Sie sind auf Seite 1von 38

User Manual

Biolock Access Control Software


Version: 1.0
Date: June 2014

Contents

Contents
Software Installation ....................................................................................... 1
Cautions ..................................................................................................................................................... 1
Installation .................................................................................................................................................. 1

Software Instructions ...................................................................................... 6


Software Function ...................................................................................................................................... 6
Basic Process ............................................................................................................................................ 7

Software Management .................................................................................... 7


Software Login ........................................................................................................................................... 7
Modify Password ....................................................................................................................................... 7
User Management ..................................................................................................................................... 8
Database Management ........................................................................................................................... 10

Personnel Management ................................................................................ 13


Department Management ........................................................................................................................ 13
Personnel Management .......................................................................................................................... 14
Issue Card ............................................................................................................................................... 20

Device Management ...................................................................................... 21


Area Management ................................................................................................................................... 21
Device Management ................................................................................................................................ 21
U Disk Management ................................................................................................................................ 23

Access Control .............................................................................................. 28


Access Timetable .................................................................................................................................... 28
Holidays ................................................................................................................................................... 30
Access Levels .......................................................................................................................................... 31

Appendix ........................................................................................................ 33
FAQs ........................................................................................................................................................ 33
SOFTWARE PRODUCT LICENSE ......................................................................................................... 34

Software Installation

Software Installation
Cautions

Configuration Requirements:
CPU: Master frequency of 2.0 GHz or above.
Memory: 1 GB or above.
Hardware: Available space of 10 G or above. We recommend using NTFS hard disk partition as the
system installation directory (NTFS hard disk partition has the better performance and higher security).
Resolution of monitor: 1024x768 or above.

Operating System:
Supported Operating Systems: Windows XP/Windows 2003/Windows Vista/Windows7/Windows8
Supported Databases: Microsoft Access

Note:

If the software has been installed in the computer, uninstall the software, reboot the computer, and
install the software again.

During installation, file registration, registry modification, and batch file processing are performed.
Note that anti-virus software may stop program installation by reporting an error. The firewall software
installed in the computer will stop the service. Please select Allow for all options or disable the firewall
and then start installation again.

Installation
Double-click
OK.

Click Next.

under the installation directory. The following dialog box is displayed. Click

Software Installation

Select I accept the agreement and click Next.

Select the installation path and click Next.

Select the path for creating a shortcut and click Next.

Software Installation

Select the path for storing backup files and click Next.

Caution:
Do not make the path for backing up the database in the same drive as the installation path of this
system or set the path for backing up the database in the root directory of the drive.

The storage and backup paths cannot contain Chinese characters.

The storage path cannot contain spaces.

If you do not select a path for backing up files, directly click Next. The following dialog box is displayed:

Click Install.
3

Software Installation

Start installation.

Install Fingerprint Reader Driver and click Next.

Click Next.

Software Installation

Click Install.

Select Yes, restart the computer now and click Finish to restart the computer.

After the software is installed, the following shortcut icon appears on the desktop:
5

Software Instructions

Software Instructions
Software Function

Functions

Input personnel information on software, which includes ID, name, card number, fingerprint,
password, etc. Uploading personnel information from software to lock via U-Disk.

Downloading user data from lock to software via U-Disk.


Exporting unlocking records from the lock to software via U-Disk and saving the records in local
computer.

Setting access control function, which includes Access Timetable, Holiday, Access Levels. Enable
above configuration in the locks.

Features
Support to connect with 225 pieces locks at most in standard configuration.
Visible and reasonable work flows come from abundant experience in access control management.
Automatic user name lists management.
Multilevel management role-based level management secures user data confidentiality.

Overview

Software Modules:

The system includes five major functional modules.


System: Allocates system users, changes a password, initializes the system, and manages the database,
6

Software Management

for example, set, back up, initialize and restore the database.
Personnel: Primarily two parts: first, Department Management settings, used to set the Company's
organizational chart; Second, Personnel Management settings, used to input personnel information, assign
departments, maintain and manage personnel.
Device: namely smart lock. You can add a smart lock device. The system communicates with a smart
lock through a USB drive.
Access Control: Including Access Timetable, Holiday, Access Levels, Which is used to
enable/disable users open specified locks under proper timetable.

Basic Process
Follow the process below to operate the software:
Add DeviceAdd PersonnelAdd Access Control DefinitionExport to U-Disk

Software Management
Software Login
Double-click the Biolock Access Control icon on the desktop. The login page is displayed.

