Beruflich Dokumente
Kultur Dokumente
Contents
Contents
Software Installation ....................................................................................... 1
Cautions ..................................................................................................................................................... 1
Installation .................................................................................................................................................. 1
Appendix ........................................................................................................ 33
FAQs ........................................................................................................................................................ 33
SOFTWARE PRODUCT LICENSE ......................................................................................................... 34
Software Installation
Software Installation
Cautions
Configuration Requirements:
CPU: Master frequency of 2.0 GHz or above.
Memory: 1 GB or above.
Hardware: Available space of 10 G or above. We recommend using NTFS hard disk partition as the
system installation directory (NTFS hard disk partition has the better performance and higher security).
Resolution of monitor: 1024x768 or above.
Operating System:
Supported Operating Systems: Windows XP/Windows 2003/Windows Vista/Windows7/Windows8
Supported Databases: Microsoft Access
Note:
If the software has been installed in the computer, uninstall the software, reboot the computer, and
install the software again.
During installation, file registration, registry modification, and batch file processing are performed.
Note that anti-virus software may stop program installation by reporting an error. The firewall software
installed in the computer will stop the service. Please select Allow for all options or disable the firewall
and then start installation again.
Installation
Double-click
OK.
Click Next.
under the installation directory. The following dialog box is displayed. Click
Software Installation
Software Installation
Select the path for storing backup files and click Next.
Caution:
Do not make the path for backing up the database in the same drive as the installation path of this
system or set the path for backing up the database in the root directory of the drive.
If you do not select a path for backing up files, directly click Next. The following dialog box is displayed:
Click Install.
3
Software Installation
Start installation.
Click Next.
Software Installation
Click Install.
Select Yes, restart the computer now and click Finish to restart the computer.
After the software is installed, the following shortcut icon appears on the desktop:
5
Software Instructions
Software Instructions
Software Function
Functions
Input personnel information on software, which includes ID, name, card number, fingerprint,
password, etc. Uploading personnel information from software to lock via U-Disk.
Setting access control function, which includes Access Timetable, Holiday, Access Levels. Enable
above configuration in the locks.
Features
Support to connect with 225 pieces locks at most in standard configuration.
Visible and reasonable work flows come from abundant experience in access control management.
Automatic user name lists management.
Multilevel management role-based level management secures user data confidentiality.
Overview
Software Modules:
Software Management
for example, set, back up, initialize and restore the database.
Personnel: Primarily two parts: first, Department Management settings, used to set the Company's
organizational chart; Second, Personnel Management settings, used to input personnel information, assign
departments, maintain and manage personnel.
Device: namely smart lock. You can add a smart lock device. The system communicates with a smart
lock through a USB drive.
Access Control: Including Access Timetable, Holiday, Access Levels, Which is used to
enable/disable users open specified locks under proper timetable.
Basic Process
Follow the process below to operate the software:
Add DeviceAdd PersonnelAdd Access Control DefinitionExport to U-Disk
Software Management
Software Login
Double-click the Biolock Access Control icon on the desktop. The login page is displayed.
Enter the username and password and click OK to enter the system. The initial username is admin and
the password is admin. After logging in to the system for the first time, you can change the password by
using the Modify Password function to guarantee system security.
Modify Password
Select System > Modify Password. The page for changing the password is displayed.
Enter the old password and a new password, confirm the new password, and click OK. The password is
7
Software Management
changed.
User Management
During daily use, different users can be allocated for the system to perform operation on the system. The
initial user that has logged in to the system can perform all system operations and manage any department
and personnel in the system. For a new user, the management department and management area need to
be set. If no option is selected, all management departments and management areas are selected by
default.
Add User
Enter User Name, Password, Confirm Password, Role, and Remarks, select Status, and click OK.
The system returns to the user management interface and the added user is displayed in the user list.
Note:
A password must be longer than four bytes and shorter than 18 bytes.
The user status Normal indicates that the user can log in to the system and perform operation and the
status Disable indicates that the user cannot log in to the system.
Edit User
Select a user and click Edit. The page for editing a user is displayed.
Software Management
Delete User
Select a user, click Department Management, and allocate a management department for the user.
Select a user, click Area Management, and allocate a management area for the user.
Software Management
Database Management
The software considers MS Access to be the default database. The system provides the functions of setting,
backing up, restoring, and initializing the database.
Database Connection
Click Browse, enter the preset path for the database, and select the database. Click OK and enter the
password of the database (if no password is set, you do not need to enter any information).
Click OK. The database is set.
Backup Database
Back up the system database regularly to guarantee data security. When you need to use the database
that is backed up, restore the data.
