ZKBioCVSecurity V6600 User Manual
Thank you for choosing our product. Please read the instructions carefully
before operation. Follow these instructions to ensure that the product is
functioning properly. The images shown in this manual are for illustrative
purposes only.
For further details, please visit our Company’s website
www.zkteco.com.
Page |1 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Copyright © 2022 ZKTECO CO., LTD. All rights reserved.
Without the prior written consent of ZKTeco, no portion of this manual can be copied or forwarded in
any way or form. All parts of this manual belong to ZKTeco and its subsidiaries (hereinafter the
"Company" or "ZKTeco").
Trademark
is a registered trademark of ZKTeco. Other trademarks involved in this manual are owned
by their respective owners.
Disclaimer
This manual contains information on the operation and maintenance of the ZKTeco equipment. The
copyright in all the documents, drawings, etc. in relation to the ZKTeco supplied equipment vests in
and is the property of ZKTeco. The contents hereof should not be used or shared by the receiver with
any third party without express written permission of ZKTeco.
The contents of this manual must be read as a whole before starting the operation and maintenance of
the supplied equipment. If any of the content(s) of the manual seems unclear or incomplete, please
contact ZKTeco before starting the operation and maintenance of the said equipment.
It is an essential pre-requisite for the satisfactory operation and maintenance that the operating and
maintenance personnel are fully familiar with the design and that the said personnel have received
thorough training in operating and maintaining the machine/unit/equipment. It is further essential for
the safe operation of the machine/unit/equipment that personnel has read, understood and followed
the safety instructions contained in the manual.
In case of any conflict between terms and conditions of this manual and the contract specifications,
drawings, instruction sheets or any other contract-related documents, the contract
conditions/documents shall prevail. The contract specific conditions/documents shall apply in priority.
ZKTeco offers no warranty, guarantee or representation regarding the completeness of any information
contained in this manual or any of the amendments made thereto. ZKTeco does not extend the
warranty of any kind, including, without limitation, any warranty of design, merchantability or fitness
for a particular purpose.
ZKTeco does not assume responsibility for any errors or omissions in the information or documents
which are referenced by or linked to this manual. The entire risk as to the results and performance
obtained from using the information is assumed by the user.
ZKTeco in no event shall be liable to the user or any third party for any incidental, consequential,
indirect, special, or exemplary damages, including, without limitation, loss of business, loss of profits,
business interruption, loss of business information or any pecuniary loss, arising out of, in connection
with, or relating to the use of the information contained in or referenced by this manual, even if ZKTeco
has been advised of the possibility of such damages.
This manual and the information contained therein may include technical, other inaccuracies or
P a g e |1 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
typographical errors. ZKTeco periodically changes the information herein which will be incorporated
into new additions/amendments to the manual. ZKTeco reserves the right to add, delete, amend or
modify the information contained in the manual from time to time in the form of circulars, letters, notes,
etc. for better operation and safety of the machine/unit/equipment. The said additions or amendments
are meant for improvement /better operations of the machine/unit/equipment and such amendments
shall not give any right to claim any compensation or damages under any circumstances.
ZKTeco shall in no way be responsible (i) in case the machine/unit/equipment malfunctions due to any
non-compliance of the instructions contained in this manual (ii) in case of operation of the
machine/unit/equipment beyond the rate limits (iii) in case of operation of the machine and equipment
in conditions different from the prescribed conditions of the manual.
The product will be updated from time to time without prior notice. The latest operation procedures
and relevant documents are available on http://www.zkteco.com.
If there is any issue related to the product, please contact us.
ZKTeco Headquarters
Address ZKTeco Industrial Park, No. 32, Industrial Road,
Tangxia Town, Dongguan, China.
Phone +86 769 - 82109991
Fax +86 755 - 89602394
For business related queries, please write to us at: [email protected].
To know more about our global branches, visit www.zkteco.com.
P a g e |2 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
About the Company
ZKTeco is one of the world’s largest manufacturer of RFID and Biometric (Fingerprint, Facial, Finger-vein)
readers. Product offerings include Access Control readers and panels, Near & Far-range Facial
Recognition Cameras, Elevator/Floor access controllers, Turnstiles, License Plate Recognition (LPR) gate
controllers and Consumer products including battery-operated fingerprint and face-reader door locks.
Our security solutions are multi-lingual and localized in over 18 different languages. At the ZKTeco
state-of-the-art 700,000 square foot ISO9001-certified manufacturing facility, we control manufacturing,
product design, component assembly, and logistics/shipping, all under one roof.
The founders of ZKTeco have been determined for independent research and development of
biometric verification procedures and the productization of biometric verification SDK, which was
initially widely applied in PC security and identity authentication fields. With the continuous
enhancement of the development and plenty of market applications, the team has gradually
constructed an identity authentication ecosystem and smart security ecosystem, which are based on
biometric verification techniques. With years of experience in the industrialization of biometric
verifications, ZKTeco was officially established in 2007 and now has been one of the globally leading
enterprises in the biometric verification industry owning various patents and being selected as the
National High-tech Enterprise for 6 consecutive years. Its products are protected by intellectual
property rights.
About the Manual
This manual introduces the operations of ZKBioCVSecurity.
All figures displayed are for illustration purposes only. Figures in this manual may not be exactly
consistent with the actual products.
P a g e |3 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Document Conventions
Conventions used in this manual are listed below:
GUI Conventions
For Software
Convention Description
Bold font Used to identify software interface names e.g. OK, Confirm, Cancel.
Multi-level menus are separated by these brackets. For example, File > Create >
>
Folder.
For Device
Convention Description
<> Button or key names for devices. For example, press <OK>.
Window names, menu items, data table, and field names are inside square brackets.
For example, pop up the New User window.
Multi-level menus are separated by forwarding slashes. For example,
/
File/Create/Folder.
Symbols
Convention Description
This represents a note that needs to pay more attention to.
The general information which helps in performing the operations faster.
The information which is significant.
Care taken to avoid danger or mistakes.
The statement or event that warns of something or that serves as a cautionary
example.
P a g e |4 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
TABLE OF CONTENTS
1 INSTALLATION AND LOGIN ...................................................................................................................... 18
OPERATING ENVIRONMENT REQUIREMENTS ................................................................................................................... 18
SYSTEM INSTALLATION ......................................................................................................................................................19
2 PERSONNEL ........................................................................................................................................... 21
PERSONNEL MANAGEMENT .............................................................................................................................................. 21
2.1.1 PERSON .......................................................................................................................................................................22
2.1.2 DEPARTMENT ............................................................................................................................................................. 38
2.1.3 POSITION .................................................................................................................................................................... 40
2.1.4 DISMISSED PERSONNEL .............................................................................................................................................42
2.1.5 PENDING REVIEW ....................................................................................................................................................... 43
2.1.6 CUSTOM ATTRIBUTES ................................................................................................................................................ 43
2.1.7 LIST LIBRARY ...............................................................................................................................................................45
2.1.8 PARAMETERS .............................................................................................................................................................. 46
CARD MANAGEMENT ........................................................................................................................................................ 49
2.2.1 CARD ...........................................................................................................................................................................49
2.2.2 WEIGAND FORMAT ....................................................................................................................................................51
2.2.3 ISSUE CARD RECORD ................................................................................................................................................. 54
3 ACCESS CONTROL .................................................................................................................................. 55
OPERATION SCENARIO ...................................................................................................................................................... 55
OPERATION PROCESS ........................................................................................................................................................ 55
ACCESS DEVICE ..................................................................................................................................................................56
3.3.1 DEVICE ........................................................................................................................................................................ 56
3.3.2 DOOR .......................................................................................................................................................................... 65
3.3.3 READER ....................................................................................................................................................................... 68
3.3.4 AUXILIARY INPUT ....................................................................................................................................................... 69
3.3.5 AUXILIARY OUTPUT ................................................................................................................................................... 70
3.3.6 EVENT TYPE ................................................................................................................................................................ 71
3.3.7 DAYLIGHT SAVING TIME ............................................................................................................................................73
3.3.8 DEVICE MONITORING ................................................................................................................................................ 74
3.3.9 REAL-TIME MONITORING .......................................................................................................................................... 76
3.3.10 ALARM MONITORING ................................................................................................................................................ 80
3.3.11 MAP ............................................................................................................................................................................ 81
ACCESS RULE ..................................................................................................................................................................... 82
3.4.1 TIMEZONE ...................................................................................................................................................................82
3.4.2 HOLIDAY .....................................................................................................................................................................84
3.4.3 ACCESS LEVEL ............................................................................................................................................................ 85
3.4.4 SET ACCESS LEVEL ALLOCATION ..............................................................................................................................91
P a g e |5 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.5 SET ACCESS LEVEL GROUPS BY PERSON ................................................................................................................. 93
3.4.6 SET ACCESS LEVEL GROUPS BY DEPARTMENT ........................................................................................................95
3.4.7 INTERLOCK .................................................................................................................................................................. 96
3.4.8 LINKAGE ...................................................................................................................................................................... 97
3.4.9 ANTI-PASSBACK .......................................................................................................................................................100
3.4.10 THE FIRST-PERSON NORMALLY OPEN .................................................................................................................. 101
3.4.11 MULTI-PERSON GROUP .......................................................................................................................................... 103
3.4.12 MULTI-PEOPLE OPEN THE DOOR ..........................................................................................................................105
3.4.13 VERIFICATION MODE ...............................................................................................................................................107
3.4.14 PARAMETERS ............................................................................................................................................................108
ADVANCED FUNCTION ....................................................................................................................................................110
3.5.1 ENTRANCE GUARD AREA(ZONE) ........................................................................................................................... 110
3.5.2 READER DEFINITION ................................................................................................................................................112
3.5.3 WHO IS INSIDE ......................................................................................................................................................... 114
3.5.4 GLOBAL ANTI-PASSBACK ....................................................................................................................................... 115
3.5.5 GLOBAL LINKAGE .................................................................................................................................................... 117
3.5.6 THE GLOBAL INTERLOCK GROUP ........................................................................................................................... 119
3.5.7 THE GLOBAL INTERLOCK .........................................................................................................................................121
3.5.8 PERSONNEL AVAILABILITY ...................................................................................................................................... 122
3.5.9 OCCUPANCY CONTROL ...........................................................................................................................................124
3.5.10 MUSTER POINT ........................................................................................................................................................ 125
3.5.11 MUSTER POINT SETTING .........................................................................................................................................129
ACCESS CONTROL REPORTS ...........................................................................................................................................131
3.6.1 ALL TRANSACTIONS ................................................................................................................................................ 132
3.6.2 EVENTS FROM TODAY ............................................................................................................................................. 133
3.6.3 ALL EXCEPTION EVENTS ..........................................................................................................................................134
3.6.4 ACCESS RIGHTS BY DOOR ...................................................................................................................................... 135
3.6.5 ACCESS RIGHTS BY PERSONNEL .............................................................................................................................136
3.6.6 FIRST IN AND LAST OUT ......................................................................................................................................... 137
4 VIDEO MANAGEMENT ...........................................................................................................................138
VIDEO VIEW ......................................................................................................................................................................138
4.1.1 VIDEO PREVIEW ....................................................................................................................................................... 138