Enter the username and password and click OK to enter the system. The initial username is admin and
the password is admin. After logging in to the system for the first time, you can change the password by
using the Modify Password function to guarantee system security.

Modify Password
Select System > Modify Password. The page for changing the password is displayed.

Enter the old password and a new password, confirm the new password, and click OK. The password is
7

Software Management

changed.

User Management
During daily use, different users can be allocated for the system to perform operation on the system. The
initial user that has logged in to the system can perform all system operations and manage any department
and personnel in the system. For a new user, the management department and management area need to
be set. If no option is selected, all management departments and management areas are selected by
default.

Select System > User. The user management interface is displayed.

Add User

Click Add. The page for adding a user is displayed.

Enter User Name, Password, Confirm Password, Role, and Remarks, select Status, and click OK.
The system returns to the user management interface and the added user is displayed in the user list.

Note:

A password must be longer than four bytes and shorter than 18 bytes.

Only administrator can be selected for Role.

The user status Normal indicates that the user can log in to the system and perform operation and the
status Disable indicates that the user cannot log in to the system.

Edit User

Select a user and click Edit. The page for editing a user is displayed.

Software Management

Modify user information and click OK.

Delete User

Select a user and click Delete. The following message is displayed:

Click Yes to delete the user.

Allocate Management Department for a New User

Select a user, click Department Management, and allocate a management department for the user.

Allocate Management Area for a New User

Select a user, click Area Management, and allocate a management area for the user.

Software Management

Database Management
The software considers MS Access to be the default database. The system provides the functions of setting,
backing up, restoring, and initializing the database.

Database Connection

Select System > Database Management > Database Connection.

Click Browse, enter the preset path for the database, and select the database. Click OK and enter the
password of the database (if no password is set, you do not need to enter any information).
Click OK. The database is set.

Backup Database

Back up the system database regularly to guarantee data security. When you need to use the database
that is backed up, restore the data.

Select System > Database Management > Backup Database. The following message is displayed:

Click Yes. Backup starts. After data is backed up completely, the following message is displayed:

10

Software Management

Note: You are advised to back up data after creating personnel archives information and equipment
information and setting access control for some modules.

Restore Database

Select System > Database Management > Restore Database. The page for selecting the database
that is backed up is displayed.

Select the database that is backed up successfully and click Open. The following dialog box is displayed:

Click Yes. The system restarts. During the process, the database is restored.
Caution: Do not close any command line window that is displayed during the process of database
restoration.

Database Backup Path Setting

Select System > Database Management > Database Backup Path Set. The following dialog box is
displayed:

Click Browser, select a backup path, and click OK.


11

Software Management

Caution:
During software installation, set the path for backing up the database as prompted. If the path is not
preset, the system cannot back up the database.
Do not make the path for backing up the database in the same drive as the installation path of this
system or set the path for backing up the database on the desktop or in the root directory of the drive.

12

Personnel Management

Personnel Management
Department Management
Before managing personnel of the company, you need to describe and manage the organizational structure
of the company. When you use the system for the first time, the system has a default tier-1 department
whose name is Company Name and number is 1. The department can be modified but cannot be deleted.
Department management functions include adding a department, editing a department, and deleting a
department.

Add Department

Select Personnel > Department > Add. The page for adding a department is displayed.
Description of fields:
Department Name: A department name can be any
characters or a combination of up to 50 characters.
Department Number: If a department number is needed,
the department number cannot be repeated and the total
length of the department number cannot exceed 50 bytes.
Parent Department: When adding a department, select a
department as the upper-level department of the new
department or select an upper-level department from the
menu.

After editing information, click OK. Or click Cancel to cancel the operation.
Caution:

"Parent Department" is an important parameter for determining the organizational structure of the
company. Be sure to select a correct parent department.

You can also add a department by importing department information from other software or documents
to this system. The specific operation procedure is the same as that of Import Personnel. For details,
see Import Personnel.

After adding a department, right-click any department in the department list and select Tree Show.
The following page is displayed:

13

Personnel Management

Edit Department

If a department or the organizational structure of the company is changed, you can modify the information,
for example, department name, department number or parent department, by using the edit function.

Select Personnel > Department, select a desired department, and click Edit. The specific operation
procedure is the same as that for adding a department.

Delete Department

To cancel a department, select the department and click Delete or directly click Delete behind the
department.

