the person.
Super user: Super user is not limited by time period, Anti-Passback, etc.,
and has a high priority.
Equipment operation authority: general staff, administrators, registrars.
 General personnel can only verify on the device.
 The administrator can enter the device menu and have the
operation authority of all menus.
The registrar can also enter the equipment menu and only has the
operation authority of equipment user management.
Information screen settings Information screen area: You can set the information screen area
corresponding to the person, and support multiple selection of
information screen areas

Device operation authority: Set the personnel's device operation authority


and send it to the corresponding device

Identity category: Set the identity of the person on the information screen.
After verification, the prompts are different. There are three types:
ordinary, VIP, and banned list:
 Normal indicates normal verification.
 VIP has picture prompts such as applause.
 Forbidden list will be prompted when verifying.

Details The fields in the detailed information are only for display and do not make
logical judgments.

Table 2-4 Description of personnel registration parameters

Step 4: After filling in, click "OK" to complete the registration of this person.

P a g e | 35 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2.8.2.2 Registration of Biometric Identification Information


This paper introduces the steps of personnel biometric registration in ZKBioCVSecurityV6600. The
registered biometric data can be used for verification and identification of access control, attendance
and other equipment.
Biometric registration includes fingerprint, finger vein, and palm registration. Since the interfaces of
fingerprint registration and finger vein registration are similar, fingerprint registration and palm print
registration are used as examples to illustrate the operation process.
Description
 The server side of the box does not support external "palmprint meter, finger vein meter" to collect
biometrictemplates, and the fingerprint reader is only supported by the "Live20R" model.

Preconditions
On the computer terminal where the administrator registers the personnel information, connect the
fingerprint reader device through the USB port.

Steps
Step 1: In the [Personnel] module, choose “Personnel Management > Personnel”.

Step 2: Click "Add" with the mouse, and the interface for adding personnel will pop up.

Step 3: On the interface for adding personnel, click the " " button.

Step 4: (Optional) If the driver is not installed, click the icon to pop up the registration and driver
download box, download the driver and complete the installation.

Step 5: After the driver is installed, fingerprint registration can be performed, as shown in Figure 2-12.

Figure 2-12 Fingerprint registration

Step 6: Select the fingers respectively, press the fingerprint on the connected fingerprint reader three
times in a row, and the system prompts the fingerprint to be registered successfully.

Step 7: Click "OK" to save and close the fingerprint registration interface.

P a g e | 36 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

2.8.2.3 Adding Personnel by Manual Device Registration


Introduces the configuration steps of manually enrolling personnel through the device added to
ZKBioCVSecurityV6600.
It is suitable for the scenario of manual registration of a small number of personnel. The information and
biometric template of new personnel can be added directly on the device. After the registration is
completed, the personnel data on the device will be synchronized to ZKBioCVSecurityV6600.
There are many kinds of devices that support manual registration. Here, we take the all-in-one access
control tablet as an example to illustrate the operation process.

Preconditions
Devices that support the enrollment function have been added to ZKBioCVSecurityV6600.

Steps
Step 1: In ZKBioCVSecurityV6600, set this access control tablet all-in-one machine as a registration
machine.
1. In the [Access Control] module, select "Device > Access Control Device".
2. Check the device that supports registration and choose to click "Settings > Set Registration
Machine" to pop up the setting registration machine interface.
3. Set the registration machine parameters, as shown in Figure 2-13.

Figure 2-13 Setting the registration machine

4. Click "OK" to save and close the setting interface.


Step 2: Perform the operation of adding a person on the added device.

Step 3: (Optional) Manually synchronize the personnel added to the device to ZKBioCVSecurityV6600.

Description
 If the device has been set as the registration machine in step 1, and the network is kept unobstructed,
the new personnel on the device will be automatically synchronized to ZKBioCVSecurityV6600, and
this manual synchronization operation is not required.
 If the registration machine is not set in step 1, or the network is disconnected during the period, it
may happen that the personnel data registered by the device is not uploaded to
ZKBioCVSecurityV6600. This synchronization operation step can be used to complete the uploading
of the personnel registered by the device.
1. In the [Access Control] module, select "Device > Access Control Device".
2. Select the device and choose to click "View and Acquire > Get Personnel Information" to pop up the
Get Personnel Information interface.
3. On the interface for obtaining personnel information, click "Start" to obtain personnel information, as
shown in Figure 2-14.

P a g e | 37 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

·
Figure 2-14 Obtaining personnel information interface

3. After the progress of personnel information acquisition is completed, click "Close" to complete the
synchronization of personnel data to ZKBioCVSecurityV6600.

P a g e | 38 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3 Access Control Management Service Configuration

3.1 Operation Scenario


The [Access Control] module is used as the entry and exit management of pedestrians. Through the
configuration of access control equipment and permission groups, unified management of entry and exit
of people is realized. The most fundamental problem to solve is to control who uses what media to enter
and exit which door at what time.

3.2 Operation Process


This section describes the configuration process of the [Access Control] module service.
The [Access Control] module service configuration process is shown in Figure 3-1.

Figure 3-1 Access control configuration process

3.3 Add Device


Introduce the configuration steps of searching and adding access control devices in
ZKBioCVSecurityV6600.

P a g e | 39 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Through the search method, the access control devices that have been set to point to the server can be
found, and the access control devices that have been searched can be added directly, which is convenient
to operate.

Preconditions
1. Before adding the access control device, perform IP allocation settings.
2. The device needs to set the server address in advance before searching and adding. The
configuration steps for the server are as follows:
a. In the access control device that has been connected to the power supply and the network, set it
directly on the device screen.
b. Select and click "Main Menu > Communication Equipment > Network Management Platform or
Cloud Server Settings"
c. Set the IP address and port of the current server, that is, the IP address and port of the current
ZKBioCVSecurityV6600 server, and complete the configuration to the server.

Steps
Step 1: In the [Access Control] module, select "Device > Access Control Device".

Step 2: On the device interface, click the "Search" button to pop up a search box.

Step 3: Click "Start Search" in the search box to display the access control devices that can be added, as
shown in Figure 3-2.

Figure 3-2 Device search and add interface

Step 4: Optional: Modify the IP address of the access control device, click "Modify IP Address", the
device will be restarted after modifying the IP address, and the IP address modification will be
completed after the restart.

Step 5: For the searched access control devices, click the "Add" button in the operation bar to add the
device; the device addition settings are shown in Figure 3-3, and the parameter settings are
described in Table 3-1.

P a g e | 40 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-3 Device Add Interface

Parameter How to set

Device name Customize the name of the device.

New server address/port Set the IP address and communication port of the system to be
used (the default communication port is 8088).

Communication password Fill in the communication password of the device. If there is no


password, you do not need to fill in it. You can add it only after
the verification is successful.
 For new factory equipment and initialized equipment, the
communication password is empty.
 In order to ensure that the device is not used by others,
users can enter the device IP address through the web page
to enter the background to customize the device
verification password.

Icon type Select the icon display type of the real-time monitoring interface:
door, channel.

Area Divide the device into regions and select the region to which the
device belongs.

Add to permission group The device is automatically added to the selected permission
group.

Delete data from device Set whether the original access control data in the device will be
when adding automatically cleared after the device is added.

P a g e | 41 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 6: Click "OK" to complete the operation of adding access control devices. After the operation is
completed, the device will restart, and the device will be added after the restart is complete.

Step 7: Click "Close" to close the device search and add interface.

3.4 Access Control Verification Rule Settings

Access control rules are the core logic control part of access control, including door parameter
settings, time period settings, linkage settings, etc.

3.4.1 Door Parameter Setting


The setting of door parameters affects the logic judgment of access control verification. The
door parameters support different parameter settings according to the different firmware of the
device. The following describes the configuration steps of the door parameters with one of the
devices.

Operation Step
Step 1: In the [Access Control] module, select Devices > Door.

Step 2: In the management interface of the door, click the "Edit" button in the door operation bar to pop
up the door parameter setting box.

Step 3: In the door parameter setting interface, fill in the corresponding parameters according to the
addition requirements, as shown in Figure 3-4, please refer to Table 3-2 for parameter filling instructions.

Figure 3-4 Setting door parameters

P a g e | 42 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

instructions
The firmware of different access control devices supports different door parameters. Set the
parameters based on the actual door parameter page. Table 3-2 describes the parameter set
for different devices.

Parameter Setup instructions

Device name/door number The basic information about the door is displayed. Reset is not
supported.

Name of the door Customize the name of the door for easy memory.

Gate validity period Select a period when the gate is valid.

Not within the validity period of this door, even if the person has the
permission of this door, can not open the door inside.

Verify the way Set this parameter to the authentication mode supported by the device.

Lock drive duration Set the time range for unlocking a lock after authentication. For example,
if the value is set to 5 seconds, the door can be opened within 5 seconds
after the verification. If the door is not opened after 5 seconds, the door
will be automatically locked, and the door can be opened only after the
verification.

Weiganka format Select a Weigand card format that can be recognized by the door's
Weigand reader.

The card format and Settings are different, will not open the door;There
are 9 built-in formats in the software, the default is automatic matching
wiegand card format, automatic matching can identify a variety of
built-in wiegand card format.

Exit button state Set the status of the door exit button, locked, not locked. Lock: the door
lock does not open after pressing the exit button;Not locked: the door
lock is opened after pressing the exit button.

The exit button is delayed When the exit button is set to lock, set the delay time of the exit button,
that is, the delay time of the inspection door alarm after the exit button
is locked.

Operation interval Set the interval for access control Operation.

Effective time of exit button Select the time period for setting the exit button.

Magnetic door type Option No, normally open, normally closed, default none.

Behind closed doors to lock Set whether to lock back after the door is closed.

Magnetic door delay Set the delay for checking the door status sensor after the door is
opened. When the door is not "normally open", if it is open, it will start
timing, alarm will start after the door magnetic delay time, and alarm will
be cancelled when the door is closed.

Duration of Anti-Passback entry Set a limit on how long an intelligent entry can take.

Stress the password Set up the user to open the door when the threat password. An alarm
will be generated when the coerced code opens the door.