4.1.2 VIDEO PLAYBACK .................................................................................................................................................... 142
DEVICE MANAGEMENT ................................................................................................................................................... 142
4.2.1 DEVICE (ADD DEVICE)............................................................................................................................................ 142
4.2.2 CAMERA ................................................................................................................................................................... 145
4.2.3 GROUP MANAGEMENT ........................................................................................................................................... 157
DECODING ON THE WALL ..............................................................................................................................................157
4.3.1 DECODER ................................................................................................................................................................. 158
P a g e |6 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.3.2 TV WALL ..................................................................................................................................................................158
4.3.3 LARGE SCREEN CONTROL ....................................................................................................................................... 160
SEARCH .............................................................................................................................................................................161
4.4.1 FACE SEARCH ...........................................................................................................................................................161
4.4.2 VEHICLE RETRIEVAL (AS1700) ..............................................................................................................................163
4.4.3 TARGET COMPARISION (AS1700) ........................................................................................................................ 164
4.4.4 SEARCH FOR PICTURES WITH PICTURES .................................................................................................................164
4.4.5 PERSONNEL FREQUENCY RETRIEVAL (NVR800) ..................................................................................................165
INTELLIGENT .....................................................................................................................................................................166
4.5.1 ALGORITHM MODEL (AS1700 SUPPORTED) .......................................................................................................166
4.5.2 TARGET INTELLIGENCE ............................................................................................................................................ 166
4.5.3 BEHAVIOR ANALYSIS (AS1700 SUPPORTED)...................................................................................................... 170
4.5.4 CROWD SITUATION ................................................................................................................................................. 181
4.5.5 GENERAL INTELLIGENCE (AS1700/ZKNVR SUPPORTED)..................................................................................186
4.5.6 VEHICLE INTELLIGENCE (AS1700 SUPPORTED)................................................................................................... 190
4.5.7 INTELLIGENT APPLICATION ..................................................................................................................................... 190
STATISTICS ........................................................................................................................................................................192
4.6.1 FACE ANALYSIS ........................................................................................................................................................192
4.6.2 FACE REPORT ...........................................................................................................................................................193
4.6.3 CROSS-LINE STATISTICS ..........................................................................................................................................194
4.6.4 HEAT MAP ............................................................................................................................................................... 195
4.6.5 OBJECT STATISTICS ..................................................................................................................................................196
4.6.6 ALARM REPORT ....................................................................................................................................................... 197
4.6.7 PATROL REPORT ...................................................................................................................................................... 198
4.6.8 PATROL ALARM ....................................................................................................................................................... 199
VIDEO PATROL .................................................................................................................................................................200
4.7.1 PATROL GROUP ....................................................................................................................................................... 200
4.7.2 PATROL PLAN .......................................................................................................................................................... 201
4.7.3 REAL-TIME PATROL .................................................................................................................................................204
MAINTENANCE CONFIGURATION (AS1700 SUPPORTED).......................................................................................... 207
4.8.1 DEVELOPER LOG ......................................................................................................................................................207
4.8.2 CLIENT REQUEST LOG ............................................................................................................................................. 208
4.8.3 CU REQUEST ............................................................................................................................................................209
4.8.4 PARAMETERS ............................................................................................................................................................210
VIDEO INTERCOM ............................................................................................................................................................ 211
4.9.1 VIDEO INTERCOM EQUIPMENT ................................................................................................................................211
4.9.2 CALL RECORDS .........................................................................................................................................................214
5 INTELLIGENT ANALYSITS ....................................................................................................................... 215
SCENE APPLICATION ....................................................................................................................................................... 215
P a g e |7 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
5.1.1 TARGET SEARCH ...................................................................................................................................................... 215
5.1.2 PERSONNEL CONTROL ............................................................................................................................................ 217
5.1.3 TAILING DETECTION ................................................................................................................................................ 221
5.1.4 PERIMETER PROTECTION .........................................................................................................................................222
5.1.5 ATTANDANCE CHECKING DETECTION ................................................................................................................... 225
5.1.6 PEOPLE COUNTING ..................................................................................................................................................227
5.1.7 LIVE ALARM ............................................................................................................................................................. 229
5.1.8 MY DASHBOARD ..................................................................................................................................................... 229
DEVICE MANAGEMENT ................................................................................................................................................... 231
5.2.1 IPC CONNECTION (CURRENTLY, ONLY SUPPORT HWSDK CAMERA CONNECTION, PLEASE CHECK THE
HARDWARE SUGGESTION LIST) .............................................................................................................................................. 231
5.2.2 ZKIVA-EDGE CONNECTION (CURRENTLY, ONLY SUPPORT ZKIVA-EDGE T1 CONNECTION) (SMART BOX) 233
SERVICE CONFIGURATION ...............................................................................................................................................238
5.3.1 TIMEZONE ................................................................................................................................................................ 238
5.3.2 APPLICATION CONFIGURATION ..............................................................................................................................239
5.3.3 REGIONAL OCCUPANCY CONTROL CONFIGURATION .......................................................................................... 240
5.3.4 LIVE ALARM CONFIGURATION ................................................................................................................................241
5.3.5 CUSTOM ICON ......................................................................................................................................................... 242
5.3.6 DASHBOARD CONFIGURATION ...............................................................................................................................242
5.3.7 PARAMETERS ............................................................................................................................................................244
REPORTS ...........................................................................................................................................................................245
5.4.1 ALL RECORDS .......................................................................................................................................................... 245
5.4.2 ENTRY & EXIT RECORDS ......................................................................................................................................... 245
5.4.3 TREND REPORTS ...................................................................................................................................................... 246
5.4.4 LIVE ALARM QUERY ................................................................................................................................................ 246
5.4.5 DISMISSAL REPORT ..................................................................................................................................................247
6 ATTENDANCE MANAGEMENT .................................................................................................................248
OPERATION SCENARIO ....................................................................................................................................................248
OPERATION FLOW ...........................................................................................................................................................248
ATTENDANCE MANAGEMENT .........................................................................................................................................248
6.3.1 BY AREA ................................................................................................................................................................... 248
6.3.2 ATTENDANCE DEVICE DESCRIPTION (ATTENDANCE DEVICE)..............................................................................251
6.3.3 ATTENDANCE POINT ............................................................................................................................................... 253
6.3.4 ROLL CALL ............................................................................................................................................................... 254
6.3.5 COMMAND FROM SERVER ...................................................................................................................................... 255
6.3.6 DEVICE OPERATION LOG ........................................................................................................................................ 255
ATTENDANCE SETTING ....................................................................................................................................................256
6.4.1 ATTENDANCE RULE SETTING ..................................................................................................................................256
6.4.2 HOLIDAYS .................................................................................................................................................................261
P a g e |8 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
6.4.3 LEAVE TYPE ..............................................................................................................................................................262
6.4.4 AUTOMATIC REPORT ............................................................................................................................................... 263
6.4.5 PROCESS SETTINGS ..................................................................................................................................................264
REGULAR SHIFT SETTING SCHEDULE ............................................................................................................................. 265
6.5.1 TIMETABLE ................................................................................................................................................................265
6.5.2 PERSONNEL SCHEDULE ........................................................................................................................................... 269
6.5.3 GROUP SCHEDULE ...................................................................................................................................................271
6.5.4 SCHEDULE DETAILS .................................................................................................................................................274
EXCEPTION ....................................................................................................................................................................... 275
6.6.1 APPENDED LOG .......................................................................................................................................................275
6.6.2 ASK FOR LEAVE ....................................................................................................................................................... 276
6.6.3 OVERTIME .................................................................................................................................................................277
6.6.4 ADJUST REST ........................................................................................................................................................... 278
6.6.5 SHIFT ADJUSTMENT ................................................................................................................................................ 279
ATTENDANCE DETAIL REPORT ....................................................................................................................................... 280
6.7.1 MANUAL CALCULATION ......................................................................................................................................... 280
6.7.2 ATTENDANCE TRANSACTIONTRANSACTION ..........................................................................................................281
6.7.3 DAILY ATTENDANCE ................................................................................................................................................282
6.7.4 DAILY REPORT ......................................................................................................................................................... 283
6.7.5 MONTHLY DETAIL REPORT .....................................................................................................................................284
6.7.6 APPENDED LOG DETAILS ........................................................................................................................................285
6.7.7 LEAVE DETAILS ........................................................................................................................................................ 285
6.7.8 EXCEPTION REPORT .................................................................................................................................................286
6.7.9 WORK TIME REPORT ............................................................................................................................................... 286
6.7.10 ANNUAL LEAVE BALANCE SHEET ...........................................................................................................................287
CALCULATE REPORT ........................................................................................................................................................287
6.8.1 LEAVE SUMMARY .....................................................................................................................................................287
6.8.2 MONTHLY STAFF REPORT .......................................................................................................................................288
6.8.3 MONTHLY DEPARTMENTAL .................................................................................................................................... 288
6.8.4 ROLL CALL REPORT .................................................................................................................................................289
7 CONSUMPTION .................................................................................................................................... 290