Select System > Database Management > Backup Database. The following message is displayed:
Click Yes. Backup starts. After data is backed up completely, the following message is displayed:
10
Software Management
Note: You are advised to back up data after creating personnel archives information and equipment
information and setting access control for some modules.
Restore Database
Select System > Database Management > Restore Database. The page for selecting the database
that is backed up is displayed.
Select the database that is backed up successfully and click Open. The following dialog box is displayed:
Click Yes. The system restarts. During the process, the database is restored.
Caution: Do not close any command line window that is displayed during the process of database
restoration.
Select System > Database Management > Database Backup Path Set. The following dialog box is
displayed:
Software Management
Caution:
During software installation, set the path for backing up the database as prompted. If the path is not
preset, the system cannot back up the database.
Do not make the path for backing up the database in the same drive as the installation path of this
system or set the path for backing up the database on the desktop or in the root directory of the drive.
12
Personnel Management
Personnel Management
Department Management
Before managing personnel of the company, you need to describe and manage the organizational structure
of the company. When you use the system for the first time, the system has a default tier-1 department
whose name is Company Name and number is 1. The department can be modified but cannot be deleted.
Department management functions include adding a department, editing a department, and deleting a
department.
Add Department
Select Personnel > Department > Add. The page for adding a department is displayed.
Description of fields:
Department Name: A department name can be any
characters or a combination of up to 50 characters.
Department Number: If a department number is needed,
the department number cannot be repeated and the total
length of the department number cannot exceed 50 bytes.
Parent Department: When adding a department, select a
department as the upper-level department of the new
department or select an upper-level department from the
menu.
After editing information, click OK. Or click Cancel to cancel the operation.
Caution:
"Parent Department" is an important parameter for determining the organizational structure of the
company. Be sure to select a correct parent department.
You can also add a department by importing department information from other software or documents
to this system. The specific operation procedure is the same as that of Import Personnel. For details,
see Import Personnel.
After adding a department, right-click any department in the department list and select Tree Show.
The following page is displayed:
13
Personnel Management
Edit Department
If a department or the organizational structure of the company is changed, you can modify the information,
for example, department name, department number or parent department, by using the edit function.
Select Personnel > Department, select a desired department, and click Edit. The specific operation
procedure is the same as that for adding a department.
Delete Department
To cancel a department, select the department and click Delete or directly click Delete behind the
department.
Select Personnel > Department, select a desired department, and click Delete. The following message
is displayed:
Click OK.
Caution: Do not delete or modify a department at random. If you delete or modify a department, the
personnel belonging to the department will not have a management department and some historical data
cannot be queried. If you really need to be delete or modify a department, transfer personnel of the
department to another department first.
Log Entries
Log entries record historical operations on the system. All operations are recorded in the form of list. On the
department page, personnel page, and issue card page, the log entry button is available. Click the button to
display related records.
Personnel Management
Before using or managing the system, you need to register personnel in the system or import personnel
information in other software to this system.
14
Personnel Management
Add Personnel
Select Personnel > Personnel > Add. The page for adding a person is displayed.
15
Personnel Management
Click Alternative Access Levels. The page for setting access control is displayed.
Alternative Access Levels: Select an access level and set the start date and end date of a valid period.
Valid Time is set for temporary access control, that is, doors can be opened in the valid period. If you do
not select the option, the access control is always effective by default.
Note: Only when the Access Control finished setting, can you do the operations above.
After editing personnel information, click OK. The added person is displayed in the personnel list. Click
Save and Continue to continue to add persons.
Caution:
To batch add persons, you need to select an object to copy. When no personnel information is
available, the batch adding function cannot be used.
The length of personnel numbers of persons to be batch added cannot exceed eight bytes. Only 1000
persons can be batch added at a time.
Select a person that will be copied as an object and click Batch Add Personnel.
16
Personnel Management
Number Format: format of personnel number. (*) indicates wildcard. Take care not to delete or modify the
wildcard.
Wildcards(*)width: valid width of wildcard. It mainly limits the number of digits in the From and To edit
boxes.
Select the fields Name to copy: information of batch added personnel that is the same as information of
the copied person.
After setting the preceding parameters, select fields to be copied on the right and click OK.
After data is saved, close the window and click Personnel again. The personnel list is changed to the
following:
17
Personnel Management
For the preceding functions, you can select a person and click Edit. On the editing page, modify information
and click OK. Or select a person and click Delete to delete the person.
Note: After a person is deleted, the information about the person in the database is also deleted.
Import Personnel
If electronic personnel archives already exist, import the archives to this system through the import function.
A TXT file must contain fields of corresponding personnel information, for example, personnel number,
name, and department number.
After selecting the file format and target file (a file in the corresponding format must be available locally),
click Next.
18
Personnel Management
Click Next. The import progress bar is displayed. After import is complete, close the window.
