0% found this document useful (0 votes)
62 views44 pages

EAS AM Antenna User Manual V1.0.0

This document provides installation and operation instructions for an EAS AM Antenna. It begins with safety warnings and instructions on transportation, storage, installation and operation. It then describes the product features, structure and ports. Installation procedures are outlined, including out-of-box checking, requirements, tools needed and step-by-step instructions. Device debugging information is also provided on sensitivity adjustment and system parameter configuration via the home page and main menu. The document aims to ensure proper use of the antenna to avoid safety hazards and property damage.

Uploaded by

costapaulo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views44 pages

EAS AM Antenna User Manual V1.0.0

This document provides installation and operation instructions for an EAS AM Antenna. It begins with safety warnings and instructions on transportation, storage, installation and operation. It then describes the product features, structure and ports. Installation procedures are outlined, including out-of-box checking, requirements, tools needed and step-by-step instructions. Device debugging information is also provided on sensitivity adjustment and system parameter configuration via the home page and main menu. The document aims to ensure proper use of the antenna to avoid safety hazards and property damage.

Uploaded by

costapaulo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

EAS AM Antenna

User’s Manual

V1.0.0
Foreword

General
This manual introduces the installation, functions and operations of the EAS AM Antenna
(hereinafter referred to as "the Device"). Read carefully before using the device, and keep the manual
safe for future reference.

Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


DANGER death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


WARNING could result in slight or moderate injury.

Indicates a potential risk which, if not avoided, could result in


property damage, data loss, reductions in performance, or
CAUTION unpredictable results.

TIPS Provides methods to help you solve a problem or save time.

NOTE Provides additional information as a supplement to the text.

Revision History
Version Revision Content Release Time

V1.0.0 First release. December 2022

Privacy Protection Notice

As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.

About the Manual


 The manual is for reference only. Slight differences might be found between the manual and the
product.
 We are not liable for losses incurred due to operating the product in ways that are not in

I
compliance with the manual.
 The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
 All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
 There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
 Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
 All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
 Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
 If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Important Safeguards and Warnings

This section introduces content covering the proper handling of the detector, hazard prevention, and
prevention of property damage. Read carefully before using the detector, and comply with the
guidelines when using it.

Transportation Requirements

 Transport the detector under the allowed humidity and temperature conditions.
 Pack the controller with packaging provided by its manufacturer or packaging of the same
quality before transporting it.

Storage Requirements

 Keep the detector away from dampness, dust or soot.


 Store the detector under the allowed humidity and temperature conditions.

Installation Requirements

 Do not place or install the detector in a place exposed to sunlight or near the heat source.
 Keep the detector installed horizontally on a stable place to prevent it from falling.
 Install the detector in a well-ventilated place, and do not block the ventilation of the detector.

Operation Requirements

 Do not drop or splash liquid onto the detector, and make sure that there is no object filled with
liquid on the detector to prevent liquid from flowing into the detector.
 Operate the detector within the rated range of power input and output.
 Do not disassemble the detector.
 Use the detector under the allowed humidity and temperature conditions.

Maintenance Requirements

 Use the battery of specified manufacturer. When replacing battery, make sure that the same
type is used. Improper battery use might result in fire, explosion, or inflammation.

III
 Use the recommended power cables in the region and conform to the rated power
specification.
 Use the power adapter provided with the detector; otherwise, it might result in people injury
and device damage.

 Use power supply that meets ES1 but does not exceed PS2 limits defined in IEC 62368-1. For
specific power supply requirements, refer to device labels.
 Connect the detector (I-type structure) to the power socket with protective earthing.
 The appliance coupler is a disconnection device. Keep the angle for easy operation.