CONSUMPTION BASIC INFORMATION ............................................................................................................................290
7.1.1 PIECEWISE FIXED VALUE .........................................................................................................................................291
7.1.2 CONSUMPTION TIME ZONE ....................................................................................................................................292
7.1.3 RESTAURANT INFORMATION ...................................................................................................................................293
7.1.4 MEAL INFORMATION ............................................................................................................................................... 294
7.1.5 COMMODITY INFORMATION ................................................................................................................................... 294
7.1.6 KEY VALUE INFORMATION ......................................................................................................................................296
7.1.7 CARD INFORMATION ............................................................................................................................................... 296
P a g e |9 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
CONSUMPTION DEVICE ...................................................................................................................................................298
7.2.1 CONSUMPTION DEVICE ...........................................................................................................................................298
7.2.2 CONSUMPTION PARAMETER ...................................................................................................................................300
CONSUMPTION CARD MANAGEMENT ...........................................................................................................................301
7.3.1 CARD SERVICE ..........................................................................................................................................................301
7.3.2 CARD MANAGEMENT .............................................................................................................................................. 306
7.3.3 INCOME AND EXPENSES ..........................................................................................................................................307
CONSUMPTION DETAIL ...................................................................................................................................................308
7.4.1 CONSUMPTION DETAIL REPORT .............................................................................................................................308
7.4.2 CONSUMPTION EXCEPTION REPORT ......................................................................................................................310
MANUAL SUPPLEMENT ................................................................................................................................................... 310
7.5.1 MANUAL SUPPLEMENT ........................................................................................................................................... 311
SUBSIDY ............................................................................................................................................................................311
7.6.1 SUBSIDY REGISTRATION .......................................................................................................................................... 312
7.6.2 ONE- CLICK REVIEW ................................................................................................................................................312
7.6.3 REVIEW ..................................................................................................................................................................... 313
7.6.4 REISSUE THE COMMAND .........................................................................................................................................313
7.6.5 DELETE ..................................................................................................................................................................... 313
7.6.6 IMPORT ..................................................................................................................................................................... 313
7.6.7 MORE ........................................................................................................................................................................314
7.6.8 EXPORT .....................................................................................................................................................................314
7.6.9 DOWNLOAD TEMPLATE .......................................................................................................................................... 314
CONSUMPTION REPORT ..................................................................................................................................................315
7.7.1 ISSUE CARD REPORT ............................................................................................................................................... 315
7.7.2 TOP UP REPORT ...................................................................................................................................................... 316
7.7.3 REFUND REPORT ......................................................................................................................................................316
7.7.4 SUBSIDY REPORT ..................................................................................................................................................... 317
7.7.5 REPORT OF RETURN CARD ......................................................................................................................................317
7.7.6 CARD COST REPORT ............................................................................................................................................... 318
7.7.7 CARD BALANCE REPORT .........................................................................................................................................318
7.7.8 NON-CARD RETURN CARD REPORT ...................................................................................................................... 319
7.7.9 REPORT OF RESUME THE CARD ..............................................................................................................................319
CONSUMPTION STATISTICS .............................................................................................................................................320
7.8.1 PERSONAL CONSUMPTION REPORT .......................................................................................................................320
7.8.2 DEPARTMENT SUMMARY ........................................................................................................................................ 321
7.8.3 RESTAURANT SUMMARY ......................................................................................................................................... 321
7.8.4 DEVICE SUMMARY ...................................................................................................................................................322
7.8.5 INCOME AND EXPENSES REPORT ........................................................................................................................... 322
7.8.6 MEAL SUMMARY ..................................................................................................................................................... 323
P a g e | 10 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
8 ELEVATOR CONTROL MANAGEMENT ...................................................................................................... 324
OPERATION SCENARIO ....................................................................................................................................................324
OPERATION FLOW ...........................................................................................................................................................324
ELEVATOR DEVICE ........................................................................................................................................................... 324
8.3.1 MANUALLY ADD ELEVATOR CONTROL DEVICE (DEVICE)................................................................................... 324
8.3.2 EXPANDING BOARD ................................................................................................................................................ 329
8.3.3 READER .....................................................................................................................................................................330
8.3.4 FLOOR FLOOR SETTING ...........................................................................................................................................330
8.3.5 AUXILARY INPUT ......................................................................................................................................................332
8.3.6 EVENT TYPE ..............................................................................................................................................................333
8.3.7 DEVICE MONITORING ..............................................................................................................................................333
8.3.8 REAL TIME MONITORING ........................................................................................................................................ 334
ELEVATOR CONTROL RULES ........................................................................................................................................... 336
8.4.1 TIME PERIOD SETTINGTIME ZONES ....................................................................................................................... 336
8.4.2 HOLIDAY SETTING ................................................................................................................................................... 338
8.4.3 ELEVATOR LEVELS ....................................................................................................................................................339
8.4.4 SET ACCESS BY LEVELS ........................................................................................................................................... 340
8.4.5 SET ACCESS BY PERSON ..........................................................................................................................................340
8.4.6 SET ACCESS BY DEPARTMENT ................................................................................................................................ 341
8.4.7 DIRECT SELECTION SET ...........................................................................................................................................342
8.4.8 LINKAGE SETTING GLOBAL LINKAGE ..................................................................................................................... 342
8.4.9 PARAMETERS ............................................................................................................................................................343
ELEVATOR CONTROL REPORTS .......................................................................................................................................344
8.5.1 ALL TRANSACTION .................................................................................................................................................. 344
8.5.2 ALL EXCEPTION EVENTS ..........................................................................................................................................345
8.5.3 ACCESS RIGHTS BY FLOOR ..................................................................................................................................... 345
8.5.4 ACCESS RIGHTS BY PERSONNEL .............................................................................................................................346
8.5.5 FIRST IN AND LAST OUT ......................................................................................................................................... 347
9 PARKING MANAGEMENT ....................................................................................................................... 348
OPERATION SCENARIO ....................................................................................................................................................348
OPERATION FLOW ...........................................................................................................................................................348
BASIC PARKING SETTING ................................................................................................................................................ 349
9.3.1 PARKING SETTINGS ................................................................................................................................................. 349
9.3.2 DEVICE ......................................................................................................................................................................351
9.3.3 PARKING AREA .........................................................................................................................................................352
9.3.4 ENTRANCE AND EXIT AREA ....................................................................................................................................353
9.3.5 GUARD BOOTH ........................................................................................................................................................354
9.3.6 CHANNEL ..................................................................................................................................................................355
9.3.7 VECHICLE DEFINITION ............................................................................................................................................. 357
P a g e | 11 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
9.3.8 SHIFT SETTINGS ....................................................................................................................................................... 358
9.3.9 MANUAL RELEASE REASON ....................................................................................................................................359
CHARGE MANAGEMENT ................................................................................................................................................. 360
9.4.1 FIXED CARS ARE CHARGING RULES ...................................................................................................................... 360
9.4.2 TEMPORARY CAR CHARGING RULES ......................................................................................................................361
9.4.3 OVERTIME CHARGING RULES ................................................................................................................................. 363
9.4.4 DISCOUNT STRATEGY ..............................................................................................................................................364
9.4.5 BUSINESS MANAGEMENT ........................................................................................................................................365
9.4.6 FINANCIAL RECONCILIATION .................................................................................................................................. 366
VECHICLE MANAGEMENT ............................................................................................................................................... 367
9.5.1 LICENSE PLATE REGISTERATION ............................................................................................................................. 367
9.5.2 VEHICLE AUTHORIZATION .......................................................................................................................................369
9.5.3 FIXED VECHICLE EXTENSION .................................................................................................................................. 371
9.5.4 BLOCK&ALLOW LIST MANAGEMENT .....................................................................................................................372
REPORT MANAGEMENT .................................................................................................................................................. 373
9.6.1 VECHICLE INSIDE ......................................................................................................................................................373
9.6.2 ENTRY RECORD ........................................................................................................................................................374
9.6.3 EXIT RECORD ........................................................................................................................................................... 374
9.6.4 CHARGE RECORD .....................................................................................................................................................374
9.6.5 EXPIRED VEHICLE .....................................................................................................................................................375
9.6.6 FIXED VEHICLE AUTHORIZATION RECORD ............................................................................................................ 375
9.6.7 DEVICE OPREATION RECORD ................................................................................................................................. 376
9.6.8 HANDOVER STATISTICS ...........................................................................................................................................376
9.6.9 DAILY INCOME STATISTICS ..................................................................................................................................... 377
9.6.10 MONTHLY INCOME STATISTICS .............................................................................................................................. 377
REAL-TIME MONITORING ................................................................................................................................................378
9.7.1 SENTRY BOOTH MONITORING ................................................................................................................................378
9.7.2 MONITOR ROOM ..................................................................................................................................................... 380
10 VISITOR MANAGEMENT ................................................................................................................. 382
OPERATION SCENARIO ....................................................................................................................................................382