Select Personnel > Department, select a desired department, and click Delete. The following message
is displayed:

Click OK.
Caution: Do not delete or modify a department at random. If you delete or modify a department, the
personnel belonging to the department will not have a management department and some historical data
cannot be queried. If you really need to be delete or modify a department, transfer personnel of the
department to another department first.

Log Entries

Log entries record historical operations on the system. All operations are recorded in the form of list. On the
department page, personnel page, and issue card page, the log entry button is available. Click the button to
display related records.

Personnel Management
Before using or managing the system, you need to register personnel in the system or import personnel
information in other software to this system.
14

Personnel Management

Add Personnel

Select Personnel > Personnel > Add. The page for adding a person is displayed.

The following describes the fields:


Personnel Number: The value range is 1 to 65534.
Department: Click the drop-down box. The window for selecting a department is displayed. Select a
department and double-click or click OK.
Name: The name length is shorter than 40.
Card Number: The value range is from 1 to 9999999999. It can be typed manually or got by card
issuer.
Password: The length range is 6 -10 digits. Please set the proper password according to the lock with
existed keypad numbers.
Picture: The best size is 120x140 pixel and the format must be JPG.
Employee Date: The current date is used by default.
Terminal Management: including common user and super administrator.

Click Details. For page for editing details is displayed.

15

Personnel Management

Click Alternative Access Levels. The page for setting access control is displayed.

Alternative Access Levels: Select an access level and set the start date and end date of a valid period.
Valid Time is set for temporary access control, that is, doors can be opened in the valid period. If you do
not select the option, the access control is always effective by default.
Note: Only when the Access Control finished setting, can you do the operations above.

After editing personnel information, click OK. The added person is displayed in the personnel list. Click
Save and Continue to continue to add persons.

Batch Add Personnel

Caution:

To batch add persons, you need to select an object to copy. When no personnel information is
available, the batch adding function cannot be used.

The length of personnel numbers of persons to be batch added cannot exceed eight bytes. Only 1000
persons can be batch added at a time.

Select a person that will be copied as an object and click Batch Add Personnel.

16

Personnel Management

Number Format: format of personnel number. (*) indicates wildcard. Take care not to delete or modify the
wildcard.
Wildcards(*)width: valid width of wildcard. It mainly limits the number of digits in the From and To edit
boxes.
Select the fields Name to copy: information of batch added personnel that is the same as information of
the copied person.

After setting the preceding parameters, select fields to be copied on the right and click OK.

After data is saved, close the window and click Personnel again. The personnel list is changed to the
following:

17

Personnel Management

Edit and Delete Personnel

For the preceding functions, you can select a person and click Edit. On the editing page, modify information
and click OK. Or select a person and click Delete to delete the person.
Note: After a person is deleted, the information about the person in the database is also deleted.

Import Personnel

If electronic personnel archives already exist, import the archives to this system through the import function.

Click Import. The page for editing import is displayed.

Target file: Click Browse and select a file to be imported.


File format: Select the format of a file to be imported.
Caution:

Excel files must be in the .xls format.

A TXT file must contain fields of corresponding personnel information, for example, personnel number,
name, and department number.

After selecting the file format and target file (a file in the corresponding format must be available locally),
click Next.

18

Personnel Management

Select fields to be imported.

indicates selecting all,

indicates deselecting the item selected by using mouse, and


following figure shows data to be imported:

indicates selecting a single item,


indicates deselecting all. The

Click Next and select corresponding data source fields.

Click Next. The import progress bar is displayed. After import is complete, close the window.

19

Personnel Management

Issue Card
Allocate card numbers to personnel. You can allocate a card number when a person is added or allocate
a card number through the Issue Card menu.

Instructions for card issuer

The card issuer is connected to the PC through a USB port. Click the box for entering a card number and
swipe a card on the card issuer. The card number is automatically displayed in the box.

Issue Card

Select Personnel > Issue Card and click Add, or select a person in the personnel information list,
right-click, and select Add. The following dialog box is displayed:

Select a person, enter the card number, and click OK.

Modify or Edit Card Number

In the personnel list, select a personnel card number and click Edit or Delete to modify the card
number or delete the selected object.

20

Device Management

Device Management
Area Management
Area is a concept of space. It helps users manage devices in the specified area. After an area is set, you
can filter devices (doors) based on the area during real-time monitoring. By default, an area whose name
is Area Name" and number is 1 exists in the system. Area setting operations include adding an area,
editing an area, and deleting an area.