IV
Table of Contents
Foreword ............................................................................................................................................................ I
Important Safeguards and Warnings ............................................................................................................. III
1 Product Information...................................................................................................................................... 6
Overview ....................................................................................................................................................................................... 6
Product Functions...................................................................................................................................................................... 6
Product Features ........................................................................................................................................................................ 6
2 Product Structure .......................................................................................................................................... 8
Product Appearance ................................................................................................................................................................. 8
Port Description........................................................................................................................................................................10
3 Installation ................................................................................................................................................... 13
Out-of-box Checking ..............................................................................................................................................................13
Installation Requirements .....................................................................................................................................................14
Tools ..............................................................................................................................................................................................14
Installation Procedure (Preinstall) ......................................................................................................................................15
Installation Procedure ............................................................................................................................................................18
Alarm linkage with CCTV ......................................................................................................................................................20
4 Device Debugging ....................................................................................................................................... 22
Sensitivity Adjustment ...........................................................................................................................................................22
System Parameter Configuration .......................................................................................................................................23
4.2.1 Home Page ....................................................................................................................................................................23
4.2.2 Main Menu ....................................................................................................................................................................24
4.2.3 Alarm Tone.....................................................................................................................................................................25
4.2.4 Alarm Volume ...............................................................................................................................................................26
4.2.5 Alarm Mode/ Threshold............................................................................................................................................26
4.2.6 False Alarm Monitoring ............................................................................................................................................27
4.2.7 Parameter Monitoring...............................................................................................................................................28
4.2.8 TX Switch/RX Switch ..................................................................................................................................................28
4.2.9 TX Mode .........................................................................................................................................................................29
4.2.10 Phase synchronism/Phase Adjustment............................................................................................................29
4.2.11 Tag Too Close..............................................................................................................................................................29
4.2.12 Jammer Reminder ....................................................................................................................................................30
4.2.13 System Settings.........................................................................................................................................................30
5 WEB Configuration ...................................................................................................................................... 35
Device Initialization .................................................................................................................................................................35
WEB Interface Login ................................................................................................................................................................35
System Settings ........................................................................................................................................................................35
Environment Monitoring ......................................................................................................................................................37
5.4.1 Parameter Monitoring...............................................................................................................................................38
5.4.2 False Alarm Monitoring ............................................................................................................................................38
Phase Sync ..................................................................................................................................................................................38
User Management ...................................................................................................................................................................39
System Status ............................................................................................................................................................................39
6 FAQ ............................................................................................................................................................... 41
Cybersecurity Recommendations ............................................................................................. 42

V
1 Product Information

Overview

Network EAS AM Antenna is an anti-theft device that can effectively identify the anti-theft AM tags.
The Device can effectively prevent the theft of goods, cut business operating costs, and improve
customer shopping experience. Equipped with highly transparent acrylic plate, the Device has a
simple and elegant appearance with powerful performances and complete functions, which is an
important part of the retail loss prevention system. It adds network communication function, which
enables the antenna connect to the network platform at any time to remote view equipment
operation.

Product Functions

 Anti-theft label detection: The Device can effectively detect and identify AM anti-theft labels
within the coverage range.
 Sound and light alarm: When the label is detected, the Device will give off sound alarms. At the
same time, the full screen LED alarm light turns from the solid status to red flashing status to
remind. The Device supports a variety of adjustable alarm tones, adjustable alarm light colors
and adjustable alarm volumes.
 Phase synchronism: The Device supports one-click automatic synchronization of surrounding
phases, which can effectively avoid interference from the other AM EAS devices around.
 CCTV linkage: The standard CCTV module can output the alarm signal to the monitoring camera,
and then the camera can automatically save the video at the alarm time for future use.
 On-board configuration system: The mainboard has built-in on-board buttons and screens,
which can directly configure related parameters on the device without connecting to a
computer.
 Network communication function: Supports Web-side debugging, network platform
connection, cloud service, remote configuration, remote firmware upgrade and other functions.
 Power frequency alarm: The alarm is triggered when the power frequency is not within the
normal range of the device.

Product Features

 Long detection distance: The maximum detection distance of dual-antenna labels is 180 cm to
200 cm, and the maximum detection distance of tags is 200 cm to 240 cm depending on
environment).
 Stable hardware performance: The high-performance transmitting signal driver cooperates with
the multistage amplifier, which has stable operation with no temperature drift. It can be used
for a long time without performance degradation.
 Strong anti-interference ability: The Device has a variety of sensitivity adjustment methods that
can effectively resist the interference of environmental noise on the device.
 Strong signal processing capability: The unique received signal filtering algorithm ensures

6
accurate identification of label signals with low false alarm rate.
 Integrated transceiver design: The primary and replica antenna are both integrated transceivers,
and can be used flexibly. The detection effects of the primary and replica antenna are the same.
 Wide application: Compatible with most AM labels and tags.
 Power saving and environmental protection: The Device is harmless to the human body.
 All-transparent appearance: Made of high-quality acrylic, the device is transparent, minimalist
and beautiful. Besides alarm light, there is a constant bright backlight with adjustable colors,
which can be used as a welcome advertising board.

7
2 Product Structure
Product Appearance

Product appearance

8
Dimensions (Unit: mm [inch])

9
Port Description

Primary antenna ports

Table 2-1 Primary antenna ports description


No. Parameter Function
1 Transmitting antenna port EAS active detection signal transmitting coil port.
Screen buttons for system parameter configuration.
Screen buttons for system
2
parameter configuration For example, , , , .