OPERATION FLOW ...........................................................................................................................................................382
VISITOR REGISTRATION ................................................................................................................................................... 382
10.3.1 ENTRY REGISTRATION ..............................................................................................................................................382
10.3.2 VISITOR .....................................................................................................................................................................389
VISITOR RESERVATION .....................................................................................................................................................392
10.4.1 VISITOR RESERVATION .............................................................................................................................................392
10.4.2 RESERVATION AUDIT ............................................................................................................................................... 395
10.4.3 INVITE ........................................................................................................................................................................396
10.4.4 RESPONDENT SELF-APPROVAL .............................................................................................................................. 398
P a g e | 12 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
BASIC MANAGEMENT ......................................................................................................................................................403
10.5.1 PARAMETERS ............................................................................................................................................................403
10.5.2 DEVICE DEBUGGING ................................................................................................................................................406
10.5.3 PRINT SETTINGS .......................................................................................................................................................407
10.5.4 VISITOR LEVELS ........................................................................................................................................................409
10.5.5 VISITOR COMMON PERMISSION GROUP ................................................................................................................413
10.5.6 HOST LEVEL ............................................................................................................................................................. 416
10.5.7 SET UP PERMISSION GROUPS BY VISITED DEPARTMENT (VISITED DEPARTMENT LEVEL) .................................419
10.5.8 ENTRY PLACE ........................................................................................................................................................... 421
10.5.9 VISIT REASON ...........................................................................................................................................................425
10.5.10 CUSTOM ATTRIBUTES ............................................................................................................................................ 426
ADVANCED .......................................................................................................................................................................427
10.6.1 CATEGORY ................................................................................................................................................................427
10.6.2 WATCHLIST ..............................................................................................................................................................429
10.6.3 WATCH LIST THUMBNAILS ..................................................................................................................................... 431
10.6.4 ALERT TEMPLATE .....................................................................................................................................................432
10.6.5 LINKAGE ................................................................................................................................................................... 433
VISITOR REPORTS .............................................................................................................................................................435
10.7.1 LAST VISITED LOCATION .........................................................................................................................................435
10.7.2 VISITOR HISTORY RECORD ......................................................................................................................................436
11 PATROL MANAGEMENT ................................................................................................................. 438
OPERATION SCENARIO ....................................................................................................................................................438
OPERATION FLOW ...........................................................................................................................................................438
PATROL ROUTE MONITORING ........................................................................................................................................438
11.3.1 PATROL MONITORING .............................................................................................................................................438
BASIC SETTINGS (PATROL BASIC MANAGEMENT)........................................................................................................439
11.4.1 DEVICE ADDITION (DEVICE) ................................................................................................................................... 439
11.4.2 CHECKPOINT ............................................................................................................................................................ 440
11.4.3 PARAMETERS ............................................................................................................................................................441
PATROL MANAGEMENT .................................................................................................................................................. 442
11.5.1 SET UP A PATROL PLAN ......................................................................................................................................... 442
11.5.2 DESIGNATED PATROL PERSONNEL GROUP (PATROL GROUP) ............................................................................443
11.5.3 SET UP PATROL ROUTES (ROUTE).........................................................................................................................444
RESULT VALIDATION(PATROL REPORTS) .......................................................................................................................446
11.6.1 ALL TRANSACTIONS .................................................................................................................................................446
11.6.2 PATROL RECORDS TODAY ...................................................................................................................................... 448
11.6.3 PATROL ROUTE STATISTICS .................................................................................................................................... 449
11.6.4 PATROL PERSONNEL STATISTICS ............................................................................................................................449
12 ENTRANCE CONTROL .....................................................................................................................451
P a g e | 13 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
OPERATION SCENARIO ....................................................................................................................................................451
OPERATION FLOW ...........................................................................................................................................................451
CHANNEL DEVICE ............................................................................................................................................................452
12.3.1 PASSAGE ...................................................................................................................................................................452
12.3.2 DEVICE ......................................................................................................................................................................453
12.3.3 GATE .........................................................................................................................................................................460
12.3.4 READER .....................................................................................................................................................................461
12.3.5 AUXILIARY INPUT .....................................................................................................................................................462
12.3.6 EVENT TYPE ..............................................................................................................................................................462
12.3.7 DAYLIGHT SAVING TIME ......................................................................................................................................... 463
12.3.8 DEVICE MONITORING ...............................................................................................................................................465
12.3.9 REAL-TIME MONITORING ........................................................................................................................................ 466
ENTRANCE CONTROL ...................................................................................................................................................... 467
12.4.1 BARRIER GATE PERMISSION GROUP ...................................................................................................................... 467
12.4.2 SET ACCESS BY LEVELS ........................................................................................................................................... 470
12.4.3 ANTI-PASSBACK .......................................................................................................................................................471
12.4.4 LINKAGE SETTING .................................................................................................................................................... 472
12.4.5 PARAMETERS ............................................................................................................................................................474
PASSAGE SETTINGS ......................................................................................................................................................... 475
12.5.1 BARRIER GATE PASSING RULES ...............................................................................................................................475
12.5.2 FLAP BARRIER .......................................................................................................................................................... 477
12.5.3 SWING BARRIER ....................................................................................................................................................... 478
CHANNEL REPORTS ......................................................................................................................................................... 479
12.6.1 ALL TRANSACTIONS ................................................................................................................................................ 479
12.6.2 TODAY’S ACCESS RECORD ..................................................................................................................................... 480
12.6.3 PERSONNEL LAST ACCESS LOCATION ................................................................................................................... 481
12.6.4 ALL EXCEPTION EVENTS ..........................................................................................................................................482
13 TEMPERATURE DETECTION .............................................................................................................484
OPERATION SCENARIO ....................................................................................................................................................484
OPERATION FLOW ...........................................................................................................................................................484
SETTING OF EPIDEMIC PREVENTION PARAMETERS ...................................................................................................... 484
TEMPERATURE MANAGEMENT ....................................................................................................................................... 487
13.4.1 REAL-TIME MONITORING ........................................................................................................................................487
13.4.2 STATISTIC PANEL ..................................................................................................................................................... 487
13.4.3 TEMPERATURE RAW RECORD ................................................................................................................................. 488
13.4.4 INDIVIDUAL TEMPERATURE RECORD ......................................................................................................................490
13.4.5 ABNORMAL TEMPERATURE RECORD ......................................................................................................................491
13.4.6 DEPARTMENT DAILY STATISTICS ............................................................................................................................492
13.4.7 MONTHLY STATISTICS .............................................................................................................................................494
P a g e | 14 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
13.4.8 AUTOMATIC REPORT ............................................................................................................................................... 494
13.4.9 PARAMETERS ............................................................................................................................................................497
14 SERVICE CENTER ...........................................................................................................................498
DEVICE CENTER ............................................................................................................................................................... 498
14.1.1 DEVICE ......................................................................................................................................................................498
EVENT CENTER .................................................................................................................................................................498
14.2.1 THE EVENT TYPE ......................................................................................................................................................498
14.2.2 THE EVENT RECORD ................................................................................................................................................ 499
NOTIFICATION CENTER ................................................................................................................................................... 499
THE MAP CENTER ........................................................................................................................................................... 500
14.4.1 REAL-TIME MONITORING ........................................................................................................................................500
14.4.2 MAP CONFIGURATION ............................................................................................................................................ 503
PUSH CENTER .................................................................................................................................................................. 508
14.5.1 PUSH CONFIGURATION ...........................................................................................................................................508
14.5.2 PUSH EXCEPTION RECORD ..................................................................................................................................... 509
15 SYSTEM MANAGEMENT ..................................................................................................................510
SYSTEM MANAGEMENT .................................................................................................................................................. 510
15.1.1 OPERATION LOG ......................................................................................................................................................510
15.1.2 DATABASE MANAGEMENT ......................................................................................................................................511
15.1.3 AREA SETTINGS ........................................................................................................................................................513
15.1.4 E-MAIL MANAGEMENT ............................................................................................................................................514
15.1.5 DICTIONARY MANAGEMENT ...................................................................................................................................515
15.1.6 DATA CLEANING ......................................................................................................................................................516
15.1.7 AUDIO FILE .............................................................................................................................................................. 518
15.1.8 CERTIFICATE TYPE ....................................................................................................................................................519
15.1.9 PRINT TEMPALATE ................................................................................................................................................... 520
15.1.10 SYSTEM MONITORING ........................................................................................................................................... 521