Add Area

Select Device > Area > Add. The page for adding an area is displayed:

The fields are described as follows:


Area Name: It is defined by any words or
numbers. For example: Front Door or 3 Floor.
Area Code: It must be unique numbers.
Parent Area: This parameter is mandatory. It
decides the area framework of the company.

After setting the preceding parameters, click OK.

Delete Area

Select an area and click Delete. In the dialog box displayed, click Yes.

Edit Area

Select an area and click Edit. On the page for editing an area, modify related parameters.

Device Management
After parameters about communication between the system and a smart lock are set, the system can
communicate with the smart lock. In the system, view the information about the connected smart lock.

Add Device

1. Select Device > Device > Add.

21

Device Management

The fields are described as follows:


Device Name: A device name can be any characters. A combination of up to 50 characters can be
used.
Area: area where a device is located.
Communication Mode: communication over USB drive.
Import U-Disk: Click to import a device file.
Device Number/Type: After a device file is imported, the file is displayed automatically.

After setting the preceding parameters, click OK. The system attempts to connect the current device.

If the device is connected successfully, the system will read extension parameters of the device and
information about the device is displayed in the device list.

2.

Select Device > Search Smart Lock.

Click Search U-Disk.

22

Device Management

After a device is searched, click Add U-Disk. In the dialog box displayed, enter the device name,
select an area for the device, and click OK. The device is added to the device list.

Edit or Delete Device

The system displays current smart locks in the scope of all permissions. You can edit smart locks here. If you
need to add or delete a smart lock, perform related operations in device management.

Select a smart lock and click Edit or Delete to modify or delete the smart lock.

Search Device

Select Device > Device > Search. A dialog box is displayed. Enter related information and click OK.

U-Disk Management
USB drive management includes importing user data, exporting user data, and importing record data.

Select Device > U-Disk Management. The U-Disk Management page is displayed.

23

Device Management

Import User from U-Disk

Import user data in an USB drive to the system.

On the U-Disk Management page, click Import User from U-Disk.

After user data is imported successfully to the system, the user data is displayed on the U-Disk
Management page, as shown in the following figure:

You can select corresponding personnel to update the personnel in the local computer. After the
personnel are updated, the personnel of corresponding numbers in the local computer are changed to
24

Device Management

the personnel you have just selected.

Export to U-Disk

Export user data in the system to the specified device.

On the U-Disk Management page, click Export to U-Disk.

In the user list on the left, select a user and click


users, click

to move the user to the right. To export all

to move all users to the right.

1. Export user data to the local computer.

Select personnel to be exported and click Export user data to local. The following page is displayed:

Select the path for saving the data and save the data. The system prompts that the operation is
successful. Click OK.
2. Export user data to a USB drive.

Select personnel to be exported, select the file type and algorithm in the drop-down box, and click
Export user data to U-Disk.

25

Device Management

After the user data is exported successfully, you can check whether corresponding data already exists
in the USB drive.
Caution:

When you export data to a USB drive or import data from a USB drive, make sure that the USB
drive is correctly connected to the computer and corresponding data exists in the USB drive.

File types include .DAT and .U. Data in a .DAT file is downloaded from a fingerprint lock by using
algorithm 9.0. When you select .DAT for the file type, the algorithm must be algorithm 9.0.

Import Record Data

On the U-Disk Management page, click Import record from U-Disk.

1. Import record from U-Disk


Import record data in a USB drive to the system.

Click Import record from U-Disk. When records exist in the USB drive, the data is imported to the
system, as shown in the following figure:

26

Device Management

2. Export Data to Local


Export record data in the system to a local computer.

Click Export Data to Local and select a local storage path. When records exist in the system, the
data is imported to the local computer.

Open a file that is saved in the local computer. The following information is displayed:

3. Delete Records
Delete record data in the system.

Select a record on the left and click Delete record. The record is deleted.

27

Access Control

Access Control
It is used to enable/disable user open specified locks under proper timetable. But you need to set the
option of Access Timetable, Holiday, Access Level in advance.

Access Timetable
The system can define up to 255 timetable. For each timetable, you can define, during a week, you can
define up to three intervals for each day and three holiday types for each timetable. Each interval is the
valid interval in 24 hours of each day. The format of each interval for a timetable: HH: MM-HH: MM, this
is accurate to minutes in the 24-hour system.
Initially, by default the system has access control time table named [Accessible 24 hours]. This time
period can be modified but cannot be deleted. The user can add Access Control Timetable that can be
modified.

Add Timetable

Select Access Control > Timetable > Add. The page for setting a time segment is displayed.