3 Replica antenna CH2 power port Replica antenna CH2 power output (24 VAC).
4 Replica antenna CH3 power port Replica antenna CH3 power output (24 VAC).
Inputs 24 VAC or 12 VAC power to the primary
antenna.
5 Primary antenna power port
Incorrect voltage input or cable connection may
cause device damage.
6 Receiving antenna port EAS signal receiving coil port.
Sensitivity adjustment button is used to adjust the
7 Sensitivity adjustment button
antenna detection sensitivity.
Replica antenna CH2 Replica antenna CH2 communication cable port. (In
8-1
communication cable port the bottom row)
Replica antenna CH3 Replica antenna CH3 communication cable port. (In
8-2
communication cable port the top row)

10
No. Parameter Function
Network communication cable
9 Network communication
port
10 USB debugging port Debugging reserved port (not open to the public).
11 Standby buzzer port Connects standby buzzer.
12 LED light strip port LED light strip port.
13 Standby communication port Standby communication port.
14 CCTV linkage port CCTV linkage port, 3-channel alarm relay output.
Replica antenna ports

Table 2-2 Replica antenna ports description


No. Parameter Function
1 Transmitting antenna port EAS active detection signal transmitting coil port.
Replica antenna power input (24 VAC).

2 Replica antenna power port


Incorrect voltage input or cable connection may cause
device damage.
Replica antenna
3 Replica antenna communication cable port.
communication cable port
4 Receiving antenna port EAS signal receiving coil port.
Adjusts the antenna detection sensitivity.
Sensitivity adjustment
5
button
For details, see“4.1 Sensitivity Adjustment”.
6 Standby buzzer port Connects standby buzzer.
7 LED light strip port LED light strip port.

11
Power filter board ports

Table 2-3 Power filter board ports description


No. Parameter Function
External power input

1 AC power cable inlet


The input voltage of the antenna is 220 VAC 50/60Hz.
Incorrect voltage input or cable connection may cause
device damage.
2 Ac power outlet The external power is output after filtering.

12
3 Installation
Out-of-box Checking
After you received the device from the forwarder, please open the box and check with the following
sheet. If there is any problem, contact your local retailer or service engineer for help.
Table 3-1 Checklist
Sequence Item Content
Appearance No obvious damage.
Not distorted or
1 Overall packing Packing
broken.
Component No missing.
Appearance No obvious damage.
Matches with the
Device model
purchase order.
Not torn up.

Do not tear off or throw


2 Host away the labels,
otherwise the warranty
Labels on the Device services can be
compromised. You
need to provide the
serial number of the
Device when calling
after-sales service.
Primary antenna packing list (left) and replica antenna packing list (right)

Table 3-2 Primary antenna packing list

13
Name Quantity
Primary antenna 1
M10×100 expansion screw 4
Power cord 1
Table 3-3 Replica antenna packing list
Name Quantity
Replica antenna 1
M10×100 expansion screw 4
10PIN communication cable between primary 1
antenna and replica antenna
2PIN replica antenna power cable 1

Installation Requirements
 Keep away from static large metal items.
Install the Device at least 100 cm away from a still or fixed large metal item. Otherwise, the
detection distance will be affected.
 The floor where the device is installed must be flat and solid.
Install the Device on the flat and solid floor, in order to prevent the equipment from shaking
caused by vibrations when people step on the floor.
 Keep away from EM interference source and the EM radiation source.
 Since the bilateral sending and receiving technology are used in the antenna, the Device should
be installed at least 200 cm away from the EM interference source and the EM radiation source
to prevent false alarms.
 The device must be strictly grounded.
To ensure personal and equipment safety as well as enhance equipment anti-interference ability
and improve detection distance, the device needs to be reliably grounded in accordance with
the regulations.
 Separate wiring for electric and electronic cables.
Electric and electronic are prone to mutual influence and safety problems, so the two cables
need to be wired separately.

The following can be the EM interference source and the EM radiation source that affect the
Device: Electric control cabinets, RF devices, computer and peripheral devices, video monitors,
high-power motors, high-power transformers, AC wires, thyristor circuits (high-power switching
power supply, inverter welding machines), engines, motored machines, and fluorescent lamp
with conventional electronic ballast.