15.1.11 PARAMETERS .......................................................................................................................................................... 524
AUTHORITY MANAGEMENT ............................................................................................................................................ 525
15.2.1 USER ......................................................................................................................................................................... 525
15.2.2 ROLE ......................................................................................................................................................................... 526
15.2.3 API AUTHORIZATION .............................................................................................................................................. 527
15.2.4 CLIENT REGISTER ..................................................................................................................................................... 529
15.2.5 SECURITY PARAMETERS ...........................................................................................................................................530
COMMUNICATION MANAGEMENT ................................................................................................................................. 532
15.3.1 DEVICE COMMANDS ............................................................................................................................................... 532
15.3.2 COMMUNICATION DEVICE ...................................................................................................................................... 533
15.3.3 PRODUCT ..................................................................................................................................................................534
15.3.4 AUTHORIZED DEVICE .............................................................................................................................................. 535
P a g e | 15 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
15.3.5 COMMUNICATION MONITOR ..................................................................................................................................536
THIRD PARTY INTEGRATION ............................................................................................................................................537
15.4.1 LED DEVICE .............................................................................................................................................................537
15.4.2 DIGIFORT CAMERA .................................................................................................................................................. 541
15.4.3 LINE NOTIFICATION ................................................................................................................................................. 542
15.4.4 AD MANAGEMENT ..................................................................................................................................................545
15.4.5 SMS MANAGEMENT ............................................................................................................................................... 547
16 FACEKIOSK .................................................................................................................................. 548
FACEKIOSK DEVICE ..........................................................................................................................................................548
16.1.1 DEVICE ......................................................................................................................................................................548
16.1.2 SET ATTENDANCE BY AREA .................................................................................................................................... 549
16.1.3 SET ATTENDANCE BY PERSON ................................................................................................................................550
MEDIA ADVERTISEMENT RESOURCES ............................................................................................................................ 551
16.2.1 ADVERTISEMENT RESOURCES ................................................................................................................................. 551
16.2.2 ADVERTISEMENT SETTINGS .....................................................................................................................................551
FACEKIOSK REPORTS .......................................................................................................................................................552
16.3.1 VERIFICATION RECORD ............................................................................................................................................552
17 HOTEL SYSTEM .............................................................................................................................553
DEVICE MANAGEMENT ................................................................................................................................................... 553
17.1.1 DEVICE ......................................................................................................................................................................553
ROOM MANAGEMENT .....................................................................................................................................................555
17.2.1 ROOM MONITOR ..................................................................................................................................................... 555
17.2.2 RESERVATION ........................................................................................................................................................... 555
17.2.3 RESERVATION LIST ...................................................................................................................................................556
CARD MANAGEMENT ......................................................................................................................................................559
17.3.1 READ CARD ..............................................................................................................................................................559
17.3.2 CANCEL CARD ......................................................................................................................................................... 559
17.3.3 SETTING CARD ......................................................................................................................................................... 560
HOTEL MANAGEMENT .................................................................................................................................................... 562
17.4.1 HOTEL SETTINGS ..................................................................................................................................................... 562
17.4.2 ROOM TYPES ............................................................................................................................................................564
17.4.3 ROOM ....................................................................................................................................................................... 565
17.4.4 HOTEL FACILITY .......................................................................................................................................................566
17.4.5 BOOKING METHODS ............................................................................................................................................... 566
REPORT MANAGEMENT .................................................................................................................................................. 568
17.5.1 GUEST CHECK-IN REPORT ...................................................................................................................................... 568
17.5.2 ROOM OCCUPANCY REPORT ..................................................................................................................................569
17.5.3 ROOM CHARGES REPORT ....................................................................................................................................... 570
17.5.4 ISSUE CARD REPORT ............................................................................................................................................... 570
P a g e | 16 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
17.5.5 WRITE CARD RECORD REMOTLY ............................................................................................................................571
17.5.6 UNLOCK LOG REPORT .............................................................................................................................................572
17.5.7 DEVICE COMMAND LIST ......................................................................................................................................... 572
17.5.8 LOST CARD LIST ...................................................................................................................................................... 573
18 INTRUSION ................................................................................................................................... 574
INTRUSION DEVICE .......................................................................................................................................................... 574
18.1.1 DEVICE ......................................................................................................................................................................574
18.1.2 PARTITION ................................................................................................................................................................ 577
18.1.3 ZONE ........................................................................................................................................................................ 579
18.1.4 DEVICE USER ............................................................................................................................................................580
REAL-TIME MONITORING ................................................................................................................................................582
INTRUSION RECORD ........................................................................................................................................................ 583
19 LOCKER ....................................................................................................................................... 585
LOCKER DEVICE MANAGEMENT .....................................................................................................................................585
19.1.1 DEVICE ......................................................................................................................................................................585
19.1.2 PARAMETERS ............................................................................................................................................................588
19.1.3 VISUAL PANEL ..........................................................................................................................................................589
LOCKER REPORT .............................................................................................................................................................. 590
19.2.1 ALL TRANSACTION .................................................................................................................................................. 590
P a g e | 17 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
1 Installation And Login
Operating Environment Requirements
Category Minimum Configuration Requirements
CPU At least Intel quad-core (above intel core i5-6600)
RAM Not less than 8GB
Not less than 500GB (the remaining space of the system disk is more than
Hard Disk
15GB)
OS Support 64-bit Windows 7 Professional Edition, 64-bit Windows 10 OS
Intel integrated graphics, video memory greater than 2.0G (Intel® HD
Graphics Card
Graphics 530 and above recommended)
At least one network card, the recommended network speed is not less than
Network Card
1000Mbit/s
At least 21.5 inches, and the best resolution of the monitor is recommended:
1920 * 1080.
Monitor
It is recommended to set the display resolution to 1920 * 1080. Using other
resolutions may cause the interface to be abnormal.
Browser Support Chrome33+ (recommended)/Firefox27+/Explorer11+
Table 1- 1
Instruction:
The number of live channels supported under the minimum configuration requirements:
Resolution Configuration a (H.264 format) Configuration a (H.265 format)
CIF(512K) 38 38
4CIF/D1(2M) 22 22
720P(2M 25fps) 10 10
1080P(4M 25fps) 6 6
Table 1- 2
In the video preview window, you can view the system CPU or memory usage in real time. If the
CPU reaches 80%, it is not recommended to increase the video preview window, which will
cause the video stream to freeze; if the CPU has reached 80% and the video window does not
meet the actual application, the system configuration needs to be improved.
P a g e | 18 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
System Installation
Step 1: Obtain the installation package.
Instruction:
Before installing the software, it is recommended to close the anti-virus software in the system
to avoid failing the environment detection. If the antivirus software detects abnormality, you
can also choose to ignore it.
After running the application, there will be a few seconds of detection process, please be
patient.
Step 2: Right-click the installation package installer, choose to run as an administrator, and the
environment detection tool will automatically perform system environment detection. If an
abnormality is detected during the installation process, the interface will give a prompt. The user can
refer to the prompt information to repair, and re-test after repairing until all the test items are passed
before proceeding to the next Step.
Step 3: If the detection is normal, click Continue.
Step 4: Select "I agree to this agreement (A)" and click Next.
Step 5: After configuring the server port and other parameters, click Next.
Instruction:
The default port is 8098, and the Adms service port defaults to 8088.
If the port is occupied, please modify the port number manually. When modifying, try to avoid
the occupied ports in the system, and can not overlap with the database port 5442, redis port
6390, and 21 and 80 ports.
Check "Add firewall exception to this port" to prevent Windows Firewall from blocking the
program from running.
The https protocol is used by default.
Step 6: After setting the installation directory, click Next.
Instruction:
The default installation path is C:\Program Files\ZKBioCVSecurity. You can also click Browse to
customize the installation path. Please follow the interface prompts to ensure that the selected
installation path has enough disk space.
Step 7: After setting the backup file storage path, click Next.
Instruction:
The system scans the entire disk by default, locates the drive letter with the largest free space,
and creates a new SecurityDBBack folder. You can also click Browse to customize the storage
path of the backup file.
Step 8: Click "Install" to start installing the software.
Step 9: After the installation is complete, you will be prompted whether to restart the computer
immediately (the default is "Yes"). Click Finish to restart the computer to complete the software
installation.
Instruction:
After the software installation is complete, it will take a long time (about 2 minutes) for the
service to start up. Please wait patiently for the service to start and then complete the
operation.
P a g e | 19 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 10: Enter the login page as shown in Figure 1-2, log in to the system.
Figure 1- 1
P a g e | 20 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2 Personnel
Before using the other functions, please configure the personnel system: Personnel and Card
Management.
Figure 2- 1 Personnel
Personnel Management
Personnel Management includes these modules: Person, Department, Position, Dismissed
Personnel, Pending review, Custom Attributes, List Library, and Parameters.
Operating Procedures:
This operation process is suitable for guiding users how to configure and manage the basic personnel
organization after the system is installed.
The flow of personnel organization configuration is shown in Figure 2-2.
Figure 2- 2 Flowchart of Personnel Configuration
P a g e | 21 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.1 Person
When using this management program, the user shall register personnel in the system, or import
personnel information from other software or documents into this system.
Main functions of Person include Refresh, Add (New), Personnel Adjustments, Delete, Export, Import,
and more.
2.1.1.1 Add Personnel (New)
Click Personnel > Personnel > New.
Figure 2- 3 Add Personnel New
Fields are as follows:
Notes:(Personnel ID)
When configuring a personnel number, check whether the current device supports the maximum
length and whether letters can be used in personnel ID.
To edit the settings of the maximum number of characters of each personnel number and whether
letters can also be used, please click Personnel > Parameters.
P a g e | 22 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
An ID may consist of up to 9 characters, within the range of 1 to 79999999. It
Personnel ID can be configured based on actual conditions. The Personnel No. contains only
numbers by default but may also include letters.
Select from the pull-down menu and click OK. If the department was not set
Department
previously, only one department named Company Name will appear.
First Name/Last Name The maximum number of characters is 50.
Gender Set the gender of personnel.
Mobile Phone The max length is 20, and this is an optional field.
There are four types of certificates: ID, Passport, Driver License and Others.
Certificate Type
Select one to upload.
Certificate Number Enter certificate number
Birthday Input employee’s actual birthday.
Set the available email address of the personnel. The max length is 30.
Email Punctuations, namely, the “ - ”, ” _ ” and ” . ” are supported. If the Event
Notification is checked, the Email is required.
Hire Date It is the date on which the personnel are appointed. Click to select the date.
Set a suitable name for the position. Any character, maximum combination of
Position Name
100 characters. Position names should not be repeated.
Set password for personnel accounts. It can only contain up to 6-digits. If a
Device Verification password exceeds the specified length, the system will truncate it
Password automatically. It cannot be the same with others password and the duress
password.
Card Number The max length is 10, and it should not be repeated.
Table 2- 1 Personnel ID
Biometrics Type:
This paper introduces the Steps of personnel biometric registration in ZKBioCVSecurity. The registered
biometric data can be used for verification and identification of Access Control, attendance, and other
equipment.