P a g e | 43 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter Setup instructions

Emergency code Set a password for the user to use in an emergency. The password is
used by the administrator and is valid in any period and authentication
mode.

The door is normally open Select the time when this door is normally open.

Extended time of passage Set on the basis of the original opening time, additional limit time.
Common terms for participants, inconvenient personnel to extend the
passage time.

Open time delay Set the time for waiting for the delayed door opening after
authentication.

Disable alarm reminder If alarm event occurs on this door, whether there will be alarm sound
reminder on the real-time monitoring interface.

Allow superuser access when the Set whether the super user can verify access when the door is locked.
door is locked

The above Settings are copied to To set the door parameters above, the options are all doors of the
current device, all doors of all devices.

Table 3-2 Door parameters1

Step 4: Click "OK" to complete the setting of the door parameters.

3.4.2 Reader/Auxiliary Input Bind Camera Settings (Optional)


This section describes the Step configuration of the Reader binding camera in ZKBio CVSecurityV6600.

Operation scenario
After the camera is bound, if related Settings are set during linkage, the Reader/auxiliary input will
perform video linkage (capture) once corresponding events occur. The Reader and auxiliary input bind
cameras in the same way. This section uses the Reader as an example to describe how to bind cameras.

The premise conditions


A video camera has been added in the Intelligent Video module.

Operation Step
Step 1: In the access Control module, choose Device > Reader.

Step 2: In the Operation column of the corresponding Reader, click Bind/Unbind camera. The bind/unbind
camera page is displayed.

Step 3: On the Select Reader screen, set the Reader as required, as shown in Figure 3-5.

P a g e | 44 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-5 Binding a camera1

Step 4: Click “OK” to bind the camera.

3.4.3 TimeZone Setting


In access control Module, time period is a very important basic concept, which is used to set the use time
of the door and specify that access control is available in the valid time period.
This section describes how to configure Step to manually add a time range in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Time Range.

Step 2: Click "Add", the interface for adding time segments is displayed.

Step 3: The time segment page is added. Set the content based on the new requirements, as shown in
Figure 3-6.For parameter Settings, see Table 3-3.

Figure 3-6 Adding a time range2

P a g e | 45 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3Parameter How to set up


Schedule Name You can set a time range name for easy memory.

note Remarks Description of user-defined Settings.

Time interval Set the start time and end time for each time range.The time
period includes one week and three holiday-type time periods.

Copy Monday's time You can quickly copy your Monday Settings to other weekdays.
to other weekdays

Table 3-3 Parameters to be added in the time range2

Step 4: Click “OK” to finish adding the time range.

3.4.4 Holiday Settings


The access control time on holidays may be different from that on weekdays. To facilitate
Operation, the system supports separate access control time on holidays.
This section describes how to manually add a holiday Step in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Holidays.

Step 2: Click "Add", the page for adding holidays is displayed.

Step 3: When a page is added during holidays, set the content as required, as shown in Figure 3-7.

For parameter Settings, see Table 3-4.

Figure 3-7 Adding holidays4

Parameter How to set up


Holiday Name You can set holiday names for easy memory.

Type of Holidays The holiday type can be: Holiday type 1, Holiday type 2, holiday type
3.Set holiday type to time Range.

P a g e | 46 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Start time/End time Set the holiday time range.

According to the Set whether this holiday cycle by year: yes, no.
annual circulation
For example, if New Year's Day is January 1, set this parameter to
Yes.Mother's Day falls on the second Sunday in May. If the date is
uncertain, set it to No.

note Custom Settings description.

Table 3-4 Parameters for adding holidays3

Step 4: Click OK to finish adding the holiday.

3.4.5 Interlock Set


Set interlock control between two or more doors on the access controller device: To verify the opening
of a door, ensure that all other doors interlocked with the door are closed; otherwise, the door cannot
be opened.
This section describes the Step of adding interlock effect in ZKBio CVSecurityV6600.

The premise conditions


The door opening/closing state monitoring is realized by detecting the door magnetic state. Therefore,
interlock function requirements:
1. The door status sensor at the device end must be correctly installed
2. In door setting on the software side, the status of the door status sensor must be set to normally
open or normally closed (based on the actual installation).

Operation Step
Step 1: In the [access Control] module, choose "Access control > Interlock" and click Add.

Step 2: Select the specified device.

instructions
 When you add a device for which interlock has been configured, the device cannot be
found in the drop-down list. After the configured interlock information is deleted, the
device is returned to the drop-down list.
 Interlock Settings vary with the number of doors controlled by the device:
- Single-door controller: no interlock setting
- Dual door controller: 1-2 two door interlock Settings
- Four-door controller: 1-2 two-door interlock, 3-4 two-door interlock, 1-2-3 three-door
interlock, 1-2-3-4 four-door interlock, 1-2 and 3-4 door interlock
Step 3: Select the interlock rule, select -, and click OK to complete the Settings, as shown in Figure 3-8. The
new interlock Settings are displayed in the list.

P a g e | 47 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-8 Adding interlock configuration5

3.4.6 Linkage Set


The use method and scenario of linkage are flexible. After a specific event is triggered by an
input point in the access control system, a linkage action will be generated at the specified
output point to control events such as verification opening, alarm and abnormality in the
system.
This section describes how to add Step to the linkage effect in ZKBio CVSecurityV6600.

The premise conditions


Before adding a linkage configuration, perform the following operations:
Step 1: Add Settings for binding cameras to access control devices, input points, output points, and read
heads.

Step 2: Optional: In the "System Management" module, choose "System Management > Mail Management"
to set the sender server. The Step of setting the sender server is as follows:

1. In the "System Management" module, choose "System Management > Mail Management".
2. Click "Sender Server Settings" to pop up the sender server Settings interface.
3. On the Sender server Settings screen, set parameters as required, as shown in Figure 3-9.For
parameter Settings, see Table 3-5.

P a g e | 48 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-9 Mailbox parameters6

Parameter How to set up


You can customize the email server address and port.

Email server The email products that provide the SMTP server can be used, such
address/port as NetEase 163 email, Tencent QQ email, and Foxmail email. The
specific address and port configurations must be obtained from the
corresponding provider.

Email user name


Enter the user name and password for the mailbox.
and password

Name of sender Sets the name of the sender on the received message.

Table 3-5 Mailbox management parameters4

4. After setting, click "Test connection" to receive the email, indicating that the test has passed.
5. Click "OK" to finish setting email parameters.

Operation Step
Step 1: In the access Control module, choose Access Control > Linkage.

Step 2: On the linkage setting screen, click Add, as shown in Figure 3-10. Table 3-6 and Table 3-7 refer to the
linkage parameters.

P a g e | 49 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-10 New linkage configuration7

Parameter How to set up


Linkage name You can customize the linkage name for easy query.

Equipment Custom Select an added access control device.

Linkage departure Select the condition triggered by the linkage Operation, that is, the
condition event type generated by the selected device.

Input point Select the input point to set device input.

dots Select the output point to set device output.

You can set the linkage action, including Operation, video linkage,
Linkage action
and email. Table 3-7 describes the configurations of the three
Setting
modes.

Table 3-6 New linkage parameters5

Parameter How to set up

The output point of Set the output action type: close, open, normally open.
Operation Sets the delay time if the output action is on.

Pop-up video and display duration: Select pop-up video on the


real-time monitoring screen and set the pop-up duration.

Video recording and Video Duration: Select Video recording to set


Video linkage the video duration.

Capture: Set linkage action whether to take a photo: If a photo is


taken, you also need to set whether to pop up on the real-time
monitoring interface and the display duration.

P a g e | 50 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter How to set up


Set the email address that receives the linkage content when a
mail
linkage event occurs.

Table 3-7 Setting linkage actions6

Step 3: Click OK to complete the linkage configuration.

3.4.7 Anti-passback Set


Some occasions require the personnel that brush card to verify, brush card to come in from a
door must brush card to go out from another door, brush card record must enter a strict
correspondence. This function can be used when users enable it in the settings. It is generally
used in special units, scientific research, bank vaults and other occasions.
This section describes the Step of adding the Anti-Passback effect in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the [access Control] module, choose "Access Control > Anti-Passback" and click Add.

Step 2: Select the specified device.

instructions
 When you add an Anti-Passback device, the configured Anti-Passback device is not
displayed in the device list. After the antisubmarine information is deleted, the device
returns to the device list.
 The Anti-Passback setting varies with the number of gates controlled by the equipment:
- Anti-Passback setting of single door controller: Anti-Passback between reading heads
- Two controllers: door 1 Anti-Passback between reading heads, door 2 Anti-Passback
between reading heads, door 1 and door 2 Anti-Passback
- Four door controllers: door 1 and door 2 Anti-Passback, door 3 and door 4 Anti-Passback,
door 1/ door 2 and door 3/ door 4 Anti-Passback, door 1 and door 2/ door 3/ door 4
Anti-Passback, door 1 and door 2/ door 3/ door 4 Anti-Passback, door 1/ door 2/ door 3/
door 4 Anti-Passback reading head
Step 3: Select the Anti-Passback rule and click "OK" to complete the Settings, as shown in Figure 3-11. The
new Anti-Passback Settings are displayed in the list.

Figure 3-11 Adding the Anti-Passback configuration8

P a g e | 51 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.4.8 The First-person Normally Open


In the specified period, after the verification of the first person with normally open permission, the door
normally open, the end of the valid period of the door automatically closed.
This section describes how to add Step in ZKBio CVSecurityV6600.

The premise conditions


The time range has been set for the access control module.

Operation Step
Step 1: In the [access Control] module, choose "Access control > First person normally Open" and click Add.

Step 2: Select the specified device, add Settings for the specified door, and select the normally open time
period, and click 'OK', as shown in Figure 3-12.

Figure 3-12 Configuring the first person to open the door9

Step 3: Click "Add People" on the interface of "Opening of the first person". After adding people, click "OK"
to complete the setting of "opening of the first person", as shown in Figure 3-13.