Tools
Table 3-4 Tools
Name Image Name Image

M10 × 100
Crosshead
expansion
screwdriver,
screws × 4
slotted
(standard
screwdriver
accessories)

Open-end
Marker
wrench

14
Name Image Name Image

Cutting
Hammer
machine

Stainless scuff
Fine sand
plate

Electric drill — —

Installation Procedure (Preinstall)


86 cable boxes are reserved for each EAS antenna base. The distance between the cable
boxes is adjusted according to the layout plan. One φ 25 cable tube or other cables of the
same size are reserved between each cable box for routing EAS antenna between the
primary antenna and replica antenna.
Confirm the position of the EAS power socket, and then reserve a φ 25 cable tube or another
cable of the same size between the 86 cable box from the primary antenna for routing EAS
antenna between the primary antenna and replica antenna.
If the CCTV linkage function is required, an additional φ 25 cable tube or another cable of
the same size needs to be embedded between the host and the camera in advance.
Description of the cable and tube reservation

If the device needs to be connected to an NVR or network platform, it needs to embed the
cable tubes between the host and the switch, with the same dimensions as above.
Embed expansion screws in advance according to the holes of the antenna base.
Remove the terminal of the connecting cable, and then thread the connecting cable and
power cable into the cable tube. When threading, you need to remove the terminal, and

15
then cut the cable length according to the actual situation.
Install the primary antenna and replica antenna terminals in the sequence of 1 white, 2
green, 3 brown, 4 red, 5 black, 6 blue, 7 gray, 8 orange, 9 yellow, and 10 purple, and then
install the replica antenna power cable terminals in the sequence of 1 black and 2 brown.

The cable sequence of the terminals on both sides must be in one-to-one correspondence,
otherwise the Device may be damaged and short circuit may occur.
Primary antenna and replica antenna terminals (left)/Replica antenna power cable (right)

Remove the cover plate, align the antenna with the pre-embedded screws, tighten the
screws, and then insert the cable terminal in the specified position.

16
Installation diagram (1)

Installation diagram (2)

See Figure 3-6, No.1 port connects to the grounding wire (PE), NO.2 port for neutral wire (N)
and NO.3 port for live wire (L).

Input voltage of the Device is 220 VAC 50/60Hz. Please confirm whether the Device is
suitable for local voltage and ask a professional electrician to operate during the installation.
Incorrect voltage input or cable connection may cause device damage.

17
External power supply cable diagram

Installation Procedure

This section is suitable for installing EAS device without pre-embedding cables and tubes for EAS.
After determining the installation location, use a marker to draw lines, and then punch holes
and cut grooves.
Clean up the site.
Installation (1)

Cover the cutting groove with fine sand to fill the gap and protect the cable.
Installation (2)

Install stainless scuff plate to fix the device.

18
Installation (3)

19
Alarm linkage with CCTV
Cable Connection
There are 3 linkage alarm switches on the EAS main board, from left to right: NO3、COM3;NO2、
COM2;NO1、COM1. Take channel 1 as an example: connect NO1 and COM1 to the two alarm input
ports of ALARM IN1 and ALARM GND in the ALARM port of the camera respectively.
Alarm linkage cable connection

20
IPC Configuration
Log in to the web page of the IPC device and then select Setting > Event Management > Alarm
Setting > Alarm Linkage.
The sensor type needs to be NO. On this page, you can enable alarm linkage, configure whether to
record, capture pictures, linkage alarm tone and more.
IPC Configuration

21
4 Device Debugging
Sensitivity Adjustment
 During the actual installation and use, the device detection effect is affected by the complex
electromagnetic environment on site, and it is also difficult to accurately locate and close the
interference sources. In order to deal with this situation, this Device designs a DIP system
sensitivity adjustment switch, so that the device can be used normally under different
interference intensity.
 For details on the switch, see“2.2 Port Description”.
 Al switches are in lower state by default. At this time, the sensitivity is the lowest, the
anti-interference capacity is the best, and the detection distance is the closest.
 CH1A switch and CH1B switch: Responsible for the sensitivity adjustment of CH1 channel (signal
transceiver channel integrated on the mainboard). See Figure 4-1, when the switch 1 is pushed
up, the antenna has the highest sensitivity and the signal amplification is the largest, which is
suitable for low-noise environment. However, there is a certain risk of false alarms. If the site
interference is large, the alarm source may not be detected, which is a normal phenomenon
that the normal detection is interfered by the amplified noise. When switch 2 to switch 4 are
pushed up successively, the sensitivity gradually decreases, and the detection distance
gradually becomes shorter.
 CH2A switch and CH2B switch: Responsible for the sensitivity adjustment of CH2 channel (if CH2
is not connected, it cannot be adjusted). See Figure 4-1, when the switch 1 is pushed up, the
antenna has the highest sensitivity and the signal amplification is the largest, which is suitable
for low-noise environment. However, there is a certain risk of false alarms. If the site interference
is large, the alarm source may not be detected, which is a normal phenomenon that the normal
detection is interfered by the amplified noise. When switch 2 to switch 4 are pushed up
successively, the sensitivity gradually decreases, and the detection distance gradually becomes
shorter.
 CH3A switch and CH3B switch: Responsible for the sensitivity adjustment of CH3 channel (if CH3
is not connected, it cannot be adjusted). See Figure 4-1, when the switch 1 is pushed up, the
antenna has the highest sensitivity and the signal amplification is the largest, which is suitable
for low-noise environment. However, there is a certain risk of false alarms. If the site interference
is large, the alarm source may not be detected, which is a normal phenomenon that the normal
detection is interfered by the amplified noise. When switch 2 to switch 4 are pushed up
successively, the sensitivity gradually decreases, and the detection distance gradually becomes
shorter.
Mainboard sensitivity adjustment button

