Do you have a question about the Union Community AC-7000 and is the answer not in the manual?
Brand | Union Community |
---|---|
Model | AC-7000 |
Category | IP Access Controllers |
Language | English |
User with privileges to manage terminal settings and users.
Compares a single enrolled fingerprint against the input fingerprint.
Matches input fingerprint against all enrolled fingerprints in the database.
Outlines critical warnings and cautions to prevent damage and ensure safe operation.
Guides on capturing clear face images and performing successful face authorization.
Provides instructions for effective fingerprint capture and conditions affecting recognition.
Highlights key features like multi-modal authentication and network connectivity.
Details system architecture for networked entrance and personnel management.
Lists technical specifications including CPU, memory, camera, and communication ports.
Manages user accounts, including addition, deletion, modification, and search.
Detailed steps for registering fingerprints, including multiple fingers and error handling.
Guide to registering facial data using regular or quick modes, ensuring proper alignment.
Process for deleting all registered users and administrators, including a confirmation step.
Configures network parameters like IP address, subnet mask, and gateway for terminal connectivity.
Manages system-wide settings, including user ID length and authentication priorities.
Sets 1:N and 1:1 levels, fake detection, and template format.
Configures face recognition levels, modes, and camera angles.
Manages terminal data by deleting users, settings, logs, and images.
Deletes all user and administrator data from the terminal.
Resets the terminal to factory settings, deleting all data and configurations.
Configures terminal-specific options like sounds, lock settings, and input.
Covers various methods for user authentication on the terminal.
Details how to perform face authorization, including 1:N and 1:1 methods.
Explains fingerprint authorization using 1:N and 1:1 methods.
Describes the process of authenticating using an RFID or smart card.
Details how to authenticate by entering a pre-set password.
Explains authentication using multiple methods like card, fingerprint, and face.