Figure 3-13 Adding a first person Normally open person configuration10

P a g e | 52 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.4.9 Multi-people Open the Door


In a specific scenario, it is necessary for more than one person to be present at the same time to verify
their identity before they can open the door through permission verification.
instructions
 In an application scenario where, multiple users are required to verify their identities before opening the
door, the authentication process is limited to N (no more than 5) by grouping people into groups.
 In practice, if all the personnel to be verified are of the same type or level, it can be verified by multiple
people in a single group. If there are different categories or levels of personnel, you can set a certain
number of personnel in each group to achieve verification
 Before the multi-party door verification rule is reached, if the verification fails during the process, wait 10
seconds for the verification again
This section describes how to add Step to open multiple doors on the V6600.

Operation Step
Step 1: In the [access Control] module, choose "Access Control > Multiple Door Opening Personnel Group"
and click Add. After filling in the corresponding parameters, click "OK" to save the settings.

Step 2: Click "Add Personnel" on the right of the list of created multi-person door opening personnel, select
the personnel to be added to the group in the pop-up function, and click "OK" to save the settings,
as shown in Figure 3-14.

Figure 3-14 Adding multiple door openers11

Step 3: In the multi-person door opening interface, click "Add", set permissions for multi-person door
opening personnel group.

Step 4: On the page for adding multiple door users, select the specified door, group information for
multiple door users, and the number of verification personnel for each group, and click OK to save
the settings, as shown in Figure 3-15.

P a g e | 53 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-15 Adding multiple door openers12

Step 5: In the Access Control module, choose Access Control > Authentication Mode Rule and click Add to
set the access control authentication rule for the corresponding period, as shown in Figure 3-16.

Figure 3-16 Adding the configuration of the multi-party door opening verification rule13

Step 4: Click Add Door on the right of the created authentication mode rule, select a door, and set the
authentication mode rule for the door, as shown in Figure 3-17.

Figure 3-17 Verification rule configuration for adding multiple door openers

P a g e | 54 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 5: In the Access Control module, choose Access Control > Authentication Mode Rules Personnel Group,
click Add Personnel, and assign authentication rules to personnel, as shown in Figure 3-18.

Figure 3-18 Adding multiple door openers14

3.5 Setting of Access Control Permission


Access control permission groups define groups and categories of internal doors to facilitate subsequent
permission assignment operations.
Setting operations include creating access permission groups and adding doors to access permission
groups.

3.5.1 Create an Access Permission Group


This section describes how to create Step for access control groups in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Access Control Permission Group.

Step 2: Click Add in the left column, and the page for adding access control permission groups is displayed.

Step 3: On the page for adding access permission groups, set parameters based on the new requirements,
as shown in Figure 3-19.For parameter Settings, see Table 3-8.

Figure 3-19 Adding access permission groups

15

P a g e | 55 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter How to set up


Permission Group You can customize the name of the access control permission group
Name for easy query.

Access control Select the configured access time range to define the valid access
period time range for this permission group.

area Select the configured area from System > System Management >
Area Settings and define the area to which the access control group
belongs.

Table 3-8 Description of access control right groups7

Step 4: Click OK to finish configuring the access control right group.

3.5.2 Add a Door to the Access Permission Group


This topic describes how to add Operation Step to the door of the created access permission group in
ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Access Control Permission Group.

Step 2: Click Add Door, and the page for selecting a door is displayed. Add a door as required, as shown in
Figure 3-20.

Figure 3-20 Adding access permission groups Add doors16

Step 3: Click “OK” to finish configuring the door for the access control right group.

3.5.3 Set Access Control Permission Allocation


Permission assignment Manages the access permission of personnel. After permission
assignment, personnel can verify the door opening Operation.
You can assign user rights by user group or assign user rights by user group.

P a g e | 56 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.5.4 Assign Personnel Rights by Permission Group


Assigning personnel permissions by permission group is used to define a set of open-door
personnel for a permission group.
Describes Operation Step that assigns staff permissions by permission group in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Set by permission Group.

Step 2: In the Operation column of the corresponding permission group, tap Add Personnel. The Add
personnel page is displayed. Select personnel as required, as shown in Figure 3-21.

Figure 3-21 Assigning rights to users by rights group17

Step 3: Click "OK" to complete the assignment of personnel permissions.

3.5.5 Set Access Control Permission Groups by Person


Assigning access permission groups by person A permission set is used to define the access permission
set of a person.
This section describes Operation Step that assigns access control group permissions by person in ZKBio
CVSecurityV6600.

Operation Step
Step 1: In the [access Control] module, choose "Access control > Settings by Personnel".

Step 2: In the Operation column of the access control group, click Add Access Control group. The page for
adding access control groups is displayed. Select the access control group as required, as shown in
Figure 3-22.

P a g e | 57 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-22 Assigning rights groups by user18

Step 3: Click "OK" to complete the assignment of personnel permissions.

3.5.6 Set Access Control Permission Groups by Department


The access control permission group assigned by department defines the set of access control
permissions for the personnel in the department.
This section describes Operation Step that assigns access control group permissions by person in ZKBio
CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Access Control > Set by department.

Step 2: In the Operation column of the access control group, click Add Access Control group. The page for
adding access control groups is displayed. Select the access control group as required, as shown in
Figure 3-23.

Figure 3-23 Assigning rights groups by department19

Step 3: Click "OK" to complete the assignment of department permissions.

P a g e | 58 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.6 Advanced Access Control Function


Advanced access control is optional. You must obtain permission to activate the advanced access control.
In addition to the global linkage function, enable the background authentication function first.

3.6.1 Access Control Area Management


The access control area must be defined when advanced functions such as global Anti-Passback
are used.

3.6.1.1 Entrance Guard Area


Divide areas and define access control areas. The access control area is reserved for advanced access
control but not for system management.
This section describes Step in ZKBio CVSecurityV6600 to add an access control area.

Operation Step
Step 1: In the [access Control] module, choose "Advanced Access Control > Access Control Area" and click
"Add".

Step 2: On the page that is displayed, set related parameters, and tap OK, as shown in Figure 3-24.

Figure 3-24 Page for adding access control areas20

3.6.1.2 Reading Head Definition


This function is configured on the basis of the access control area. To use the global Anti-Passback
function, you must define the read head.
This section describes the Step of adding a Reader definition in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > Read Head Definition" and
click “Add”

Step 2: On the page that is displayed, set related parameters and tap OK, as shown in Figure 3-25.

P a g e | 59 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 3-25 Page for adding a Reader21

3.6.2 View People in the Area


After entering the access control area, users can use this function to view the personnel in the access
control area. You can choose the access control area tree to view the personnel in the corresponding
access control area.
This section describes how to view the steps of people in a region in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > View Personnel in the Area"

Step 2: On the page for viewing personnel in a region, you can select the area on the left to view and delete
personnel in the area, as shown in Figure 3-26.

Figure 3-26 View area personnel page22

3.6.3 Global Anti-passback


Global Anti-Passback Settings can be carried out across devices, and only push devices support global
Anti-Passback functions. This function supports logical Anti-Passback, timed Anti-Passback and timed
logical Anti-Passback, and can be configured for specific personnel.
This section describes the Step configuration of global Anti-Passback in ZKBio CVSecurityV6600.

The premise condition


1. Background authentication has been enabled on the device
2. Set the access control area and read head definition

P a g e | 60 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Operation Step
Step 1: In the [Access Control] module, choose "Advanced Access Control > Global Anti-Passback" and
click Add

Step 2: On the page for adding global Anti-Passback Settings, set related parameters and click OK, as shown
in Figure 3-27. For parameter description, see Table 3-9.

Parameter Parameters that


Rule name The value can contain a maximum of 30 characters.

Entrance guard area Select an option from the Access Control Area drop-down list box.

The door list controls The corresponding door information is displayed.The same gate
access to the access shall not be used to control two independent Anti-Passback
control area boundaries.

Anti-Passback type It contains three types of Anti-Passback: logic Anti-Passback, timing


Anti-Passback and timing logic Anti-Passback.

instructions

Logical Anti-Passback: strictly follow the "one in, one out" rule in the
Anti-Passback area, otherwise the verification will not open

Timed Anti-Passback: A user can enter the Anti-Passback area only


once within a specified period of time. After the specified period
expires, the user's status will be cleared and the user can enter the
Anti-Passback area again

Timed logical Anti-Passback: the user can open the door normally
only after following the exit and entry rules of logical
Anti-Passback.Timing logic antisubmarine is only used in abnormal
situations.For example: if the logical Anti-Passback time is set and
the personnel follows others out, the personnel cannot swipe the
card machine within the set locking time. The Anti-Passback state
will be reset after the set locking time, and the traffic can continue.

The locking time You can set the locking period only when you select timing
Anti-Passback or logic Anti-Passback type.

Reset global Clear the Anti-Passback status of personnel in the system and restore
Anti-Passback status the initialization status.

Reset Anti-Passback The reset time can be selected only when reset global Anti-Passback
time status is selected.

When it is time to reset Anti-Passback, the system will automatically


clear the Anti-Passback status of all personnel in the access control
area.

Applied to the All personnel, selected personnel, except selected personnel three
types:

Instructions

All personnel: This type can only be edited. Personnel selection is not
supported

Selected Personnel: If you select this type, you can add personnel.
This Anti-Passback type takes effect only for these personnel.

P a g e | 61 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter Parameters that


Personnel other than selected: Select this type, add personnel, this
Anti-Passback type will only take effect for personnel other than
selected.

Table 3-9 Global Anti-Passback Settings8

Figure 3-27 Global Anti-Passback Settings screen23

3.6.4 Global Linkage


The global linkage function can be set across devices. Only the push device supports the global linkage
function
This section describes how to configure Step for global linkage in ZKBio CVSecurityV6600.

Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Global Linkage and click Add.

Step 2: On the page for adding global linkage, set related parameters and tap OK, as shown in Figure 3-28.
Table 3-10 describes the parameter description to complete global linkage Settings.