22
Replica board sensitivity adjustment button (CH2 on the left, CH3 on the right)

Table 4-1 Description of sensitivity adjustment button


Image Description
The highest sensitivity, the worst anti-interference ability, and the longest
detection distance in low-interference scenarios.

High sensitivity, poor anti-interference ability, and long detection distance in


low-interference scenarios.

Medium sensitivity, relative strong anti-interference ability, and relative long


detection distance in the interference scenarios.

Low sensitivity, strong anti-interference ability, and the long detection


distance in the interference scenarios.

The lowest sensitivity, the strongest anti-interference ability, and the longest
detection distance in the interference scenarios.

On: ; Off: .

System Parameter Configuration

4.2.1 Home Page


The home page includes the current active channel, the system time and the current mains
frequency.

Press to enter the home page.


Home page

23
4.2.2 Main Menu
The main menu includes all parameters configuration entries.

Press or to move the cursor. Press to enter the sub-menu. Press to return to the
home page.

The interference reminder function is temporarily unavailable.

24
Main Menu

4.2.3 Alarm Tone


The system has 3 built-in alarm tones.

Press or to move the cursor. Press to confirm the alarm tone. Press to return to
the main menu.

25
Alarm tone

4.2.4 Alarm Volume


The system alarm volume is adjustable in 5 levels.

Press or to move the cursor to select the channel. After pressing to confirm the
channel, you can press to adjust the volume. Press to confirm the volume. Press
to return to the main menu.
Alarm volume

4.2.5 Alarm Mode/ Threshold


 The system includes 2 alarm modes to be used in different interference environments. The alarm
threshold is connected to the alarm mode, and the threshold parameters switch with the alarm
mode.
Press or to move the cursor to select the alarm mode Press to confirm the
alarm mode. Press to return to the main menu.
Alarm mode

 Alarm mode 1 (default): In this mode, the default parameters can be adjusted according to the
actual interference conditions. The adjustment range is from 0 to 5 levels. The lower the
threshold, the more sensitive the antenna is and the longer the detection distance is. However,
false alarms may occur. We recommend you set the threshold to level 2 or higher.

26
Press or to move the cursor to select the channel. After pressing to confirm the
channel, you can press or to adjust the alarm threshold. Press to confirm the
threshold or press to return to the main menu.
Alarm mode 1

 Alarm mode 2 (customized): In this mode, all alarm threshold parameters can be customized
and adjustable. 3-channel threshold parameters (SNR (Signal/Noise ratio), adjustment range:
0~50, step size: 5; AMP (Amplitude), adjustment range: 0~300, step size: 10; STD (Standard
Deviation), adjustment range: 0~1500, Long key step: 50; RMS (Root Mean Square), adjustment
range: 0~1500, step size: 50) independently adjustable.
You can synchronize all parameters of the selected channel to the other two channels through
the parameter synchronization function.
Press and to select the parameter for synchronization. And press to confirm
the parameter synchronization to other channels (it is recommended to configure under the
development guidance). Press and to move the cursor to select the parameter.
After pressing to confirm the channel, you can press and to adjust the
parameters. Press to confirm the parameters. Press to return to the main menu.
Alarm mode 2

4.2.6 False Alarm Monitoring


False alarm monitoring displays the number of false alarms of 3 channels since entering the function
interface in real time, which is used for on-site troubleshooting of false alarms and test acceptance
after device installation. The more false alarms displayed, the more alarm thresholds (alarm mode 1)
need to be increased to reduce false alarms.

Press to return to the main menu.