Biometric registration includes fingerprint, finger vein, and palm registration. Since the interfaces of
fingerprint registration and finger vein registration are similar, fingerprint registration and palm print
registration are used as examples to illustrate the operation process.
Description:
The server side of the box does not support external "palmprint meter, finger vein meter" to collect
biometrictemplates, and the fingerprint reader is only supported by the "Live20R" model.
Preconditions:
On the computer terminal where the administrator registers the personnel information, connect the
fingerprint reader device through the USB port.
Steps:
Step 1: In the Personnel module, choose Personnel Management > Person.
Step 2: Click Add with the mouse, and the interface for adding personnel will pop up.
Step 3: On the interface for adding personnel, click the " " button.
P a g e | 23 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 4: (Optional) If the driver is not installed, click the icon to pop up the registration and driver
download box, download the driver, and complete the installation.
Step 5: After the driver is installed, fingerprint registration can be performed, as shown in Figure 2-4.
Figure 2- 4 Biometric Type
Step 6: Select the fingers respectively, press the fingerprint on the connected fingerprint reader three
times in a row, and the system prompts the fingerprint to be registered successfully.
Step 7: Click OK to save and close the fingerprint registration interface.
Personal Photo:
The picture preview function is provided, supporting common picture formats, such as jpg, jpeg, bmp,
png, gif etc. The best size is 120×140 pixels.
Browse: Click Browse to select a local photo to upload.
Capture: Taking photo by camera is allowed when the server is connected with a camera.
Access Control:
Click Access Control parameter for the personnel.
Figure 2- 5 Access Control
P a g e | 24 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Fields are as follows:
Parameter Description
Level settings Click Add, then set passage rules of special positions in different time zones.
In access controller operation, a super user is not restricted by the regulations
Superuser on time zones, anti-passback and interlock and has extremely high door-
opening priority.
Device Operation
Select administrator to get its levels.
Role
Extend the waiting time for the personnel through the access points. Suitable
Extend Passage
for physically challenged or people with other disabilities.
Disabled Temporarily disable the personnel’s access level.
Set Temporary access level. Doors can be set to open only within certain time
Set Valid Time
periods. If it is not checked, the time to open the door is always active.
Table 2- 2 Access Control
Figure 2- 6 Level Settings
Note:
1. The system will automatically search for the relevant numbers in the departure library
during verification.
2. The Personnel Information List, by default, is displayed as a table. If Graphic Display is
selected, photos and numbers will be shown. Put the cursor on a photo to view details
about the personnel.
3. Not all devices support the “Disabled” function. When a user adds a device, the system will
notify the user whether the current device supports this function. If the user needs to use
this function, please upgrade the device.
4. Not all the devices support the “Set Valid Time” function of setting the hour, minute, and
second. Some devices only allow users to set the year, month, and day of the local time.
When a user adds a device, the system will notify the user whether the current device
support this function. If the user needs to use this function, please upgrade the device.
P a g e | 25 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Time Attendance:
Set the Time Attendance parameter for the personnel.
Figure 2- 7 Time Attendance
Fields are as follows:
Parameter Description
You can set the staff attendance area as Normal Attendance and No Punch
Attendance Mode
Required.
Device Operation It will set the authority for operating the device and send it to the corresponding
Role device such as, Employee, Enroller, Administrator, and Superuser
You can set verification mode as following options: Automatic Recognition,
Verification Mode Fingerprint, PIN, Password, Card, Fingerprint/ Password, Fingerprint/Card,
PIN+Fingerprint, Fingerprint+Password etc.
Table 2-3 Time Attendance
Elevator Control:
Click Elevator Control, set the Elevator Control parameter for the personnel.
Figure 2- 8 Elevator Control
P a g e | 26 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Fields are as follows:
Parameter Description
In elevator controller operation, a super user is not restricted by the regulations on
Superuser
time zones, holidays and has extremely high door-opening priority.
Set Temporary elevator level. Floor buttons can be set to be pressed only within the
Set Valid Times
time periods. If it is not checked, the time to press the floor button is always active.
Table 2- 3 Elevator Control
Note: The Elevator level must be set in advance.
Plate Register:
Click Plate Register, set the plate control parameter for the personnel.
Figure 2- 9 Plate Register
Fields are as follows:
Parameter Description
License Plate The user needs to register the licese plate.
Parking Space
Parking space number corresponding to the vehicle.
Number
Table 2- 4 Plate Register
Note: Each personnel may register a maximum of 6 license plates.
Passage Setting:
Click Passage Setting, set the Passage Setting parameter for the personnel.
P a g e | 27 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 10 Passage Setting
Fields are as follows:
Parameter Description
Superuser Set Superuser as Yes or No according to requirement.
Device It will set the authority for operating the device and send it to the corresponding
Operation Role device such as, Ordinary User, Administrator, and Enroller.
Table 2- 5 Passage Setting
Facekiosk:
Click Facekiosk, set the Facekiosk parameter for the personnel.
Figure 2- 11 Facekiosk
Fields are as follows:
Parameter Description
Device Operation It will set the authority for operating the device and send it to the
Role corresponding device such as, employee and Superuser.
Personnel Type Select type of personnel such as Common, VIP, and Blocklist.
Table 2- 6 Facekiosk
Personnel Details:
Click Personnel Details, to set the Personnel detail parameter for the personnel.
P a g e | 28 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 12 Personnel Details
After entering the information, click OK to save and exit, the person details will be displayed in the
added list.
2.1.1.2 Personnel Adjustments
Click Personnel > Person > Personnel Adjustment.
Adjust Department:
Click Personnel > Person > Personnel Adjustment, then select Adjust Department.
Figure 2- 13 Adjust Department
Fields are as follows:
Parameter Description
New Department Select new department from list.
Transfer Reason Mention the reason for transfer.
Table 2- 7 Adjust Department
Change Position:
Click Personnel > Person > Personnel Adjustment, then select Change Position.
P a g e | 29 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 14 Change Position
Parameter Description
New Position Select new Position from list.
Transfer Reason Mention the reason for transfer.
Table 2- 8 Change Position
Dismissal:
Click Personnel > Person > Personnel Adjustment, then select Dismissal.
Figure 2- 15 Dismissal
Fields are as follows:
Parameter Description
Dismissal Date Select date.
Select the type of dismissal from follows, Voluntary Redundancy, Transfer,
Dismissal Type
Dismissed, Resignation.
Dismissal Reason Mention the reason for Dismissal.
Table 2- 9 Dismissal
2.1.1.3 Delete
Click Personnel > Person, then select Delete.
P a g e | 30 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Delete Personnel:
Click Personnel > Person > Delete, then select Delete Personnel.
Delete Biometric Data:
Click Personnel > Person > Delete, then select Delete Biometric Data.
2.1.1.4 Export
Click Personnel > Person, then select Export.
Export Personnel:
Click Personnel > Person > Export, then select Export Personnel.
Personnel’s basic information is all checked (selected), check custom attributes as required.
Figure 2- 16 Export Personnel
P a g e | 31 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 17 Export Personnel
Export Biometric Template:
Click Personnel > Person > Export, then select Export Biometric Template.
Figure 2- 18 Export Biometric Template
P a g e | 32 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 19 Export Biometric Template.
Export Personnel Photo:
Click Personnel > Person > Export, then select Export Personnel Photo.
Figure 2- 20 Export Personnel Photo
2.1.1.5 Import
Introduce the configuration Steps of manually importing personnel in batches in ZKBioCVSecurity.
It is suitable for scenarios where a large number of personnel information is added. Compared with the
manual registration method of individual personnel, the batch import and addition method is faster.
Before adding departments in batches, you need to fill in the template file as required. After filling out
the template file, you can import and add departments in batches in the "Department" interface.
Instruction:
1. The import and addition of personnel includes importing personnel information, personnel
biometrictemplate data (optional), and personnel photos (optional), which need to be imported
separately.
2. Importing is to pay attention to the uniqueness of the personnel number. When the personnel
number is repeated, the result of import and addition will fail.
Import Personnel Information
Before adding people in batches, you need to obtain or fill in a template file as required. After filling in
P a g e | 33 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
the template file, you can import and add people in batches on the Personnel Management >
Personnel interface.
Steps:
Step 1: In the Personnel module, choose “Personnel Management > Personnel”.
Step 2: On the personnel interface, select and click the "Import > Download Personnel Import
Template" button, select the parameters to be filled in, and download the template "personnel
information template.xls" locally. The parameter selection is shown in Figure 2-21.
Figure 2- 21 Import Personnel Information Template
Step 3: Open the exported template file "Personnel Information Template.xls" for adding personnel
information.
Step 4: In the personnel interface, select and click the "Import > Import Personnel Information"
button; in the Import Personnel Interface, click the Browse button to import the batch import
template into the system, as shown in Figure 2-22.
Figure 2- 22 Import Personnel
Step 5: Click OK, and the interface displays the result of personnel import and addition.
Step 6: Click Close to complete the import and addition of personnel information.
Import Biometric Template
Preconditions:
1. The system needs to have the basic information files of the personnel in order to support the
import of biometric template data.
2. The biometric template data of the current system personnel has been obtained.
Steps:
Step 1: In the Personnel module, choose “Personnel Management > Personnel”.
Step 2: On the personnel interface, select and click the "Import > Import Biometric Template Data"
button; in the pop-up import personnel biometric template data interface, click the Browse button to
import personnel biometric template data into the system in batches, as shown in Figure 2-23 is shown.
P a g e | 34 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 23 Importing Personnel Biometric Template Data
Step 3: Click OK, the interface displays the import and addition results.
Step 4: Click Close to complete the import of personnel biometrictemplate data.
Import Personnel Photos
Preconditions:
1. The system needs to have the basic information files of the personnel in order to support the
import of personnel photos.