Parameter The operation instructions


Linkage name You can customize the linkage name for easy query

It works for everyone After this parameter is selected, the linkage Settings take effect on all
personnel

Linkage trigger Select the condition triggered by the linkage Operation, that is, the
condition event type generated by the selected device

Input point Select the input point to set device input

P a g e | 62 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter The operation instructions


dots Select the output point to set device output

Set the output action type: close, open, normally open.

Sets the delay time if the output action is on.

Video linkage Pop-up video and display duration: Select pop-up video on the
real-time monitoring screen and set the pop-up duration.

Video recording and Video Duration: Select Video recording to set


the video duration.

Capture: Set linkage action whether to take a photo: If a photo is


taken, you also need to set whether to pop up on the real-time
monitoring interface and the display duration.

Valid time The reset time can be selected only when reset global Anti-Passback
status is selected

When it is time to reset Anti-Passback, the system will automatically


clear the Anti-Passback status of all personnel in the access control
area

mail Set the email address that receives the linkage content when a
linkage event occurs

Table 3-10 Global linkage parameters9

Figure 3-28 Global linkage Settings screen

P a g e | 63 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.6.5 The Global Mutual Lock


Global interlocking the global interlocking function can be set across devices. Only the push device
supports global interlocking.By setting the global interlock group to group doors, you can set global
interlock.
This section describes the Step configuration of global interlock in ZKBio CVSecurityV6600.

The premise condition


Background authentication has been enabled on the device

Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Global Interlock Group and click Add.

Step 2: On the page for adding a global interlock group, set related parameters and click OK, as shown in
Figure 3-29.

Figure 3-29 Global interlock group Settings screen24

Step 3: On the global interlock group page, tap Add Door next to the configured group name on the left, as
shown in Figure 3-30.

Figure 3-30 Adding a door to a global interlock group25

Step 4: In the access Control module, choose Advanced Access Control > Global Interlock and click Add.

On the page for adding global interlock, set related parameters and click OK, for example

P a g e | 64 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 5: The global interlock name is set, as shown in Figure 3-31.

Figure 3-31 Global interlock Settings screen26

Step 6: On the global interlock screen, click Add Group next to the configured global interlock on the left, as
shown in Figure 3-32.

Figure 3-32 Page for adding global interlock groups27

3.6.6 Personnel Effectiveness


It is used to restrict the expiration date, the number of days after the first use, and the number of times
the user passes the specified advanced access control area.
This section describes how to configure Step on the V6600.

The premise condition


1. Background authentication has been enabled on the device
2. Set the access control area and read head definition

Operation Step
Step 1: In the access Control module, choose Advanced Access Control > Effectiveness of Personnel > Set
Access Control Area Properties, and click Add.

P a g e | 65 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 2: On the access control area properties page, set related parameters and click OK, as shown in Figure
3-33.

Figure 3-33 Page for setting access area properties28

Step 3: In the properties of the access control area that has been set, click Add Personnel on the left to add
the corresponding personnel, and click OK, as shown in Figure 3-34.

Figure 3-34 Personnel availability Add personnel Settings screen29

Step 4: On the personnel validity screen, tap Add, set related parameters, and tap OK, as shown in Figure
3-35.

Figure 3-35 Personnel validity setting screen

P a g e | 66 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

3.6.7 The Number of Control


Control the maximum/minimum capacity of the area in the advanced access control.
This section describes the Step configuration for population control in ZKBio CVSecurityV6600.

The premise condition


1. Background authentication has been enabled on the device
2. Set the access control area and read head definition

Operation Step
Step 1: In the [access Control] module, choose "Advanced Access Control > Number Control" and click
Add

Step 2: On the Add Person control screen, set related parameters and tap OK, as shown in Figure 3-36

Figure 3-36 Configuring the number control function30

3.7 Results

3.7.1 Real-time Monitoring


On the real-time management screen, the status of the added device is displayed and the device can be
opened or closed.At the same time, the dynamic of real-time events is monitored. If the door opening can
be verified and corresponding access control events can be generated, the access control management
service configuration is complete.

Operation Step
Step 1: Check whether the device is online.

1. In the access Control module, choose Access Control Device > Real-time Monitoring.
2. Check whether the icon status of the added device is online. For details about the icon status, see
Table 3-11.

P a g e | 67 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Icon State Icon State

The device is disabled. Door offline status

No door status sensor, relay Door status sensor not set,


/ off/no relay status / relay open/no relay state

The door is closed and the


The door is closed and the
relay is off/no relay is in online
/ / relay is on/no relay
state

On line door open, relay On line door open, relay


/ closed/no relay / open/no relay state

The door opens to alarm and


Door opens alarm, relay closes
the relay opens

Door opening timeout alarm, Door opening timeout alarm,


relay closed/no relay, door relay open/no relay, door
/ /
magnetic open magnetic open

Door opening timeout alarm, Door opening timeout alarm,


relay closed/door magnetic relay open/door magnetic
closed close

Door close alarm, relay off/no Door close alarm, relay


/ relay status / open/no relay status

No door magnetic setting, No door magnetic setting,


door alarm, relay closed door alarm, relay open

Door opening timeout alarm,


The door was locked
no relay/door magnetic
closing

Note: If there is no relay status, the current firmware does not support the "Check
relay Status" function.
Table 3-11 Description of door types10

Step 2: Remote opening/closing verification, taking remote opening as an example

1. Select the online door device, click "Remote door opening", enter the user password in the pop-up
security verification, and click "OK".
2. On the remote door opening screen, enter the time to open the door and tap OK, as shown in Figure
3-37.
3. If "Operation succeeded" is displayed, the remote door opening Operation is complete.

P a g e | 68 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

13.3.2 Device Addition

Introduces the configuration steps of searching for additional channel devices in ZKBioSecurity.

Precondition
1. Set up IP allocation before adding channel devices.
2. Before searching and adding the device, it is necessary to set the address pointing to the server in
advance, and set the IP address and port of the current server, that is, the IP address and adms port
installed by the current.

Operating steps
Step 1: In the Channel module, select Device Management > Devices.

Step 2: In the device interface, click "Search" to pop up the search box.

Step 3: Click "Start Search" in the search box to display the channel devices that can be added, as shown
in Figure 13-3.

Figure 13-3 Device Search Interface

Step 4: For the channel Device found, click the "Add" button in the operation bar to add the device, and
fill in the parameters of device addition, as shown in Figure 13-4. Please refer to Table 13-2 for
parameter description.

P a g e | 482 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 13-4 Device Addition Interface

Parameter How to set

Device name Any character, a combination of up to 20 characters,


cannot be repeated.

Channel Select the channel to which the device belongs.

Add to Permission Group Automatically adds the device to the selected


permission group.

Delete data in device when When the device is added, the data in the device
adding except the event record is deleted.

Table 13-2 Description of device Addition Parameters

Step 5: Click "OK" to complete the addition of channel device.

--End

13.4 Access Control


By setting the gate authority group and assigning it to the corresponding personnel, the gate authority of
the personnel can be controlled. At the same time, it is also possible to set the response rules to the gate
through Anti-Passback and linkage, so as to meet the requirements of different entry and exit scenarios.

13.4.1 Gate Permission Setting

Gates added to the system should be set in the form of permission groups. Set the corresponding
permission group, add gates to the permission group, and define the area where the permission group
belongs.
Introduces the steps of creating and configuring the access control authority group in ZKBioCVSecurity.

Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Gate Permission Group". In the gate
permission group interface, click "Add" in the left column of the mouse to pop up the gate
permission group adding interface.

P a g e | 483 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 2: In the new interface of gate permission group, set the corresponding content according to the
new requirements, as shown in Figure 13-5; Please refer to Table 13-3 for parameter filling
instructions.

Figure 13-5 Add Gate Permission Group Interface

Parameter How to set

Permission group Any character, consisting of up to 30 characters, cannot be repeated.


name

Region Permission groups belong to a zone to which users assigned


permissions can manage permission groups under the zone.

Table 13-3 Description of Added Gate Permission Parameters

Step 3: Click "OK" to complete the configuration of the access control authority group.

Step 4: In the gate permission group interface, click "Add Gate" on the right side of the created gate
permission group, and the interface of selecting Add Gate will pop up, and the corresponding
gate will be added according to the requirements, as shown in Figure 13-6.

Figure 13-6 Adding Gate Interface

Step 5: Click "OK" to complete the setting of gate permissions.

--End

P a g e | 484 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

13.4.2 Set by Permission Group

Assign the added gate permission group to the person.


Introduces the operation steps of allocating personnel authority according to authority group in
ZKBioCVSecurity.

Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Setting by Permission Group".

Step 2: Click "Add Person" in the operation bar of the corresponding permission group to open the
interface of adding person. Select the corresponding person as needed, as shown in Figure 13-7.

Figure 13-7 Setting UI by Permission Group

Step 3: Click "OK" to complete the assignment of personnel permissions.

--End

13.4.3 Antisubmarine Setup

At present, it supports Anti-Passback in and out. On some occasions, people who require card swiping
verification must swipe their cards from another channel when they come in from one channel, and the
card swiping records must be strictly corresponding to one entry and one exit. Users can use this function
when they enable it in settings, which is generally used in special units, scientific research, bank vaults
and other occasions.
This paper introduces the configuration steps of adding Anti-Passback effect in.

Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Anti-Passback" and click Add.

Step 2: Select the specified device.

Description
 When adding Anti-Passback, you can't see the device that has been set up in Anti-Passback in the
device list. After deleting the set Anti-Passback information, the device returns to the device list.
 Anti-Passback settings of all-in-one machine: Anti-Passback, Anti-Passback and Anti-Passback.

P a g e | 485 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 3: Select the Anti-Passback rule and click 'OK' to complete the setting, as shown in Figure 13-8. The
newly added Anti-Passback settings are displayed in the list of selected Anti-Passback rules.

Figure 13-8 Added Anti-Passback interface

--End

13.4.4 Linkage Setting

After a specific event is triggered at a certain input point in the channel system, a linkage action will be
generated at the specified output point to control the events such as verification opening, alarm and
anomaly in the system, which will be displayed in the corresponding event list monitored.