27
False alarm monitoring

4.2.7 Parameter Monitoring


The parameter monitoring displays the SNR (Signal/Noise ratio) bar graph and the 3-channel
threshold parameters in real time. Press and to select the channel. If the channel is not
connected or the receiving is closed, it will display that the channel is closed. If there are labels or
tags at the site, and the noise is greater than the signal, it means greater environmental interference.
Press to return to the main menu.

Parameter monitoring

4.2.8 TX Switch/RX Switch


The TX/RX antenna can be switched on and off in the menu, and the transmitter/receiver of the
specified channel can be temporarily turned off during the configuration process.
Press and to move the cursor to select the channel. After pressing to confirm the
channel, you can press and to select the switch. Press to confirm the switch. Press
to return to the main menu.

Turning off the transmitter or receiver may cause the alarm function failure.
TX/RX switch

28
4.2.9 TX Mode
In this mode, you can set transmission timing and cycle control of the transmitter.
TX mode 1 is the default TX mode, TX modes 2 and 3 are fast TX modes (used during testing).

Press and to move the cursor to select the mode. Press to confirm the mode. Press
to return to the main menu.
TX mode

4.2.10 Phase synchronism/Phase Adjustment


Phase synchronism can synchronize the transmission timing between the device and other brands of
EAS systems to avoid false alarms due to timing inconsistencies. You can select Rising Edge or
Falling Edge synchronization in the menu. It is recommended to use the rising edge for sync, After
startup, the device enters the automatic Phase synchronism state. In this state, the system cannot
detect tags/labels. In about 1-5 seconds, if other devices exist and there is a timing difference
between the devices, the device will prompt Completed!, if not, it will prompt that No sync
required, and the process is completed.

Press and to select synchronization method. Press to confirm, and then the system
will automatically synchronize with the same type of nearby signals. Press to return to the main
menu. If auto Phase synchronism is unsuccessful, press and in Phase Adjustment
interface to manually change the current phase. The change range is 0 to120.

During the automatic phase synchronization, the system does not have label detection capability
and automatically resumes after the synchronization is completed.
Phase synchronism/Phase Adjustment

4.2.11 Tag Too Close


When this function is enabled, when a tag/label stays in the antenna detection area for a long time
(≥ 2 minutes), the device uses the flashing light instead of the alarm tone to remind. After entering
the flash light mode, and no continuous alarm is detected for more than 3 seconds, it will restore to
the normal alarm state. Tag too close alarms can be reported to the platform.

29
Press and to select on and off. Press to confirm. Press to return to the main
menu.
Tag too close

4.2.12 Jammer Reminder


When it is detected out any jammers nearby, the jammer reminder will be triggered.
Jammer Reminder

4.2.13 System Settings


 System setting includes Network Parameters, Auto Registration, Time and Date, Time Zone,
Restore and About.
Press or to select the corresponding parameters. Press to confirm the setting.
Press to return to the main menu.

30
System Settings

 Network Parameters
The network parameters include the local IP address, Subnet mask and Gateway. The
adjustable range of each byte separated by a dot is: 0~255.
Press and to set the parameters. After all settings are completed, press to
confirm the restart, otherwise the setting is invalid, and press to return to the System
setting interface.
Network parameters setting

31
 Auto registration
Auto registration can connect the antenna to the network platform. After the connection is
successful, the operation of the antenna can be remotely checked on the platform. There are
two connection methods. You can add the antenna IP address to the network platform or add
the server IP address to the antenna to establish a connection.
Press and to disable/enable this function,and press to confirm. After enabling
this function, you can choose to add the server IP address, port and device ID. After all settings
are completed, press to confirm and save, and it will take effect immediately after saving,
Press to return to the System setting interface. There already exists 3 server addresses in
the system: America, Europe and Asia. Select to use them.
Auto registration

32
 LED setting
Set LED color as you like.
Press and to set the LED color. After all settings are completed, press to
confirm and press to return to the System setting interface.
LED setting

 Time and Date


Set time and date.

Press and to set time and date. Press to confirm and press to return to
the System setting interface.
Time and Date

33
 Time zone
Time zone function is used for adjusting the local time based on the Greenwich Mean Time
(GMT) and the local time zone. A total of 36 options are available.
Press to confirm and press to return to the System setting interface.
Time zone

 Restore
Restore to the factory settings. Press to confirm and press to return to the System
setting interface.
Restore

 About
You can view the Software version, Release time and Device ID.
About

34
5 WEB Configuration
Device Initialization
When using the device for the first time or after restoring the factory configuration, device
initialization is required (including setting the password of the device admin user, time zone and
more).