2. The personnel photos of the current system personnel have been obtained and correctly named
according to the personnel number.
3. The photo requirements for personnel are as follows:
Image Format: support .jpg, .png format.
Image Size: The recommended image size is 35KB~200KB, and the maximum size of a single
image is 5MB.
Image Quality: Faces in images are clear and not blurred by lens defocus or face motion. The
minimum image depth is an 8-bit grayscale image.
Pixels: The recommended value of face pixels is 80*80~200*200, and the distance between the
eyes should be greater than or equal to 60 pixels, preferably greater than or equal to 90 pixels.
Brightness and Contrast: The ambient illumination is not less than 300Lux, the image brightness
is uniform, the contrast is moderate, and the face has no invisible, no backlight, no reflection, no
overexposure, no underexposure and no yin and yang faces.
Attitude: The portrait is upright, looking straight ahead, the horizontal rotation angle of the face
should be within ±10°, the elevation angle should be within ±10°, and the tilt angle should be
within ±10°.
Blocking: Eyebrows, eyes, mouth, nose and facial contours should not be blocked by bangs,
masks, accessories, glasses, etc. The lenses of glasses should be colorless and non-reflective, and
the frames of glasses should not be too thick to block human eyes.
Face Area: The face is complete, the outline and facial features are clear, and there is no heavy
makeup. The face area of the image should not be processed by PS.
Expression: Natural expression, neutral or smiling (no missing teeth), eyes open naturally, mouth
closed naturally, no obvious expressions such as laughter or frown.
Steps:
Step 1: In the Personnel module, choose “Personnel Management > Personnel”.
P a g e | 35 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: On the Personnel interface, select and click the "Import > Import Personnel Photo" button, as
shown in Figure 2-24.
Figure 2- 24 Import Personnel Photos
Step 3: Optional: upload photos and compressed packages.
Step 4: After selecting the photo method, click OK to enter the interface for importing personnel
photos, select the photo and click Start Uploading.
Figure 2- 25 Photos - Importing Personnel Photos
Step 5: After selecting the compression package method, click OK to enter the interface of importing
personnel photos, click Browse to select the file and then click “Start Uploading".
P a g e | 36 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 2- 26 Compressed Package - Importing Personnel Photos
Step 6: After the upload is complete, the interface displays the results of the imported personnel
photos.
Step 7: Click Close to complete the import and addition of personnel photos.
2.1.1.6 More
Statistics
Click Personnel > Person > More, then select Statistics.
Figure 2- 27 Statistics
View the number of Person, Male, Female, and the number of Fingerprints, Near Infrared Face, Finger
P a g e | 37 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Vein, Palm Vein, Visible Face, Card, and Face Picture.
Reset Self Login Password
Click Personnel > Person > More, then select Reset Self Login Password.
Figure 2- 28 Statistics
2.1.2 Department
Click Personnel, then select Department.
Before managing company personnel, it is required to set a departmental organization chart of the
company. Upon the first use of the system, by default it has a primary department named General and
numbered 1. This department can be modified but can’t be deleted.
Main functions of Department Management include Add (New), Delete, Export and Import
Department.
2.1.2.1 Add a Department (New)
Introduce the configuration Steps for manually adding a single department in ZKBioCVSecurity.
It is suitable for scenarios where a small number of departmental organizations are added. After most
departmental organizations have been created, individual departments can be added individually.
Steps:
Step 1: In the Personnel module, choose “Personnel Management > Department”.
Step 2: Click Add with the mouse, and the interface for adding a department will pop up.
Step 3: In the interface of adding a department, fill in the corresponding parameters according to the
adding requirements, as shown in Figure2-29. Please refer to Table 2-10 for the description of
parameter filling.
Figure 2- 29 Add Department (New)
P a g e | 38 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Instructions
Department Number Customize the department number, support letters and numbers.
Department name Customize the department name.
Sort Fill in the number of the superior department.
Parent Department The department name corresponding to the superior department number.
Table 2- 10 Add Department
2.1.2.2 Delete
Click Personnel > Department, then select Delete.
Figure 2- 30 Delete Department
2.1.2.3 Export
Click Personnel > Department, then select Export.
Figure 2- 31 Export Department
2.1.2.4 Import
Import:
Click Pesonnel > Department > Import, then select Import.
Figure 2- 32 Import Department.
P a g e | 39 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Download Import Template Department:
Click Personnel > Department > Import, then select Download Import Template Department.
Figure 2- 33 Download Import Template Department
2.1.3 Position
Introduces the configuration Steps of manually adding a job in ZKBioCVSecurity, and adding a job is
used to define the job information of a person.
Click Personnel, then select Position.
2.1.3.1 Add Position
Steps:
Step 1: In the Personnel >Personnel Management > Position.
Step 2: Click New (Add Position), and the new job interface will pop up.
Step 3: On the new job interface, fill in the corresponding parameters according to the adding
requirements, as shown in Figure2-34; please refer to Table 2-11 for parameter filling instructions.
Figure 2- 34 Add Position (New)
Parameter Instructions
Job number Customize the job number for easy memory.
Job Title Customize job title.
Sort Sort job listings, only numbers are supported.
Select the corresponding parent position from the drop-down radio box. If you
Parent position
need to cancel, click Selected again.
Table 2- 11 Adding New Position
P a g e | 40 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.3.2 Delete
Click Personnel > Position, then click Delete.
Figure 2- 35 Delete Position
2.1.3.3 Export
Step 1: Click Personnel > Position, then select Export.
Figure 2- 36 Export Position
Step 2: Click OK to save to exit.
2.1.3.4 Import
Step 1: Click Personnel > Position > Import, then select Import.
Figure 2- 37 Import Position.
Step 2: Click OK to save and exit.
P a g e | 41 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.4 Dismissed Personnel
This parameter will display the personnel who are not working in company anymore. Once the person
is dismissed, it will be listed.
Click Personnel, then select Dismissed Personnel.
2.1.4.1 Delete
Step 1: Click Personnel > Dismissed Personnel, then select Delete.
Figure 2- 38 Delete
Step 2: Click OK to save and exit.
2.1.4.2 Export
Step 1: Click Personnel > Dismissed Personnel, then select Export.
Figure 2- 39 Export
Step 2: Click OK to save and exit.
P a g e | 42 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.5 Pending Review
2.1.5.1 Delete
Step 1: Click Personnel > Pending Review, then select Delete.
Figure 2- 40 Delete Pending Review
Step 2: Click OK to save and exit.
2.1.6 Custom Attributes
Some personal attributes can be customized or deleted to meet different customers' requirements.
When the system is used for the first time, the system will initialize some personal attributes by default.
Customized personal attributes can be set for different projects according to requirements.
Click Personnel, then select Custom Attributes.
2.1.6.1 Add Custom Attributes (New)
Step 1: Click Personnel > Custom Attributes, then select New (Custom Attributes).
Figure 2- 41 Add Customer Attribute (New)
P a g e | 43 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Fields are as follows:
Parameter Description
Display Name Must be filled and should not be repeated. Max length is 30.
Select the display type from “Pull-down List”,” Multiple Choice”, “Single Choice”
Input Type
and “Text”.
Suitable for lists displaying as ‘‘Pull-down List’’,’’Multiple Choice’’ and ‘‘Single
Attribute Value Choice’’ lists. Use a “;” to distinguish the multiple values. If the input type is
“Text”, the attribute value is not suitable.
The column and row of a field are used together to control the display position of
the field. Numerals are supported. The column number cannot exceed 99, and
the row number can only be 1 or 2. The combination of the column and row
Row/Column
must not be duplicated. As shown in the following figure, Employee Type, is in
the first column and first row, and Hire Type is in the first column and second
row.
Table 2- 12 Add Customer Attribute (New)
Step 2: Click OK to save and exit.
2.1.6.2 Delete
Step 1: Click Personnel > Custom Attributes, then select Delete.
Figure 2- 42 Delete Custom attributes
Step 2: Click OK to save and exit.
P a g e | 44 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.7 List Library
2.1.7.1 Add a List Library (New)
Step 1: Click Personnel > List Library, then select New (List Library).
Figure 2- 43 Add List Library (New)
Parameter Description
List Library Name Give a name for list library.
List Library Type Select type of list library.
Description Fill Decription as required.
Table 2- 13 Add List Library
Step 2: Click OK to save and exit.
2.1.7.2 Delete
Step 1: Click Personnel > List Library, then select Delete.
Figure 2- 44 Delete List Library
Step 2: Click OK to save and exit.
P a g e | 45 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.8 Parameters
In Parameters you can do few settings for options like Personnel ID Setting, Card setting, Pending
Personnel Selling, Self-Service registration, and Registration Client.
Click Personnel > Personnel Management, then select Parameters.
Figure 2- 45 Parameters
P a g e | 46 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.8.1 Personnel ID Setting
The maximum length of ID should be of 12.
Support Letters: yes/No.
Personnel ID Auto-increment: Yes/No.
Figure 2- 46 Personnel ID Setting.
2.1.8.2 Card Setting
The maximum Length is of 32 characters.
Set Card Format display to Decimal or Hexadecimal.
Multiple Cards per Person: Yes/No.
Set Card Reading Mode as Read by controller.
Figure 2- 47 Card Setting
2.1.8.3 Pending Personnel Selling
Enable Auto-audit option to Yes or No.
Figure 2- 48 Pending Personnel Selling
P a g e | 47 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.1.8.4 Self Service Registration
Change option as Yes or No for Enable Self Registration and Enable the Declaration of health
information.
Figure 2- 49 Self Service Registration
2.1.8.5 Registration Client
Fields are as follows:
Figure 2- 50 Registration Client
Click Ok to save and exit.
Note:
1. Set the maximum length for a Personnel ID. And whether it will support letters or not. If Personnel
ID Auto increment is selected as Yes, then while adding personnel one by one, the ID in field
automatically updates to the next new number.