19
Personnel Management
Issue Card
Allocate card numbers to personnel. You can allocate a card number when a person is added or allocate
a card number through the Issue Card menu.
The card issuer is connected to the PC through a USB port. Click the box for entering a card number and
swipe a card on the card issuer. The card number is automatically displayed in the box.
Issue Card
Select Personnel > Issue Card and click Add, or select a person in the personnel information list,
right-click, and select Add. The following dialog box is displayed:
In the personnel list, select a personnel card number and click Edit or Delete to modify the card
number or delete the selected object.
20
Device Management
Device Management
Area Management
Area is a concept of space. It helps users manage devices in the specified area. After an area is set, you
can filter devices (doors) based on the area during real-time monitoring. By default, an area whose name
is Area Name" and number is 1 exists in the system. Area setting operations include adding an area,
editing an area, and deleting an area.
Add Area
Select Device > Area > Add. The page for adding an area is displayed:
Delete Area
Select an area and click Delete. In the dialog box displayed, click Yes.
Edit Area
Select an area and click Edit. On the page for editing an area, modify related parameters.
Device Management
After parameters about communication between the system and a smart lock are set, the system can
communicate with the smart lock. In the system, view the information about the connected smart lock.
Add Device
21
Device Management
After setting the preceding parameters, click OK. The system attempts to connect the current device.
If the device is connected successfully, the system will read extension parameters of the device and
information about the device is displayed in the device list.
2.
22
Device Management
After a device is searched, click Add U-Disk. In the dialog box displayed, enter the device name,
select an area for the device, and click OK. The device is added to the device list.
The system displays current smart locks in the scope of all permissions. You can edit smart locks here. If you
need to add or delete a smart lock, perform related operations in device management.
Select a smart lock and click Edit or Delete to modify or delete the smart lock.
Search Device
Select Device > Device > Search. A dialog box is displayed. Enter related information and click OK.
U-Disk Management
USB drive management includes importing user data, exporting user data, and importing record data.
Select Device > U-Disk Management. The U-Disk Management page is displayed.
23
Device Management
After user data is imported successfully to the system, the user data is displayed on the U-Disk
Management page, as shown in the following figure:
You can select corresponding personnel to update the personnel in the local computer. After the
personnel are updated, the personnel of corresponding numbers in the local computer are changed to
24
Device Management
Export to U-Disk
Select personnel to be exported and click Export user data to local. The following page is displayed:
Select the path for saving the data and save the data. The system prompts that the operation is
successful. Click OK.
2. Export user data to a USB drive.
Select personnel to be exported, select the file type and algorithm in the drop-down box, and click
Export user data to U-Disk.
25
Device Management
After the user data is exported successfully, you can check whether corresponding data already exists
in the USB drive.
Caution:
When you export data to a USB drive or import data from a USB drive, make sure that the USB
drive is correctly connected to the computer and corresponding data exists in the USB drive.
File types include .DAT and .U. Data in a .DAT file is downloaded from a fingerprint lock by using
algorithm 9.0. When you select .DAT for the file type, the algorithm must be algorithm 9.0.
Click Import record from U-Disk. When records exist in the USB drive, the data is imported to the
system, as shown in the following figure:
26
Device Management
Click Export Data to Local and select a local storage path. When records exist in the system, the
data is imported to the local computer.
Open a file that is saved in the local computer. The following information is displayed:
3. Delete Records
Delete record data in the system.
Select a record on the left and click Delete record. The record is deleted.
27
Access Control
Access Control
It is used to enable/disable user open specified locks under proper timetable. But you need to set the
option of Access Timetable, Holiday, Access Level in advance.
Access Timetable
The system can define up to 255 timetable. For each timetable, you can define, during a week, you can
define up to three intervals for each day and three holiday types for each timetable. Each interval is the
valid interval in 24 hours of each day. The format of each interval for a timetable: HH: MM-HH: MM, this
is accurate to minutes in the 24-hour system.
Initially, by default the system has access control time table named [Accessible 24 hours]. This time
period can be modified but cannot be deleted. The user can add Access Control Timetable that can be
modified.
Add Timetable
Select Access Control > Timetable > Add. The page for setting a time segment is displayed.
Access Control
For example, the Children's Day in 2014 is Sunday (June 1st). When adding holidays, you can set the
Children's Day as holiday type 1. When June 1st, 2014 arrives, the equipment manages access control
timetable according to the preset holiday type 1, instead of the preset timetable on Sunday.
Start Time: Start time of a timetable.
End Time: End time of a timetable.
Note:
If the holiday type of a timetable is not set, the access is denied in 24 hours by default.