 To ensure the security of the device, please keep the password of admin properly after the
device initialization and change it regularly.
 When initializing the device, make sure the IP address of the PC is in the same network as the IP
address of the device.
Open Chrome browser, enter the IP address of the device in the address bar (the default IP
address is 192.168.1.108), and press [Enter] key.
Set the time zone, time and date of the device and click Next.
Set the login password of admin, click OK.

WEB Interface Login


Log in to the device through the browser. Before logging in to the device, make sure the following
conditions are met.
● Log in to the device WEB interface after completing the initialization of the device.
● when logging in to the device, make sure that the IP address of the PC and the IP address of the
device are in the same network segment.
Open a browser, enter the device IP address in the address bar, and then press the [Enter]
key.
Enter the username and password.

 The default user name is admin.


 If you need to change the password, click User Management to reset the password.

System Settings
Configure system parameters, which includes TX channel, alarm on/off, alarm mode and phase
adjustment.
Select System Settings on the main screen.
Configure some parameters.

35
System Settings(1)

System Settings (2)

36
Table 5-1 Descriptions of system settings
Parameters Descriptions
By default, 3 channels are open. Click to close the signal
TX switch transmitting function of the corresponding channel, and the
channel cannot trigger the alarm after closing.
By default, 3 channels are open. Click to close the signal
RX switch receiving function of the corresponding channel, and the
channel cannot trigger the alarm after closing.
Off by default. When this function is enabled, when a tag/label
stays in the antenna detection area for a long time (≥ 2 minutes),
the device uses the flashing light instead of the alarm tone to
Tag too close
remind. After entering the flash light mode, and no continuous
alarm is detected for more than 3 seconds, it will restore to the
normal alarm state.
Jammer reminder Not available for current version.
Select the alarm mode. The system includes 2 alarm modes to
be used in different interference environments. The alarm
threshold is connected to the alarm mode, and the threshold
parameters switch with the alarm mode.
Alarm Mode 1: The alarm parameters of the three channels
are configured according to the preset default values, and
only the threshold values of each channel need to be set.
The adjustment range is from 0 to 5 levels. The lower the
threshold, the more sensitive the antenna is and the longer
the detection distance is. However, false alarms may occur.
By default, it is set to be 3. It is recommended you set the
threshold to level 2 or higher.
Alarm Mode 2: Set the alarm parameters, which includes
SNR (Signal/Noise ratio), AMP (Amplitude), STD (Standard
Alarm mode Deviation) and RMS(Root Mean Square).
1. Select the channel.
2. Select Environment Monitoring on the main screen to
view the parameters under the circumstance of no alarm
triggering. Put a tag in the selected channel to trigger an
alarm, and check the value of each parameter in the alarm
state on the Environment Monitoring page.
3. Return to the System Settings page, and enter the
corresponding parameter values in the middle range of the
values obtained in steps 2 and 3 in the Alarm Threshold
column for the corresponding channel.
4. Click Save.

For details of the monitoring parameters, please refer


to 5.4 Environment Monitoring.
Generally, keep the default. After Phase Sync, the parameters are
Phase adjustment modified synchronously. And if the device is still disturbed by
the same type of device, fine-tune the phase manually.
Standby LED color Set LED color as needed.
Click Save.

Environment Monitoring
Real-time monitoring and displaying the signal value, ambient noise, SNR, AMP, STD and RMS. When
setting the alarm parameters of the channel in alarm mode 2, it is necessary to refer to the
environmental monitoring value for setting. Set parameter values higher than the environmental

37
value without alarm state and lower than the alarm value in the alarm state. It can trigger alarms
properly and decrease the false alarms caused by environment interference.

5.4.1 Parameter Monitoring


 S means signal.
 N means noise.
 SNR means Signal/Noise ratio, detection range is from 0 to 50.
 AMP means Amplitude. It means the amplitude of the EAS tag signal after amplification. detection
range is from 0 to 1500.
 STD means Standard Deviation. It means the signal characteristic value of the EAS tag, detection
range is from 0 to 1500.
 RMS means Root Mean Square. It means the confidence level of the EAS tag, detection range is from
0 to 1500.
Environment Monitoring

5.4.2 False Alarm Monitoring


Detects and displays the number of channel false alarms. When debugging the device, check the
False Alarm Monitoring on the Environment Monitoring page. Observe for a while, if there are more
false alarms in a short period, it means that there is interference in the environment or the alarm
parameters are not set reasonably, so you need to click Phase Sync or reset the alarm parameters of
the corresponding channel.