Precondition
Before linking new configurations, you need to do the following:
 Gate device, input point, output point, read head binding camera add settings.
 Mailbox parameter configuration

Operating steps
Step 1: In the "Channel" module, select "Channel Access Control > Linkage".

Step 2: In the linkage setting interface, select and click the "Add" button to fill in the corresponding
parameters, as shown in Figure 13-9. Please refer to Table 13-4 and Figure 13-5 for linkage
parameters.

P a g e | 486 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 13-9 New Linkage Interface

Parameter How to set


Linkage name Custom setting linkage name for easy reference.

device Customize and select the added access control device.

Linkage Select the condition under which the linkage operation is triggered,
departure that is, the type of event generated by the selected device.
conditions

Input point Select the input point to set the device input.

Output point Select the output point to set the output of the device.

Linkage action Choose to set up linkage action, including device operation of


setting output point, video linkage and mail. Refer to Table 16-5 for
configuration description of the three modes.

Table 13-4 Description of New Linkage Parameters

Parameter How to set


Output point Set the action type of output point: closed, open and normally open.
operation
Sets the delay time if the output point action is on.

Video linkage Pop-up video, display duration: check the pop-up video in the
real-time monitoring interface, and set the pop-up duration.

Video recording and video recording duration: Check to record and


set the video recording duration. Capture: Set whether the linkage
action takes pictures: If you take pictures, you also need to set

P a g e | 487 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter How to set


whether it pops up in the real-time monitoring interface and the
display time.

Mail Set the email address of the received linkage content when the
linkage event occurs.

Table 13-5 Explanation of Output Action Parameters

Step 3: Click "OK" to complete the linkage configuration.

--End

13.5 Channel Setting


By maintaining the gate traffic rules (control time period and traffic mode) and setting the gate
parameters corresponding to the gate, the gate function can be directly controlled by software.

13.5.1 Setting of Gate Traffic Rules

Set the passage time period and passage mode of the gate, so that the gate can set different entry and
exit passage modes in different time periods. It can be applied to wing Barrier and swing Barrier.
This paper introduces the configuration steps of gate traffic rules in ZKBioCVSecurity.

Operating steps
Step 1: In the "Channel" module, select "Channel Settings > Gate Traffic Rules".

Step 2: Click "Add" with the mouse, and the interface for adding gate traffic rules will pop up.

Step 3: In the new interface, set the corresponding contents according to the new requirements, as
shown in Figure 13-10; Please refer to Table 13-6 for parameter setting instructions.

Figure 13-10 Interface of Adding Gate Traffic Rules

P a g e | 488 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter How to set


Name of gate traffic Any character, up to 30 characters.
rules

Remarks The explanation of the current time period and the main
application occasions shall consist of 5 0 characters at most.

Time interval A gate passage rule contains up to five time intervals in a week.

Time Set the start and end time in each time interval.
interval-start/end
time

Time interval-traffic Set the traffic mode in each time interval and select it from
mode drop-down.

There are 10 traffic modes by default:

"Two-way controlled", "free entry and exit controlled", "controlled


entry and exit free", "two-way freedom", "forbidden entry and exit
controlled", "forbidden entry and exit free entry", "free entry and
exit forbidden entry", "two-way prohibition", "remote normal
opening".

Copy Monday time You can quickly copy Monday settings to other workdays.
to other working
days

Table 13-6 Parameter Description of Gate Traffic Rules

Step 4: Click "OK" to complete the addition of the gate traffic rules.

--End

13.5.2 Wing Barrier

Introduces the parameter configuration steps of wing Barrier in ZKBioCVSecurity.

Operating steps
Step 1: In the Channel module, select Channel Settings > Wing Barrier.

Step 2: In the wing Barrier interface, click the "Edit" button under the name or operation of the wing Barrier
to enter the wing Barrier parameter editing interface, as shown in Figure 13-11. Please refer to
Table 13-7 for parameter description.

P a g e | 489 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 13-11 Wing Barrier Parameter Configuration Interface

Parameter How to set


Device name Name of wing Barrier device, non-editable.

Gate name Custom Setting Notes Description.

Gate traffic rules Drop-down selection to select the data of gate traffic rules.

Opening Low speed, medium speed and high speed, set the speed of opening
speed/closing speed and closing the gate.

Delayed shutdown After passing through the last pair of infrared channels, set the delay
time closing time. You can set 0 to 10s, and the default is 0s.

Unmanned time The maximum waiting time after verification is 5 ~ 60s, and the
default value is 10s. If no pedestrians pass beyond the set time, the
gate will be closed.

In-channel No authentication in the channel is allowed.


authentication
 When checked the verification in the channel can open the
gate;
 If it is not checked, the gate cannot be opened for verification
in the channel, and the gate can be verified only after exiting
the gate.

Table 13-7 Explanation of wing Barrier parameters

Step 3: Click "OK" to complete the configuration of wing Barrier parameters.

--End

P a g e | 490 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

13.5.3 Swing Barrier

This paper introduces the parameter configuration steps of swing Barrier in ZKBioCVSecurity.

Operating steps
Step 1: In the Channel module, select Channel Settings > Swing Barrier.

Step 2: In the swinging interface, click the "Edit" button under the swinging name or operation to enter the
swinging parameter editing interface, as shown in Figure 13-12. Please refer to Table 13-8 for
parameter description.

Figure 13-12 Swing Barrier Parameter Configuration Interface

Parameter How to set


Device name The name of the swing Barrier device cannot be edited.

Gate name The gate name corresponding to the swing gate device is generally
one all-in-one device corresponding to one gate, which cannot be
edited.

Gate traffic rules Drop-down selection, the option is taken from the data of "Channel
Settings" > "Gate Traffic Rules".

Opening Low speed, medium speed and high speed, set the speed of
speed/closing opening and closing the gate.
speed

Delayed shutdown After passing through the last pair of infrared channels, set the
time delay closing time. You can set 0 ~ 10s, and the default is 0s.

Unmanned time The maximum waiting time after verification is 5 ~ 60s, and the
default value is 10s. If no pedestrians pass beyond the set time, the
gate will be closed.

P a g e | 491 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

In-channel Whether authentication in the channel is allowed.


authentication
 When checked the verification in the channel can open the
gate;
 If it is not checked, the gate cannot be opened for verification
in the channel, and the gate can be verified only after exiting
the gate.

Table 13-8 Description of Swing Barrier Parameters

Step 3: Click "OK" to complete the configuration of wing Barrier parameters.

--End

13.6 Result Validation

13.6.1 Report

In the Channel report, you can query the All Records, Today's Access Records, Person's Last Access
Location, and All Exception Records reports. You can choose to export all or export records after querying.
This paper introduces the configuration steps of report query and export in, taking "all records" report
operation as an example.

Operating steps
Step 1: In the Channel module, select Report > All Records.

Step 2: In the All Records interface, fill in the corresponding query information and click the 'Query'
symbol to complete the query of all record tables, as shown in Figure 13-13.

Figure 13-13 All Records

Step 3: In the full record interface, click "Export", enter the user password in the pop-up security
verification, and click "OK". Select whether to encrypt and export the file format, and click OK, as
shown in Figure 13-14.

P a g e | 492 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 13-14 Report Export Interface

Step 4: After selecting the address where the corresponding file is stored, the export of the file can be
completed.

P a g e | 493 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

14 Temperature Detection

14.1 Operation Scenario

Under the epidemic situation, the device measures the body temperature of real-time monitoring
personnel, alarms and monitors the abnormal body temperature records, and summarizes and
warns these records, so that managers can take timely measures and play an active role in epidemic
prevention.

14.2 Operation Flow


This paper introduces the configuration process of epidemic prevention management business.
The configuration process of epidemic prevention management business is shown in Figure 14-1.

Figure 14-1 Epidemic Prevention Configuration Process

14.3 Setting of Epidemic Prevention Parameters


This paper introduces the configuration steps of epidemic prevention parameters in ZKBioCVSecurity.

Precondition
In "Access Control Management", add device supporting body temperature detection, please refer to
3.3 for adding device.

P a g e | 494 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Operating steps
Step 1: In the Access Control module, select device > device.

Step 2: After selecting the device, click "Settings > Setting Extension Parameters" to pop up the interface.

Step 3: In the interface of setting extended parameters, you can view the epidemic prevention
parameters on the device, as shown in Figure 14-2. Please refer to Table 14-1 for parameter
configuration.

Description
Epidemic prevention parameters are set and changed on the device side.

Figure 14-2 Setting interface of epidemic prevention parameters

Parameter Description
Body temperature  Open: turn on the temperature measurement function
detection attribute
 Close: Turn off the temperature measurement function
Abnormal body  Open: abnormal body temperature passes
temperature is
 Close: Abnormal body temperature does not pass
impassable

Upper limit of Set the threshold of device body temperature, if it exceeds, the
temperature detection body temperature will be abnormal
threshold

Temperature correction Adjust the deviation value of device body temperature


deviation value

Temperature unit Celsius, Fahrenheit


Infrared temperature Near, medium and far
measuring distance

Mask detection attribute  Open: Test mask


 Close: Do not test masks
Trigger the external  Open: Open the external alarm function
alarm function
 Turn off: Turn off the external alarm function
Allow unregistered Carry out normal temperature measurement
personnel to pass

Table 14-1 Description of epidemic prevention parameters

P a g e | 495 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 4: Click "OK" to complete the configuration of epidemic prevention parameters.

14.4 Result Validation


In the real-time monitoring interface of epidemic prevention management, the real-time events of
temperature measurement and epidemic prevention can be obtained correctly, and the information
can be displayed correctly, which represents the completion of epidemic prevention management
business configuration.

Precondition
In the "Epidemic Prevention" module, select "Epidemic Prevention Management > Parameter Setting"
to set the temperature threshold setting, which is used for the data statistical basis in the epidemic
prevention report, as shown in Figure 14-3.

Figure 14-3 Parameter Setting Interface of Epidemic Prevention Report

Operating steps
Step 1: In the "Epidemic Prevention" module, select "Epidemic Prevention Management > Real-time
Monitoring".