In the time axis of each day in a week and three holiday types, click where time starts and drag the
mouse to where time ends, or click Start Time and End Time in the lower part of the window to set a
time segment. To modify or delete a timetable, right-click in the time axis and select Modify time or
Delete time, as shown in the following figure:
After setting the preceding information, click OK to return to the list of access control time segments.
Edit: In the time segment list, double-click a time segment or select a time segment and click Edit. On
the page for editing a time segment, modify the time segment and click OK. The modified time segment
is saved and displayed in the time segment list.
Delete: In the time segment list, select a time segment and click Delete. Click Yes to delete the time
segment or click Cancel to cancel the operation. You cannot delete an access control time segment that is
currently in use.
29
Access Control
Holidays
The Access Control Time of a holiday may differ from that of a weekday. For easy operation, the system
provides holiday settings to set access control time for holidays.
Access Control Holiday Management includes Add, Modify and Delete Access Control Holiday.
Add Holiday
Three holiday types are supported, each including up to 32 holidays. To conduct special access level
configuration on special dates, the user can select special holidays for setting.
Select Access Control > Holidays > Add. The page for adding an access control holiday is
displayed.
After editing information, click OK. The holiday name is displayed in the list.
Edit Holidays
In the access control holiday list, double-click an access control holiday or select an access control
holiday and click Edit. The page for editing an access control holiday is displayed. Modify the holiday
and click OK.
Delete Holidays
In the access control holiday list, select an access control holiday and click Delete. Then click Yes to
delete the holiday or click Cancel to cancel the operation. The access control holiday that is currently in
30
Access Control
Access Levels
Access levels means in a specific time period, which door or door combination can be opened through
verification.
Select Access Control > Access Level > Add. The page for adding an access level is displayed.
Set various parameters: Set Access Level Name (cannot be repeated), select Access Control
Timetable, and select door combination and personnel.
Select the doors in the access levels as multi-choice, so you can select different locks.
When adding personnel, if selected personnel exist in the current access level, the system can not
add again.
Two levels with the same timetable and door combination are not allowed in the system.
Select an access level and click Personnel Access Level Setting. The page for setting access levels
is displayed.
31
Access Control
Select a person and click Delete From Access Levels to delete the access level of the person.
32
Appendix
Appendix
FAQs
Q: How to use the card issuer?
A: Select a person to issue cards and connect the card issuer to a PC through a USB port. Click the box
for entering a card number and swipe a card on the card issuer. The card number is automatically
displayed in the box.
Q: I want to set accounts for all personnel in the Finance Department of the company? How do I
operate?
A. First of all, set roles in system settings: 1. Create a role and configure various functions to be used by
the role. 2. Add a user, set user information, and select the role you set for the user. An account is added.
3. Follow the procedure to add other accounts.
Q: How to adjust the department of a person?
A: To adjust the department of a person, in the personnel list, select a person and click Edit. The
detailed information about the person is displayed. In the department option, modify the department of
the person. Q: How to set access control levels for visitors?
A: The procedure for setting access control levels is as follows: 1. Add the personnel to the system and
enter related information. 2. Select access control levels suitable to the personnel. If no suitable access
control levels are available, enter the access control system and add related settings. 3. Set a valid
period, that is, start date and end date when they need to use access control levels.
Q: How to cancel an access control level?
A: The following methods can be used to cancel an access control level: 1. Disable access control: In the
personnel list, select a person and click Edit. The detailed information about the person is displayed. In
the access control setting, delete the access level and personnel group for opening doors using multiple
cards. 2. Delete a person: In the personnel list, select a person and click Delete. The person is deleted
from the system and corresponding access control information is deleted. 3. In Personnel Access
Control Setting, select an access level and click Delete from Access Levels.
33
Appendix
34
Appendix
The Author of this Software expressly disclaims any warranty for the SOFTWARE PRODUCT. The
SOFTWARE PRODUCT and any related documentation is provided "as is" without warranty of any kind,
either express or implied, including, without limitation, the implied warranties or merchantability, fitness
for a particular purpose, or no infringement. The entire risk arising out of use or performance of the
SOFTWARE PRODUCT remains with you.
NO LIABILITY FOR DAMAGES.
In no event shall the author of this Software be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or
any other pecuniary loss) arising out of the use of or inability to use this product, even if the Author of this
Software has been advised of the possibility of such damages.
Acknowledgment of Agreement.
I have carefully read and understand this Agreement, ZKTeco, Inc.s Privacy Policy Statement.
If YOU ACCEPT the terms of this Agreement:
I acknowledge and understand that by ACCEPTING the terms of this Agreement.
IF YOU DO NOT ACCEPT the terms of this Agreement.
I acknowledge and understand that by refusing to accept these terms, I have rejected this license
agreement and therefore have no legal right to install, use, or copy this Product or the Licensed Software
that it incorporates.
35
3
6