Phase Sync
The phase sync function enables the equipment to synchronize the TX timing with other brands of
EAS systems to avoid false alarms due to inconsistent timing. For example, when the device is turned
on, the signal RX timing is just the same as the signal TX timing of another device in the environment,
then the device will trigger a false alarm. At this time, phase sync is required.
Select Phase Synchronism on the webpage.
Click Rising Edge or Falling Edge. The phase will synchronize automatically.

 Rising Edge Sync means the TX signal is synchronized with the rising edge of the
common frequency signal while Falling Edge Sync means the TX signal is synchronized
with the falling edge of the common frequency signal.
 If there are still frequent false alarms after phase synchronization, perform Phase
Adjustment on the System Setting page.

38
Phase Sync

User Management
 Reset the user password. Select User Management in the main menu, then enter the old
password and the new password and click Save.
 If you forget the old password, reset the password after restoring the factory settings on the
device.
Password Management

System Status
View device status, including access channel (host), software version, current phase, power
frequency, and other information. After phase adjustment or power frequency change, click Refresh
to view the current phase and power frequency.

39
System Status

40
6 FAQ
1. False alarms occur at fixed times every morning and evening.
 Reason: Shopping malls and stores open in the morning, and then shut down and out of
power at night, causing instantaneous voltage load imbalance and power supply
interferences, resulting in false alarms.
 Solution: This problem cannot be solved completely. Please turn on other electrical devices
first in the store every day when opening the store, and then turn on the power of the EAS
device last.
2. After the store is closed every day, an alarm is generated at night when no one is there.
 Reason: In order to ensure the normal detection performance of the EAS device when the
store is open, it is usually debugged according to the business environment. At night, the
interference of the ambient power supply at night is reduced, and then the detection
performance of the device is relatively improved. At this time, if there is an EAS label on the
device near the EAS antenna, an alarm will be generated.
 Solution: We recommend you turn off the power of the EAS device during closing time.
3. False alarms occur every few days, and then disappear after a few days without
debugging. The phenomenon reoccurs.
 Reason: Shopping malls regularly hold events, and the stage has temporary large electrical
equipment, space and power interference, which leads to false alarms.
 Resolution: Check the newly added electrical equipment during the false alarm period.
After the interference source is determined by the elimination method, move the
interference source away from the antenna.
4. Irregular occasional false alarms.
 Reason 1: The clerk did not place the device with the EAS label outside the detection range,
which was too close to the EAS antenna, resulting in a false alarm.
 Solution: Place devices with the EAS tag outside the detection range of the EAS antenna as
required.
 Reason 2: There is a similar coil near the EAS antenna to form a loop, generating the tag
signal.
 Solution: Check if there are coiled wires or closed rings of metal forming loops near the EAS
antenna that generate label signals and cause false alarms.
 Reason 3: There are other electrical equipment connected to the EAS exclusive circuit, and
then the power interference leads to false alarms.
 Solution: Check whether any electrical equipment is mistakenly plugged into the EAS
exclusive circuit. If there is, please remove it.
 Reason 4: There are other EAS devices suppliers installing and debugging in other nearby
stores, and the unsynchronized phase of EAS devices causes false alarms.
 Solution: Please communicate with the store, and ask their EAS equipment supplier to stay
in the store to observe after the installation and debugging to ensure that the EAS device
has been synchronized without interference with each other.
 Reason 5: The newly added electrical device in the store is near the EAS antenna, and
spatial interference leads to false alarms.
 Solution: Before the store needs to add new electrical device near the EAS antenna, please
temporarily power on the device to test whether it will cause interference to the EAS
antenna. Please contact the technician to confirm whether it can be installed
5. The label detection rate is low, and no alarm is sent through the antenna area.
 Check whether the power cable connection, and the connection between the primary
antenna and replica antenna are correct.
 After confirming the connection is correct, set Phase synchronism. For details, see "4.2.10
Phase synchronism/Phase Adjust".
 Shorten the distance between the primary antenna and replica antenna, and then reduce
the antenna sensitivity. For details, see "4.1 Sensitivity Adjustment".
 Use a larger label.

41
Cybersecurity Recommendations

Mandatory actions to be taken for basic device network security:


1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
 The length should not be less than 8 characters.
 Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols.
 Do not contain the account name or the account name in reverse order.
 Do not use continuous characters, such as 123, abc, etc.
 Do not use overlapped characters, such as 111, aaa, etc.
2. Update Firmware and Client Software in Time
 According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the“auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
 We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024–65535, reducing the risk of outsiders being able to guess which ports you are
using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing

42
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
 SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
 SMTP: Choose TLS to access mailbox server.
 FTP: Choose SFTP, and set up strong passwords.
 AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
 Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
 Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
 Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
 The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
 Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
 Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.

43

You might also like