Step 2: After opening the real-time monitoring interface, carry out temperature measurement
verification on the temperature measuring device.

Step 3: In the real-time monitoring interface, events are generated, and data are displayed correctly,
which represents the completion of epidemic prevention management business configuration,
as shown in Figure 14-4.

P a g e | 496 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 14-4 Real-time monitoring interface for epidemic prevention

--End

P a g e | 497 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15 Intelligent Scene

Scene Description

The "Intelligent Scene" module focuses on intelligent scene business, and realizes design concepts such
as enabling application, data analysis, process management and access control linkage based on scene
application and data display through the perception and analysis ability of intelligent NVR or Intelligent
cameras, providing intelligent and convenient intelligent scene solutions for small and micro customers.
The whole module includes three menus: scenario application, business configuration and report. Scene
application includes target finding, key personnel monitoring, Tailing Detection monitoring, Perimeter
Protection, leaving the post and leaving the post, and number control functions.

15.1 Operation Flow


Introduce the configuration process of intelligent scenario business.
The Intelligent scenario business configuration process is shown in Figure 15-1.

Figure 15-1 Intelligent Scene Configuration Process

P a g e | 498 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.2 Target Search

Operation scenario
Taking personnel name, ID and certificate number as retrieval conditions or uploading personnel pictures,
the intelligent scene event records of personnel within a certain time range are searched and the
corresponding trend report is generated.

Personnel Information Query Intelligent Scene Events

Operating steps
Step 1: In the Intelligent Scenario module, select Scenario Application > Target Finding.

Step 2: In the target search interface, fill in the time period and data source, enter the name or job
number of the person in the search box and click "Search" to find the target, as shown in Figure
15-2.

Figure 15-2 Target lookup condition retrieval

Step 3: After the retrieval, the retrieval results appear, as shown in Figure 15-3.

Figure 15-3 Object lookup retrieval results

P a g e | 499 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 4: In the retrieval result, you can click "Generate Trend Report" in the upper right corner of the
interface to export the trend report in PDF format, as shown in Figure 15-4.

Description

If the point is empty, the movement report cannot be exported.

Figure 15-4 Export personnel movement interface

---- End

Upload personnel pictures to query Intelligent scene events

Operating steps
Step 1: In the [Intelligent Scene] module, select "Scenario Application > Target Search".

Step 2: In the target search interface, click the icon, in the pop-up interface, select the personnel picture
on the local computer, click OK, and directly jump to the target search interface, as shown in
Figure 15-5.

Figure 15-5 Searching for uploaded personnel pictures

P a g e | 500 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 3: After the search is over, the search results will appear, as shown in Figure 15-6.

Figure 15-6 Search results of personnel picture search

Step 4: In the search results, you can click "Generate Trend Report" in the upper right corner of the
interface to export the trend report in PDF format. The export trend report interface is shown in
Figure 15-7.

Description

If the point is empty, the trend report cannot be exported.

Figure 15-1 Export staff movement report

---- End

P a g e | 501 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.3 Preset
Intelligent scene detection based on video face recognition function, need to set specific function
detection time period.

Operating steps
Step 1: In the “Intelligent Scenario” module, select "Service Configuration > Time Period".

Step 2: Click the "Add" button and set the daily time period in the pop-up time period new function
pop-up window, as shown in Figure 15-8.

Figure 15-2 Time period configuration

Step 3: Click "OK" to save the settings.

---- End

P a g e | 502 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.4 Key Personnel Monitoring


Through the construction of various types of key personnel to monitor the face database, the front-end
camera is used for face capture, comparison and recognition, and an early warning is issued when the
database hits.

15.4.1 Personnel List Setting

Introduces the operation of the personnel list library creation function set in the key personnel
monitoring pre-set.

Operating steps
Step 1: In the “Personnel” module, select "Personnel Management > List Library"

Step 2: Click "Add", configure the relevant parameters, and complete the new list library, as shown in
Figure 15-9.

Figure 15-3 Added personnel list library interface

Step 3: Click the "Add Person" button on the right side of the list database information to add the
personnel registered to the system to the list database, as shown in Figure 15-10.

Figure 15-4 Add people to the list

---- End

P a g e | 503 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.4.2 Key Personnel Monitoring Policy Settings

Introduce the operation steps to realize the key personnel monitoring function.

Operating steps
Step 1: Introduce the operation steps to realize the key personnel monitoring function。

Step 2: Click the "Add" button on the application configuration interface, and in the pop-up new
function pop-up window, select the "Key Personnel Monitoring" option page, and set the
corresponding control detection conditions, as shown in Figure 15-11. For parameter
descriptions, please refer to Table 15 -1 shown.

Figure 15-5 Added personnel control policy settings

Field name Field definition


Device Name Select the camera device for face control detection.

Effective time The key personnel monitoring strategy detection period. Only the
period time period list can test the content of "16.4 Pre-settings".

Control target Key personnel monitoring strategy event record detection


control target. For the specific list, please refer to the "16.5.1
Personnel List Settings" section.

Enable Enable status switch of key personnel monitoring policy.

Table 15-1 Personnel control setting parameter description

Step 3: Click "OK" to save the settings.

---- End

P a g e | 504 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.4.3 Result Verification

Operating steps
Step 1: In the “Intelligent Scenario” module, select "Scenario Application > Key Personnel Monitoring".

Step 2: The information displayed on the "Key Personnel Monitoring" interface is the real-time monitoring
information of the control settings that have taken effect in the system, as shown in Figure 15-12,
and the interface description is shown in Table 15-2.

Figure 15-6 Personnel control real-time monitoring interface

Field name Field definition


Today's data Relevant data of personnel management and control on the day,
including today's data of the total number of snapshots,
strangers, banned lists, and allowed lists, and the data is updated
in real time.

The total number of The curve chart visually displays the occurrence trend of key
snapshots and the situation personnel monitoring events, including four-time dimensions of
day, week, month, and year. 。

Allowed/Strangers/Forbidden Shows the real-time events of allowed/strangers/banned list


List Real-time Events personnel in real time.
 Each personnel control record includes the time of
occurrence, snapshot photos, registered photos, similarity,
library name, name, viewing related and other elements.
 Click the record area, support the pop-up box to view the
event details of the record, click to view related, support to
view other snapshot records of the person.

Table 15-2 Parameter description of face control interface

---- End

P a g e | 505 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.5 Monitoring of Tailing Detection


The video face recognition is linked with the door opening event record of the access control module,
and the Intelligent camera captures the face and compares it to determine the identity and job number of
the person and compare it with the job number of the access control event. Entering, the snapshot
cannot confirm the identity of the stranger, and realizes the key monitoring and prevention of tailing
detection.

15.5.1 Tailing Detection Monitoring Policy Settings

Operating steps
Step 1: In the “Intelligent Scenario” module, select "Service Configuration > Application Configuration".

Step 2: In the “Intelligent Scenario” module, select "Service Configuration > Application Configuration".

Figure 15-7 New Tailing Detection Monitoring Settings

Parameter name Parameter description


Device Name Select the camera to set the Tailing Detection monitoring function.

Effective time Set the effective time period of the Tailing Detection monitoring function,
period and the time period list can refer to the content in "15.4 Pre-settings".

Binding Door Binding Door Select the door information bound to the camera with the
Tailing Detection monitoring function.

Monitoring Set the direction of entrance and exit to be monitored.


direction

Binding Channel Select the channel information that the Tailing Detection monitoring
function is bound to the camera.

Enable The Tailing Detection monitoring settings enable switch.

Table 15-3 Description of Tailing Detection monitoring parameters

Step 3: Click "OK" to save the settings。

---- End

P a g e | 506 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.5.2 Result Verification

Operating steps
Step 1: In the "Intelligent Scenario" module, select "Scenario Application > Tailing Detection Monitoring".

Step 2: Perform real-time monitoring and viewing of relevant records according to the Tailing Detection
monitoring doors, as shown in Figure 15-14.

Figure 15-8 Tailing Detection monitoring interface

---- End

15.6 Perimeter Protection


Through the intelligent camera crossline analysis function, perimeter protections are delineated in the
anti-crossing areas in passages, boundaries, entrances and exits, and alarms are triggered when crossing
the fence. The crossing fence realizes the empowerment and supplementation of equipment such as
access gates, physical fences, and security gates, and analyzes and warns illegal crossing behaviors
through computer vision.

15.6.1 Perimeter Protection Policy Settings

Operating steps
Step 1: Access the camera background, set the line statistics and draw lines, as shown in Figure 15-15.

P a g e | 507 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 15-9 Set the camera over-the-line statistics to draw the line

Step 2: In the "Intelligent Scenario" module, select "Service Configuration > Application Configuration".

Step 3: In the application configuration interface, click the "Add" button, select the "Perimeter
Protection" tab, and set the relevant parameters, as shown in Figure 15-16. For parameter
descriptions, please refer to Table 15-4.

Figure 15-10 New Crossline Fence Settings

Parameter Parameter description


name
Device Name Select the camera to set the cross-limit bar function.

Effective time Set the effective time period of the Tailing Detection monitoring
period function, and the time period list can only test the content of "15.4
Pre-settings".

Enable The Tailing Detection monitoring settings enable switch.

Table 15-4 Cross fence parameter settings

Step 4: Click "OK" to save the settings.

---- End

P a g e | 508 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.6.2 Result Verification

Operating steps
Step 1: In the "Intelligent Scene" module, select "Scenario Application > Perimeter Protection".

Step 2: View real-time monitoring data on this interface, as shown in Figure 15-17.

Figure 15-11 Real-time monitoring interface across the fence

---- End

15.7 Attendance Checking Detection


Through the intelligent camera people counting function to realize the monitoring and alarm of leaving
work and leaving the post, by demarcating the monitoring area, setting the monitoring of leaving work
and leaving the post, the camera calculates the number of people in the area in real time, and triggers the
alarm of leaving work and leaving work when no one is on duty. This function is mainly used for
monitoring security Business scenarios that need to be on duty at all times, such as rooms, monitoring
rooms, and sentry posts.