The parameters are as follows:


Timetable Name: Any character, up to a combination of 50 characters.
Remarks: Detailed description of the current timetable, including an explanation of the current timetable
and primary applications, facilitating the user or other users with same level to view timetable information.
The field is up to 70 characters.
Holiday Type: Three holiday types can be defined. The timetable of each type can be different. When
adding holidays, you must specify the holiday type.
In the access control system, the priority of holidays is higher than that of common weekdays.
28

Access Control

For example, the Children's Day in 2014 is Sunday (June 1st). When adding holidays, you can set the
Children's Day as holiday type 1. When June 1st, 2014 arrives, the equipment manages access control
timetable according to the preset holiday type 1, instead of the preset timetable on Sunday.
Start Time: Start time of a timetable.
End Time: End time of a timetable.
Note:

If the holiday type of a timetable is not set, the access is denied in 24 hours by default.

A maximum of three timetable can be set in a day.

In the time axis of each day in a week and three holiday types, click where time starts and drag the
mouse to where time ends, or click Start Time and End Time in the lower part of the window to set a
time segment. To modify or delete a timetable, right-click in the time axis and select Modify time or
Delete time, as shown in the following figure:

After setting the preceding information, click OK to return to the list of access control time segments.

Edit or Delete Timetable

Edit: In the time segment list, double-click a time segment or select a time segment and click Edit. On
the page for editing a time segment, modify the time segment and click OK. The modified time segment
is saved and displayed in the time segment list.
Delete: In the time segment list, select a time segment and click Delete. Click Yes to delete the time
segment or click Cancel to cancel the operation. You cannot delete an access control time segment that is
currently in use.

29

Access Control

Holidays
The Access Control Time of a holiday may differ from that of a weekday. For easy operation, the system
provides holiday settings to set access control time for holidays.
Access Control Holiday Management includes Add, Modify and Delete Access Control Holiday.

Add Holiday

Three holiday types are supported, each including up to 32 holidays. To conduct special access level
configuration on special dates, the user can select special holidays for setting.

Select Access Control > Holidays > Add. The page for adding an access control holiday is
displayed.

The parameters are as follows:


Holiday Name: Any character, up to a combination of 50 characters.
Holiday Type: Holiday Type 1/2/3, namely, A current holiday record belongs to these three holiday
types and each holiday type includes up to 32 holidays.
Start / End Date: Must meet the date format as "2012-1-1". The Start Date cannot be later than the End
Date otherwise the system will prompt an error. The year of the start date Start Date cannot be earlier
than the current year, and the holiday can not span years.
Recurring: Yes or No. The default is "No". Annual cycle means that a holiday does not require
modification in different years. For example, the Near Year's Day is on January 1 each year, and can be
set as "Yes". For another example, the Mother's Day is on the second Sunday of each May, so its date is
not fixed and should be set as "No".

After editing information, click OK. The holiday name is displayed in the list.

Edit Holidays

In the access control holiday list, double-click an access control holiday or select an access control
holiday and click Edit. The page for editing an access control holiday is displayed. Modify the holiday
and click OK.

Delete Holidays

In the access control holiday list, select an access control holiday and click Delete. Then click Yes to
delete the holiday or click Cancel to cancel the operation. The access control holiday that is currently in
30

Access Control

use cannot be deleted.

Access Levels
Access levels means in a specific time period, which door or door combination can be opened through
verification.

Add Access Level

Select Access Control > Access Level > Add. The page for adding an access level is displayed.

Set various parameters: Set Access Level Name (cannot be repeated), select Access Control
Timetable, and select door combination and personnel.

Select a person from the Alternative Personnel list and click

to move the person to the

selected personnel list.

Click OK. The added access level is displayed in the list.


Note:

Select the doors in the access levels as multi-choice, so you can select different locks.

When adding personnel, if selected personnel exist in the current access level, the system can not
add again.

Two levels with the same timetable and door combination are not allowed in the system.

Personnel Access Level Setting

Select an access level and click Personnel Access Level Setting. The page for setting access levels
is displayed.

31

Access Control

Select a person and click Delete From Access Levels to delete the access level of the person.

