EasyManua.ls Logo

ZKTeco FaceDepot-7BL User Manual

ZKTeco FaceDepot-7BL
89 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
FaceDepot-7BL
User Manual
Page | 1 Copyright©2020 ZKTECO CO., LTD. All rights reserved.
Thank you for choosing our product. Please read the instructions carefully
before operation. Follow these instructions to ensure that the product is
functioning properly. The images shown in this manual are for illustrative
purposes only.
For further details, please visit our Company’s website
www.zkteco.com.
User Manual
FaceDepot-7BL
Date: 2020
Doc Version: 1.1
English

Other manuals for ZKTeco FaceDepot-7BL

Question and Answer IconNeed help?

Do you have a question about the ZKTeco FaceDepot-7BL and is the answer not in the manual?

ZKTeco FaceDepot-7BL Specifications

General IconGeneral
Screen shapeFlat
Display diagonal7 \
Display technologyLCD
Number of cameras1
Camera resolution (numeric)2 MP
Face capacity10000
Housing colorBlack, Silver
Storage mediaFlash
Internal storage capacity512 GB
Operating temperature (T-T)0 - 45 °C
Operating relative humidity (H-H)20 - 80 %
Operating system installedLinux
Input current3 A
Input voltage12 V
TypeFace recognition terminal

Summary

Document Conventions

GUI Conventions

Defines conventions for graphical user interface elements like buttons and menus.

Symbols

Explains the meaning of various symbols used in the manual for notices and warnings.

1 INSTRUCTIONS TO USE

1.1 Finger Positioning

Guides on proper finger placement for accurate fingerprint scanning.

1.2 Standing Position, Posture and Facial Expression

Specifies optimal user posture and distance for facial recognition.

1.3 Palm Registration

Instructions for registering palm biometrics.

1.4 Face Registration

Guidelines for enrolling facial data, focusing on centering the face.

1.5 Standby Interface

Describes the device's initial screen after power-up and its functions.

1.6 Virtual Keyboard

Explains the on-screen keyboard for data input and its features.

1.7 Verification Modes

Details the various methods available for user verification.

1.7.1 Palm Verification

Describes 1:N and 1:1 palm verification processes.

1.7.2 Fingerprint Verification

Explains 1:N and 1:1 fingerprint verification methods.

1.7.3 Facial Verification

Details 1:N and 1:1 facial verification procedures.

1.7.4 Card Verification

Covers 1:N and 1:1 card verification processes.

1.7.5 Password Verification

Explains 1:1 password verification and its outcomes.

1.7.6 Combined Verification

Discusses the 21 supported combinations of verification modes.

2 Main Menu

User Mgt.

Describes the feature for adding, editing, and deleting user information.

User Role

Explains setting user permissions and roles within the system.

COMM.

Covers network, PC, Cloud, and Wiegand communication settings.

System

Details system parameters like Date & Time, Access records, and reset.

Personalize

Allows customization of interface, voice, bell, and shortcut settings.

Data Mgt.

Facilitates deletion of various device data like attendance records.

Access Control

Configures door opening times, locks, and related parameters.

USB Manager

Enables data transfer to and from a USB drive.

Attendance Search

Allows searching and viewing attendance records.

Autotest

Tests the functionality of device modules like LCD, voice, and sensors.

System Info

Displays device storage, version, and firmware information.

3 User Management

3.1 Adding Users

Step-by-step guide to registering new users with their details.

Setting the User Role

Explains how to assign user roles like 'Normal User' or 'Super Admin'.

Register palm

Instructions for enrolling palm biometrics for a user.

Register fingerprint

Guide for registering fingerprint data for a user.

Register face

Instructions on capturing and enrolling facial data for a user.

Register password

Steps to set and confirm a password for a user.

Register ID card

Process for registering an ID card by swiping it.

Register user photo

How to capture and associate a user's photo.

Access Control Role

Defines user access rights, verification modes, and group assignments.

Duress Fingerprint

Explains setting a duress fingerprint for security alarms.

3.2 Search for Users

Describes how to search for registered users by keyword.

3.3 Edit Users

Instructions for modifying existing user information.

3.4 Deleting Users

Steps for removing user data from the device.

4 User Role

User Defined Role

How to create and configure custom user roles with specific permissions.

Define User Role

Assigning specific system privileges to a defined user role.

5 Communication Settings

5.1 Network Settings

Configuration of IP address, subnet mask, and gateway for network connectivity.

5.2 PC Connection

Setting up communication parameters between the device and PC software.

5.3 Cloud Server Setting

Configuring the device to connect to an ADMS server.

5.4 Wiegand Setup

Setting Wiegand input and output parameters for access control.

6 System Settings

6.1 Date and Time

Setting the device's current date, time, and time format.

6.2 Access Logs Setting

Configuring settings for attendance logs, camera modes, and data deletion.

6.3 Face Parameters

Adjusting parameters for facial recognition accuracy and quality.

6.4 Palm Parameters

Configuring matching thresholds for palm verification.

6.5 Fingerprint Parameters

Adjusting parameters for fingerprint acquisition and matching.

6.6 Factory Reset

Restoring device settings to factory defaults.

6.7 USB Upgrade

Instructions for upgrading device firmware via USB.

7 Personalize Settings

7.1 Interface Settings

Customizing wallpaper, language, timeouts, and screen style.

7.2 Voice Settings

Adjusting voice prompts and volume levels.

7.3 Bell Schedules

Setting up scheduled bell notifications.

7.4 Punch State Options

Configuring modes for punch state key functionality.

7.5 Shortcut Key Mappings

Defining shortcuts for functions or punch states.

8 Data Management

8.1 Delete Data

Options for deleting attendance data, photos, and other device information.

9 Access Control

9.1 Access Control Options

Configuring door lock delays, sensor settings, and alarm parameters.

9.2 Time Schedule

Setting time periods for door access availability.

9.3 Holiday Settings

Configuring special access times for holidays.

9.4 Access Groups

Managing users within different access control groups.

9.5 Combined Verification Settings

Setting up multiple verification methods for enhanced security.

9.6 Duress Options Settings

Configuring alarm signals for duress verification scenarios.

10 USB Manager

10.1 Download

Downloading access records, user data, and photos to USB.

10.2 Upload

Uploading screen savers, wallpapers, and user data from USB.

11 Attendance Search

Attendance Record

Function to search and view user attendance records.

Attendance Photo

Function to search and view attendance photos.

Blacklist ATT Photo

Function to search and view blacklist photos.

12 Autotest

Test All

Performs a comprehensive test of all device modules.

Test LCD

Tests the display quality and color reproduction of the LCD screen.

Test Voice

Checks the integrity and quality of audio files and playback.

Test Fingerprint Sensor

Verifies the functionality of the fingerprint sensor.

Cam testing

Tests the camera's ability to capture clear images.

Test Clock RTC

Verifies the accuracy and operation of the device's clock.

13 System Information

Device Capacity

Displays storage status for users, records, photos, etc.

Device Info

Shows device name, serial number, MAC address, and algorithm details.

Firmware Info

Provides information about the device's firmware version.

14 Connection to ZKBioSecurity Software

14.1 Set the Communication Address

Configuring IP and gateway for device-server communication.

14.2 Add a Device to the Software

Steps to search and add the device to ZKBioSecurity software.

14.3 Add Personnel on the Software

Process for adding new personnel records in the software.

Statement on the Right to Privacy

Eco-friendly Operation