Preconditions
The camera supports (D series) and the Population Density function parameter is turned on. See
"Population Density"

15.7.1 Attendance Checking Policy Settings

Operating steps
Step 1: Log in to the camera settings interface, select the "Population Density" tab in the "Advanced
Configuration > Intelligent Analysis > General Intelligence" interface, and check to enable the
Population Density function, as shown in Figure 15-18.

P a g e | 509 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 15-12 Population Density monitoring with built-in camera

Step 2: In the “Intelligent Scenario” module, choose Scenario Application > Retirement.

Step 3: Click the location to be configured on the Attendance Checking and off-duty monitoring
application configuration interface, click the "Add" button, select the "Cross Line Fence" tab, and
interfaceset
orthe
on relevant
the parameters, as shown in Figure 15-19. For parameter descriptions, please refer to
Table 15-5 shown.

Figure15-13 Add Attendance Checking detection

Parameter Parameter description


name
Device Name Select the camera to set the cross-limit bar function.

Effective time Set the effective time period of the Tailing Detection monitoring
period function, and the time period list can only test the content of "15.4
Pre-settings".

Enable The Tailing Detection monitoring settings enable switch.

Table 15-5 Resignation parameter description

Step 4: Click "OK" to save the settings.

---- End

P a g e | 510 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

15.7.2 Result Verification

Operating steps
Step 1: In the “Intelligent Scenario” module, select "Scenario Application > Retirement".

Step 2: The relevant data can be viewed in this real-time monitoring interface, as shown in Figure 15-20.

Figure 15-14 Attendance Checking and off-duty monitoring interface

---- End

15.8 People Counting


Counting the number of people entering and leaving the area through the crossline statistics function of
the Intelligent camera, entering +1, going out -1, setting the area capacity, calculating the number of
people in the area, dynamically displaying whether the area can enter the state, and realizing its business
needs, especially to meet the current epidemic situation. In the context, the passenger flow control of
supermarket stores.

15.8.1 People Control Policy Settings

Operating steps
Step 1: Access the camera background, and set the line statistics to draw lines, as shown in Figure 15-21.

P a g e | 511 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 15-15 Set the camera to draw a line across the line fence

Step 2: In the “Intelligent Scenario” module, choose "Business Configuration > Statistical Scope
Management".

Step 3: Click the "Add" button to set the parameters of the statistical range of the number of people, as
shown in Figure 15-22. For parameter descriptions, please refer to Table 15-6.

Figure 15-16 Added parameter interface for statistical range

Parameter Parameter description


name
Range Custom statistics range number.
number

Scope name User-defined statistical scope name.

Statistical The information of the face recognition camera selected under the
equipment statistical rule (multiple choices).

Clearing Data statistics automatic clearing strategy setting, providing options of


strategy "no clearing" and "zero clearing".

Maximum The maximum number of personnel allowed in the custom statistics


Capacity area.

Notes Customize the note information.

Table 15-6 Description of new parameters in statistical range

P a g e | 512 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 4: Click "OK" to save the settings.

---- End

15.8.2 Result Verification

Operating steps
Step 1: In the "Intelligent Scene" module, select "Scenario Application > People Control".

Step 2: The relevant dynamic data can be viewed in the real-time monitoring interface of regional
people statistics, as shown in Figure 15-23

Figure 15-17 Number of real-time control interface

---- End

P a g e | 513 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

16 Service Center

16.1 The Scene that


This module integrates the device and event logging of the system module.Users can import a map to the
map center to view the distribution of monitoring points and alarm sources. When an alarm occurs, users
can view the location and surrounding conditions of the alarm source, select a suitable monitoring point,
and view video live, playback, and human movement functions.

16.2 Devcenter

16.2.1 Equipment

Devices added to the access control and video module are displayed on the screen, and basic device
information is displayed, as shown in Figure 16-1.

Figure 16-1 Device display page1

16.3 Event Center


Through the definition of the event level and type, it makes the level prompt for the record generated
under real-time monitoring.

16.3.1 Event Level

The software has four default event levels: Critical, Abnormal, Normal, and cannot be edited.See Figure
16-2.

P a g e | 514 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 16-2 Hardware level page2

16.3.2 The Event Type

The software contains event types by default. You cannot add new event types. You can customize the
level of the event type.
This section describes how to modify Step.

Operation Step
Step 1: In the Service Center module, choose Event Center > Event Type.

Step 2: On the event type page, select the event type to be modified and click Set Level. The Set level
dialog box is displayed, as shown in Figure 16-3.

Figure 16-3 Modify event level page3

Step 3: After selecting the desired level, click OK to complete changing the event type level.

---- End

16.3.3 The Event Log

This screen records all events generated on the platform, as shown in Figure 16-4.

P a g e | 515 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 16-4 Event recording page4

16.4 The Message Center


This interface records the message reminding events generated by the attendance and visitor module, as
shown in Figure 16-5.

Figure 16-5 Message record page5

16.5 The Map Center


You can import a map to set monitoring points. When an alarm occurs, you can immediately view the
location of the alarm source and surrounding conditions, select an appropriate monitoring point, and
view live videos, playback, and personnel movements.

16.5.1 Map Configuration

By importing the map and configuring the corresponding monitoring points, the distribution of the
current monitoring points can be intuitively displayed.

P a g e | 516 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

instructions
 Table 16-1 describes the ICONS on the map configuration page.

Icon Instructions
Full screen.

The refresh.

Return to the previous level.

Drag ICONS of access control and camera and move


coordinates; After Operation is finished, click , can be
saved.

Add the icon of the access control device.

Add a camera icon.

Add submaps.

Operation to zoom in and out of the map.

Move the mouse over the "door or Video" device on the


map and right click it out.

Add a map.

The editor.

Table 16-1 Map configuration ICONS1

The premise conditions


 The access control device is added to the access control module
 Add the camera device under the video module

16.5.1.1 Add a Map


This section describes how to add Step of map configuration in the Service Center module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".

Step 2: In the map configuration screen, click on the left bar the page for adding a map is displayed, as
shown in Figure 16-6. For details about the parameters, see Table 16-2.

P a g e | 517 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 16-6 Add Map page6

The map type Parameter Instructions

Normal mapping name Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
(Using the map drawn Settings.
by the user, as the
background loading,) Map path Select the map you want to add, that is, the map image
file that exists on the local server in advance.

instructions
 Map is supported formats. Jpe \. JPG \. Jpeg \. GIF \.
PNG \. BMP \. Ico \. SVG \. SVGZ \. Tif \. Tiff \. Ai \.
DRW \. PCT \. PSP \. XCF \. PSD \. Raw \. Webp image
file
 Map image file size should not exceed 1120 × 380px
hypergraph name Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.

Map path To set up a GIS server, set parameters on the server, and
then set these parameters.
Route analysis
path

projection

The center X/Y Fill in the latitude and longitude.


coordinate

Initialize the The general choice for initial scaling is around 13.
scaling level

Maximum zoom Custom map zoom size.


level/minimum
zoom level

Google maps area Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.

The map key Log on to the platform for


https://cloud.google.com/maps-platform for registration
for the key.

P a g e | 518 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

The map type Parameter Instructions

instructions
You need to turn on the Directions API on Google's
platform to map people's movements.
Initialize the The general choice for initial scaling is around 13.
scaling level

The center X/Y Fill in the latitude and longitude.


coordinate

Baidu map area Select the area to which you want to add the map.For
details about how to configure regions, see 18.2 Region
Settings.

The map key Log in to http://lbsyun.baidu.com/ to register and obtain


the key.

Initialize the The general choice for initial scaling is around 13.
scaling level

The center X/Y Fill in the latitude and longitude.


coordinate

Table 16-2 Parameters for adding a map2

Step 3: Set parameters based on the type of the map to be added and click OK to finish adding the map.

---- End

16.5.1.2 Add Submap (Optional)


This section describes how to add sub-map configuration Step on the map in the "Service Center"
module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".

Step 2: On the map configuration screen, select a region map and click on the right to add submaps.

Step 3: In the Add Map list on the left of the page, drag a submap to place it on the map, as shown in
Figure 16-7.

P a g e | 519 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 16-7 Add submap page7

Step 3: Click "Submit" under add map on the left to complete the configuration of the sub-map.

---- End

16.5.1.3 Add a Door


This paper introduces the configuration Step of map configuration and door addition in the service center
module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".

Step 2: On the map configuration screen, select the map of the desired area and click on the right of the

screen to add the gate.

Step 3: In the Add Door list on the left of the page, drag the required access control device to place it on the
map, as shown in Figure 16-8.

Figure 16-8 Add door page8

P a g e | 520 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Step 4: Click "Submit" under the left door bar to complete the operation of adding a door on the map.

---- End

16.5.1.4 Adding a Camera


This section describes how to add camera Step for map configuration in the Service Center module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Map Configuration".

Step 2: On the map configuration screen, select the map of the desired area and click on the right of the

screen to add a camera.

Step 3: In the Add Camera list on the left of the screen, drag the required camera device to place it on the
map, as shown in Figure 16-9.

Figure 16-9 Add camera screen9

Step 4 Click submit in the left column of Adding a camera to complete the configuration of adding a
camera to the map.

---- End

16.5.2 Real-Time Monitoring

Alarms generated in the access control and video modules are displayed on the real-time monitoring
interface. You can query access control and video events by category. When an alarm is generated, you
can view the location of the alarm source and surrounding conditions, select a suitable monitoring point,
and view the live video, playback, and personnel movement.Operation that can handle doors in batches.

16.5.2.1 Personnel Movement


This paper introduces the configuration Step for real-time monitoring of personnel movement in the
service center module.

P a g e | 521 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".

Step 2: On the real-time monitoring screen, click the icon on the right in the personnel Trend window
that is displayed, set related parameters, as shown in Figure 16-10.

Figure 16-10 Page for querying personnel trends10

Step 3: Click "OK" to display the movement chart on the map.

---- End

16.5.2.2 Handle Video Alarm Details


This section describes the Step configuration for handling video alarm event details in the Service Center
module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".

