Do you have a question about the Makim D20 and is the answer not in the manual?
Brand | Makim |
---|---|
Model | D20 |
Category | Security System |
Language | English |
Describes proper and improper finger placement for optimal fingerprint scanning.
Explains the different methods the device uses to verify user identity.
Compares a fingerprint against all enrolled fingerprints on the terminal for verification.
Compares a fingerprint against a specific enrolled fingerprint linked to a user ID.
Verifies user identity using a password associated with their user ID.
Allows verification using an ID card, with options for card-only or card plus fingerprint.
Details the meaning of various status icons displayed on the device's interface.
Browse and manage user information including ID, name, role, fingerprint, and more.
Set rights for user-defined roles, controlling access to menus and functions.
Configure communication parameters like IP address, subnet mask, and baud rate.
Set system parameters such as Date/Time, Attendance, Fingerprint, and USB Upgrade.
Customize user experience regarding display, audio, ringing, and keyboard definition.
Manage stored data, including deleting, backing up, and restoring records.
Set parameters for electronic locks and related access control devices.
Manage Mifare cards, supporting fingerprint attendance integration and multi-verification.
Import/export user info, fingerprints, and attendance data via USB.
Query attendance records conveniently using user ID or name.
Configure and manage printing of attendance records.
Set public or private short messages for display on the screen.
Identify different work types for attendance record facilitation.
Automatically test the functionality of various device modules.
Check device capacity, information, and firmware details.
Guide to adding new users, including entering ID, name, and role.
Details on how to input a unique user ID for a new user.
Instructions for entering a user's name via the device keyboard.
Explains how to assign roles like Super Admin or Normal User to users.
Step-by-step process for capturing and enrolling a user's fingerprint.
Guide for enrolling an ID card for user identification.
Process for setting and confirming a password for user authentication.
How to enroll a user's photo for display after successful verification.
Setting up access control options, including group settings and verification modes.
Define whether users use their group's default time zone or a custom unlocking time.
How to quickly locate users by searching their ID or name.
How to quickly locate users by searching their ID or name.
Procedures for editing user information or deleting user accounts.
Customize how information is displayed on the device's interface.
Define custom roles with specific menu and function access rights.
Configuration screen for the first user-defined role.
Configure Ethernet network settings for device-PC communication.
Set up serial communication parameters (RS232/RS485) for device connectivity.
Establish secure connection settings between the device and PC software.
Configure cellular network settings for GPRS or WCDMA access.
Set up Wi-Fi connectivity for wireless data transmission.
Configure Webserver settings, including IP address and proxy settings for ADMS.
Configure Wiegand input and output settings for access control integration.
Set up parameters for receiving Wiegand signals.
Configure parameters for sending Wiegand signals.
Set the device's date, time, and display format, including DST options.
Configure attendance-related settings like duplicate punch period and camera mode.
Adjust fingerprint matching thresholds, sensor sensitivity, and live detection settings.
Restore device settings to factory defaults for communication and system options.
Update the device's firmware program using a USB drive.
Customize the device's initial interface style, wallpaper, and language.
Configure voice prompts, keyboard beep sounds, and volume levels.
Set up scheduled bells for on-duty and off-duty notifications.
Configure external ringing output terminals.
Select and configure status key modes for attendance check.
Define shortcut keys for quick access to attendance status or functions.
Manage stored data by deleting attendance records, photos, or user information.
Back up service data or configuration data to the device or a USB drive.
Restore data from the device or a USB drive.
Set parameters for controlling locks and related access control devices.
Define time zones and sections for access control periods.
Set special access control times applicable to all employees during holidays.
Manage employees in groups, assigning group time zones for access control.
Instructions for adding, editing, and deleting access groups.
Configure multi-verification methods by combining different access control groups.
Enable security function to prevent unauthorized entry/exit by matching records.
Set parameters for duress alarm, including activation and delay.
Guide for enrolling a Mifare card as an ID card, requiring only the card number.
Enroll fingerprint templates and write them into an IC card for verification.
Delete all information stored on the IC card.
Copy card information to the device for direct fingerprint attendance.
Configure IC card parameters like passcode and data storage mode.
Download attendance data, user data, photos, etc., from the device to a USB disk.
Upload data like user profiles, work codes, or messages from a USB disk to the device.
Configure options for downloading data, including encryption and deletion.
Search and view employee attendance records by user ID and time range.
Configure which data fields are included in printed attendance records.
Set options for printing, such as paper cutting.
View storage status, enrolled users, and capacity details.
Display device name, serial number, MAC address, and manufacturer details.
Check the firmware version and service details.
Explains how to input text, letters, and symbols using the device interface.
Guidelines for uploading user photos, including directory structure and file limits.
Rules for uploading advertising images, including directory and size constraints.
Details on connecting and using an external serial port printer.
Wiring diagram and pin-line order for connecting a serial printer.
Steps for configuring the device and printer for printing.
Explains the anti-pass back function for enhanced security.
Describes how the master and slave machines work together for anti-pass back.
Details the different anti-pass back modes and their operational logic.
Specifies master and slave machine roles for anti-pass back setup.
Navigational steps to access and configure anti-pass back settings.
Describes the behavior of out, in, and in/out anti-pass back modes.
Explains device status settings for entry, exit control, or disabling anti-pass back.
Instructions to modify Wiegand output format for compatibility.
Steps for enrolling users to work with the anti-pass back system.
Company statements regarding fingerprint data collection and privacy.
Legal notes related to personal freedom and privacy in China.
Table detailing toxic substances in product parts and compliance with standards.