32

Appendix

Appendix
FAQs
Q: How to use the card issuer?
A: Select a person to issue cards and connect the card issuer to a PC through a USB port. Click the box
for entering a card number and swipe a card on the card issuer. The card number is automatically
displayed in the box.
Q: I want to set accounts for all personnel in the Finance Department of the company? How do I
operate?
A. First of all, set roles in system settings: 1. Create a role and configure various functions to be used by
the role. 2. Add a user, set user information, and select the role you set for the user. An account is added.
3. Follow the procedure to add other accounts.
Q: How to adjust the department of a person?
A: To adjust the department of a person, in the personnel list, select a person and click Edit. The
detailed information about the person is displayed. In the department option, modify the department of
the person. Q: How to set access control levels for visitors?
A: The procedure for setting access control levels is as follows: 1. Add the personnel to the system and
enter related information. 2. Select access control levels suitable to the personnel. If no suitable access
control levels are available, enter the access control system and add related settings. 3. Set a valid
period, that is, start date and end date when they need to use access control levels.
Q: How to cancel an access control level?
A: The following methods can be used to cancel an access control level: 1. Disable access control: In the
personnel list, select a person and click Edit. The detailed information about the person is displayed. In
the access control setting, delete the access level and personnel group for opening doors using multiple
cards. 2. Delete a person: In the personnel list, select a person and click Delete. The person is deleted
from the system and corresponding access control information is deleted. 3. In Personnel Access
Control Setting, select an access level and click Delete from Access Levels.

33

Appendix

SOFTWARE PRODUCT LICENSE


The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well
as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.
1. GRANT OF LICENSE. This EULA grants you the following rights: Installation and Use. You may
install and use an unlimited number of copies of the SOFTWARE PRODUCT.
Reproduction and Distribution. You may reproduce and distribute an unlimited number of copies of the
SOFTWARE PRODUCT; provided that each copy shall be a true and complete copy, including all
copyright and trademark notices, and shall be accompanied by a copy of this EULA. Copies of the
SOFTWARE PRODUCT may be distributed as a standalone product or included with your own product.
2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.
Limitations on Reverse Engineering, Recompilation, and Disassembly. You may not reverse engineer,
decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that such activity
is expressly permitted by applicable law notwithstanding this limitation.
Separation of Components.
The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be separated
for use on more than one computer.
Software Transfer.
You may permanently transfer all of your rights under this EULA, provided the recipient agrees to the
terms of this EULA.
Termination.
Without prejudice to any other rights, the Author of this Software may terminate this EULA if you fail to
comply with the terms and conditions of this EULA. In such event, you must destroy all copies of the
SOFTWARE PRODUCT and all of its component parts.
Distribution.
The SOFTWARE PRODUCT may not be sold or be included in a product or package which intends to
receive benefits through the inclusion of the SOFTWARE PRODUCT. The SOFTWARE PRODUCT may
be included in any free or non-profit packages or products.
3. COPYRIGHT.
All title and copyrights in and to the SOFTWARE PRODUCT(including but not limited to any images,
photographs, animations, video, audio, music, text, and "applets" incorporated into the SOFTWARE
PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PRODUCT are
owned by the Author of this Software. The SOFTWARE PRODUCT is protected by copyright laws and
international treaty provisions. Therefore, you must treat the SOFTWARE PRODUCT like any other
copyrighted material except that you may install the SOFTWARE PRODUCT on a single computer
provided you keep the original solely for backup or archival purposes.
LIMITED WARRANTY
NO WARRANTIES.

34

Appendix

The Author of this Software expressly disclaims any warranty for the SOFTWARE PRODUCT. The
SOFTWARE PRODUCT and any related documentation is provided "as is" without warranty of any kind,
either express or implied, including, without limitation, the implied warranties or merchantability, fitness
for a particular purpose, or no infringement. The entire risk arising out of use or performance of the
SOFTWARE PRODUCT remains with you.
NO LIABILITY FOR DAMAGES.
In no event shall the author of this Software be liable for any damages whatsoever (including, without
limitation, damages for loss of business profits, business interruption, loss of business information, or
any other pecuniary loss) arising out of the use of or inability to use this product, even if the Author of this
Software has been advised of the possibility of such damages.

Acknowledgment of Agreement.
I have carefully read and understand this Agreement, ZKTeco, Inc.s Privacy Policy Statement.
If YOU ACCEPT the terms of this Agreement:
I acknowledge and understand that by ACCEPTING the terms of this Agreement.
IF YOU DO NOT ACCEPT the terms of this Agreement.
I acknowledge and understand that by refusing to accept these terms, I have rejected this license
agreement and therefore have no legal right to install, use, or copy this Product or the Licensed Software
that it incorporates.

35

3
6

Das könnte Ihnen auch gefallen