Step 2: On the real-time monitoring screen, select a video alarm in the left pane and click to display
detailed information. As shown in Figure 16-11.

instructions
Function description of the detailed information interface:
 Preview: Displays the live view of the current video device.
 Playback: Plays back the records generated by alarm events.
 Trend: record the corresponding trend record of personnel.
 Report: You can note the event status.

P a g e | 522 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 16-11 Video alarm details screen11

Step 3: After viewing the detailed information and remarks, click "Submit".

16.5.2.3 Handle Door Alarms in Details


This section describes the Step configuration for handling gate alarm event details in the Service Center
module.

Operation Step
Step 1: In the service Center module, choose "Map Center > Real-time Monitoring".

Step 2: On the real-time monitoring page, select the event for which the access control alarm is generated
in the left pane and click the detailed information is displayed, as shown in Figure 16-12.

Figure 16-12 Access alarm details page12

Step 3: After filling in the report remarks, click "Submit".

P a g e | 523 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

17 System Management

17.1 Configure the System User Rights Management Service

17.1.1 Operation Scenario

During user creation, the super user needs to assign new users with different rights. To avoid setting a
role for each user, you can configure a role with specific rights in role management. When a user is added,
the role is assigned to the user.
The super user has all rights and can assign new users and set corresponding roles (rights) as required.

17.1.2 The New Role

This section describes Step for adding a role in ZKBio CVSecurity.

Operation Step
Step 1: In the System Management module, choose Rights Management > Roles.

Step 2: Click Add. The page for adding a role is displayed.

Step 3: On the Add role page, set role rights as required, as shown in Figure 17-1.Table 17-1 describes the
parameters to be set.

Figure 17-1 Role configuration page1

Parameter Instructions
Role id/name You can customize the role name and number, such as monitor.

Assign Select the module system and select permissions for different levels
permissions of users in the project.

Table 17-1 Role configuration parameters1


Step 4: Click "OK" to add Operation to the character.

P a g e | 524 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

17.1.3 New Users

This section describes how to configure Step to add an administrator user in ZKBio CVSecurity.

Operation Step
Step 1: In the system Management module, choose Rights Management > User.

Step 2: Click "Add" to pop up the new user interface.

Step 3: On the Add role page, set role rights as required, as shown in Figure 17-2.Table 17-2 describes
parameters to be set.

Figure 17-2 Adding a USER interface2

Parameter How to set up


User name/password You can customize the user name and password used for login.

state Set whether the user can log in and operate the system.

Connection If this parameter is not selected, the number of simultaneous


limit/Maximum logins logins is not limited.

Superuser status This parameter specifies whether the user has all rights by
default. If you click this parameter, the user is a super user and no
role is required.

P a g e | 525 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Parameter How to set up


role Set a role for the user. The user has all Operation permissions
configured for the role.

Authorize department Authorization Sets the department permissions of the user.

Authorized Authorization Sets the area rights that the user has.
permission

email Customizes this user's mailbox, which can be used to retrieve the
password.

The name Custom sets the name of this user.

The fingerprint Register this user's fingerprint.


registration

Table 17-2 Parameters for adding a user2

Step 4: Click "OK" to finish configuring the new user.

17.1.4 Results

Log in to the system again as the new user. If the login succeeds, the new user configuration is complete.
After the login, check whether the rights of the user are the same as those of the configured role. If the
rights are correct, the role is successfully configured. Verify that a user is added.

Operation Step
Step 1: The ZKBio CVSecurity login page is displayed. Enter the added username and password to log in.

Step 2: If the login succeeds, the user is added successfully.

Step 3: Check whether the function displays of each module match the role permission assignment of the
user.

17.2 The Local


An area is a space concept that allows users to manage devices in a specific area.After a region is set, you
can filter devices based on the region during real-time monitoring.
This section describes Step for adding a role in ZKBio CVSecurity.

Operation Step
Step 1: In the System Management module, choose System Management > Region Settings.

Step 2: On the area setting screen, tap Add and set parameters, as shown in Figure 17-3. For parameter
description, see Table 17-3.

P a g e | 526 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Figure 17-3 Add area page3

Parameter Instructions
Section number A user-defined area id cannot be repeated.

name The value contains a maximum of 30 characters.

The superior region Determine the regional structure of the company.

note Custom any character.

Table 17-3 Area parameters parameter Description3

Step 3: Click "OK" to complete the setting of the area.

P a g e | 527 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

18 Q&A

Solutions to common problems about [intelligent video] module.


Question 1: The video plug-in cannot be loaded.
Status quo 1: The first loading efficiency is slow, need to wait, and do not click other ZKBio CVSecurity TAB
of the browser during the loading process, otherwise it cannot be loaded.
Status quo 2: After the plug-in is loaded, switch to another ZKBio CVSecurity TAB, and then cut back, the
control cannot be loaded out, can open a non-ZKBio CVSecurity TAB, and then cut back to
the video plug-in can be loaded out.
Status 3: Windows 7 operating system IE11 browser can not load plug-ins.
Question 2: No latest alarm is reported on the AS1700 primary device.
Step 1: On the Intelligent Video Module > Maintenance Configuration > Parameter Settings page, check
whether the server IP address is correct. If the IP address is different from the actual server IP
address, select the correct server IP address.

Step 2: Choose Intelligent Video > Device Management > Master Device to check whether the
subscription status of the device is normal. If not, you can manually subscribe (choose Master
Device > More, and click Subscribe) :

Question 3: The NVR800 master device fails to deliver the list library personnel, prompting "No permission".
Solution: Users that are added to the NVR800 master device do not have personnel management rights.
ZKBio CVSecurity platform must use the apiadmin account to add the NVR800 master device.

P a g e | 528 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Question 4: The time on the video playback page displayed in the live alarm is inconsistent with the event
generated event, and the "Snapshot ID does not exist" message is displayed when you view the
linkage snapshot.
Solution: Log in to the AS1700 OMU Portal, and manually change the server time to the same as the
camera time. (Disabling the NTP service may cause problems.)
Question 5: The AS1700 main device setting video storage by day does not take effect.
Solution: Log in to the AS1700 OMU Portal, choose Storage Management > Storage Alarm Management,
and change the video recovery policy to Recycle by Retention period.

Question 6: The AS1700 primary device fails to create a video structured analysis task. Check the cause, and
the message "Camera intelligence does not support the analysis task type" is displayed.
Solution: A camera whose intelligence attribute is non-human cannot create a video structure analysis
task. You need to set the intelligence attribute to Common in camera Device List > More > Basic
Configuration > Video Channel > Video Settings.

P a g e | 529 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Question 7: The AS1700 main device-camera list shows that the camera is online, but there is no channel
number.

Solution: Log in to the AS1700 OMU Portal, choose User Management > User List > User Rights Settings,
and check whether the camera permission of the current user is selected.If not checked, all
checked:

P a g e | 530 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Question 8: AS1700 Primary device - Adding the primary device Displays a message indicating that the
number of online users of the same account exceeds the upper limit.

Solution: Log in to the AS1700 OMU Portal, choose User Management > User List > New User, and set the
login times. (You are not advised to log in as the admin user. The admin user can log in only
once.)
Question 9: The captured target attributes (age, gender, etc.) are unknown.
Step 1: First check whether the camera is supported. Currently, only 9.0.0 or later cameras are supported.
Step 2: Select Enable Target Properties for target intelligence Settings.

Question 10: How can I troubleshoot the fault that the primary device is offline, or the request is abnormal?
Solution: Intelligent Video > Maintenance configuration > CU Request. Click Details to view the specific
cause.

Question 11: Alarm linkage on the active device How to configure email sending?
Solution: Email parameters must be configured on the active device and the network is normal. ZKBio
CVSecurity is configured for linkage.

P a g e | 531 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Question 12: Personnel are not automatically sent to the access list database.
Solution: Manually added personnel will be automatically sent to the access list of the device, import and
equipment to manually add (add personnel list, and then add in the target list of the device).
Question 13: Using ZKTeco camera and onVIF protocol to connect to AS1700 main device; After task
management and Face Fortify are successfully created, the target identification alarm is not pushed.
Solution: After logging in to the camera web, RTSP authentication is removed.

Question 14: Setting Intelligent Overlay for NVR800 playback does not work.
Solution: Check the NVR800 version number. The NVR800 version is supported only in 9.1. Upgrade the
NVR800 and try again
Question 15: How do I upgrade the NVR800 using a USB flash drive?
Step 1: Create a directory named uboot_upgrade under the root directory of the USB flash drive.
Step 2: Insert the upgrade package starting with uboot and restart the upgrade.

Question 16: Setting the face recognition function does not work when the NVR800 is connected to half of
the disk.

P a g e | 532 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKBioCVSecurity V6600 User Manual

Solution: The face analysis function of the 1/2 disk NVR800 is disabled by default. When the face analysis
function is disabled, the device cannot use the face intelligence function.Face intelligence is
required. Target analysis is enabled on the main device.

Note:
1. When the face analysis function is enabled, the decoding capability of the 1/2 disk NVR800 is halved.
For example, one disk supports four channels of 1080P video decoding by default. After the face
analysis function is enabled, two channels of 1080P video decoding are supported.
2. The face analysis function of the 4/8 NVR800 is enabled by default.The 4/8 disk NVR800 has the same
decoding capability regardless of whether the face analysis function is enabled or not.

P a g e | 533 Copyright©2022 ZKTECO CO., LTD. All rights reserved.


ZKTeco Industrial Park, No. 32, Industrial Road,

Tangxia Town, Dongguan, China.


National Free technical
Phone : +86 769 - 82109991
Consultation
Fax Hotline:4006-900-999
: +86 755 - 89602394
No. 32, Pingshan Industrial Road, Tangxia Town, Dongguan City,
www.zkteco.com
Guangdong Province
Building B, No. 4010 North, Wuhe Avenue, Bantian,
Longgang District, Shenzhen
Room 1301, No. 132, Fengqi Road, Phase III, Xiamen
Copyright
Software Park © 2022 ZKTECO CO., LTD. All Rights Reserved. Official
Official Public
Account Applet
Official website:www.zkteco.com

You might also like