2. Set the maximum length (binary number) of the card number that the current system will support.
3. Set whether the personnel ID for the demission employee can be kept.
P a g e | 48 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4. Set whether the temporary personnel uploaded and registered by scanning the QR code of the
big-screen facial recognition time and attendance device need to review.
5. Set the card format currently used in the system. The card format cannot be switched once it is set
up.
6. Set whether “Multiple Cards per Person” will be allowed or not.
7. Used the QR code to Self-Registration.
8. Registration Client.
9. If no driver has been installed, the Download Driver link is displayed. Click the link to download
and install the driver.
Card Management
There are three modules in Card Management: Card, Wiegand Format, and Issue Card Record.
Figure 2- 51 Card Management
2.2.1 Card
2.2.1.1 Batch Issue Card
Click Personnel > Card Management > Card, then click Batch Isuue Card.
Figure 2- 52 Batch Issue card
P a g e | 49 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Fill the fields for Department Name, Start Personnel ID, End Personnel ID, Card Enrollment Method, and
Input Card Number.
Enter Start and End Personnel No. and click Generate List to generate personnel list and show all
personnel without cards within this number series.
Note: The Start and End Personnel No. only support numbers.
Select Card Enrollment Method: Register with a USB Reader or device.
If you want to enroll a card with a USB Reader, you may place the card over the "issue machine" directly.
The System will get the card number and issue it to the user in the list on the left.
For the use of device, you need to select the position of punching, click start to read, the system will
read the card number automatically, and issue it to the user in the list on the left one by one. After that,
click Stop to read.
Note: During the “Batch Issue Card”, system will check whether the card issuer issues card or not, if
card has been issued before, the system will prompt “The Card Number has already been issued”.
Click OK to complete card issue and exit.
2.2.1.2 Reported Lost Card:
Click Personnel > Card Management > Card, then select Reported Lost Card.
Figure 2- 53 Reported Lost Card
Note: Report Lost Card is applicable to all functional modules, not to the offline elevator module.
After the report of loss, the status of the card becomes invalid but not written into the management
card. Need to write management card in the appropriate module, such as offline elevator control
module Write management card (Elevator Device > Card > Write management card).
2.2.1.3 Reactive Lost Card
Click Personnel > Card Management > Card, then select Reactive Lost Card.
Figure 2- 54 Reactive Lost Card
Note: Reactivate Lost Card is applicable to all functional modules, not to the offline elevator module.
After reactivating lost card, the status of the card becomes valid but not written into the management
card. Need to write management card in the appropriate module, such as offline elevator control
module Write management card (Elevator Device > Card > Write management card).
P a g e | 50 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.2.1.4 Export
Step 1: Click Personnel > Personnel Management > Card Management > Card, then select Export.
Figure 2- 55 Export
Step 2: Click OK to save and exit.
2.2.2 Weigand Format
Wiegand Format is the card format that can be identified by the Wiegand reader. The software is
embedded with 9 Wiegand formats. You may set the Wiegand card format as needed.
Click Personnel > Personnel Management > Card Management, then select Weigand Format.
2.2.2.1 Add weigand Format (New)
Click Personnel > Personnel Management > Card Management > Weigand format, then select New
(Add Weigand format).
Figure 2- 56 Add Weigand format (New)
P a g e | 51 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Fields are as follows:
Parameter Instructions
Name Enter the Name.
Total Bit Enter the total bit.
Site Code Enter the Site code.
Auto Click if Auto is required.
In Mode One Odd Parity Check, Even Parity Check, CID, Site Code, and
Mode One
Manufacturer Code should be set as Start Bit and The Maximum Length.
Mode Two In Mode Two Card Check format and Parity check Format must be entered.
Table 2- 14 Weigand Format
This software supports two modes for adding the Wiegand Format: If mode 1 does not meet your
setting requirements, you may switch it to mode 2. Take Wiegand Format 37 as an example:
Format Specifying:
“P” indicates Parity Position; “s” indicates Site Code; “c” indicates Cardholder ID; “m” indicates
Manufactory Code; “e” indicates Even Parity; “O” indicates Odd Parity; “b” indicates both odd check and
even check; “x” indicates parity bits no check.
The previous Wiegand Format 37: the first parity bits (p) check “eeeeeeeeeeeeeeeeee”; the second
parity bits check “ooooooooooooooooooo”. Card Check Format can only be set “p, x, m, c, s”; Parity
Check Format can only be set “x, b, o, e”.
2.2.2.2 Delete
Click Personnel > Personnel Management > Card Management > Weigand Format, then select
Delete.
Figure 2- 57 Delete Weigand Format
P a g e | 52 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.2.2.3 Card Formats Testing
Click Personnel > Personnel Management > Card Management > Weigand Format, then select
Card format Testing.
Figure 2- 58 Card Formats Testing
When the card number does not match with the one which is displayed on the system, the user can use
the Card Formats Testing function to calibrate the Wiegand format. The page is explained as follows:
Select the device that supports the card format test function, and fill the card number and the site code
(optional):
Steps:
Click Read Card and swipe the card on the reader. The original card number will be displayed on the
Original Card Number text box.
Click Recommended Card Format and the recommended Wiegand card format will be displayed
below.
Click Auto calculate site code while the site code is left bank and the software will calculate the site
code according to the card format and card number.
Click OK and the page will jump to the Wiegand format page to save the new Wiegand format.
Note: The card format testing function is only supported by few devices.
P a g e | 53 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
2.2.3 Issue Card Record
Click Personnel > Personnel Management > Card Management, then select Issue Card Record.
2.2.3.1 Export
Step 1: Click Personnel > Personnel Management > Card Management > Issue Card Record, then select
Export.
Figure 2- 59 Issue Card Record
Step 2: Click OK to save and exit.
P a g e | 54 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3 Access Control
Operation Scenario
The Access Control module is used as the entry and exit management of pedestrians. Through the
configuration of access control equipment and permission groups, unified management of entry and
exit of people is realized. The most fundamental problem to solve is to control who uses what media to
enter and exit which door at what time.
Operation Process
This section describes the configuration process of the Access Control module service.
The Access Control module service configuration process is shown in Figure 3-1.
Figure 3- 1 Access Control Configuration Process
P a g e | 55 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Access Device
3.3.1 Device
Introduce the configuration Steps of searching and adding access control devices in ZKBioCVSecurity.
Through the search method, the access control devices that have been set to point to the server can be
found, and the access control devices that have been searched can be added directly, which is
convenient to operate.
Preconditions:
1. Before adding the Access Control device, perform IP allocation settings.
2. The device needs to set the server address in advance before searching and adding. The
configuration Steps for the server are as follows:
a. In the access control device that has been connected to the power supply and the network,
set it directly on the device screen.
b. Select and click "Main Menu > Communication Equipment > Network Management Platform
or Cloud Server Settings"
c. Set the IP address and port of the current server, that is, the IP address and port of the current
ZKBioCVSecurity server and complete the configuration to the server.
3.3.1.1 Add devices (New)
Steps:
Step 1: In the Access Control module, select "Device > Access Control Device".
Step 2: On the device interface, click the “search" button to pop up a search box.
Step 3: Click “start Search" in the search box to display the access control devices that can be added,
as shown in Figure 3-2.
Figure 3- 2 Device Search and Add Interface
Step 4: Optional: Modify the IP address of the Access Control device, click "Modify IP Address", the
device will be restarted after modifying the IP address, and the IP address modification will be
completed after the restart.
P a g e | 56 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 5: For the searched access control devices, click the Add button in the operation bar to add the
device; the device addition settings are shown in Figure 3-3, and the parameter settings are described
in Table 3-3.
Figure 3- 3 Device Add Interface
Parameter How to set
Device Name Customize the name of the device.
Set the IP address and communication port of the system to be used
New Server Address/Port
(the default communication port is 8088).
Fill in the communication password of the device. If there is no
password, you do not need to fill in it. You can add it only after the
verification is successful.
For new factory equipment and initialized equipment, the
Communication Password
communication password is empty.
In order to ensure that the device is not used by others, users can
enter the device IP address through the web page to enter the
background to customize the device verification password.
Select the icon display type of the real-time monitoring interface:
Icon Type
door, channel.
Divide the device into regions and select the region to which the
Area
device belongs.
Add To Permission Group The device is automatically added to the selected permission group.
Delete Data From Device Set whether the original Access Control data in the device will be
When Adding automatically cleared after the device is added.
Table 3- 1 Parameter setting
Step 6: Click OK to complete the operation of adding access control devices. After the operation is
P a g e | 57 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
completed, the device will restart, and the device will be added after the restart is complete.
Step 7: Click Close to close the device search and add interface.
3.3.1.2 Delete
Select device, click Delete, and click OK to delete the device.
Figure 3- 4 Device Add Interface
3.3.1.3 Export
Device information can be exported in EXCEL, PDF, CSV file format.
Figure 3- 5 Export
Figure 3- 6 Export
3.3.1.4 Control
Clear Administration Permission
Administration has permission to clear the administration permission from device.
Upgrade Firmware
Tick the device that needs to be upgraded, click Upgrade firmware to enter edit interface, then click
P a g e | 58 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Browse to select firmware upgrade file (named emfw.cfg) provided by Access software, and click OK to
start upgrading.
Note: The user shall not upgrade firmware without authorization. Contact the distributor before
upgrading firmware or upgrade it following the instructions of the distributor. Unauthorized upgrade
may affect normal operations.
Reboot Device
It will reboot the selected device.
Synchronize Time
It will synchronize device time with server’s current time.
Disable/Enable
Select device, click Disable/Enable to stop/start using the device. When communication between the
device and the system is interrupted or device fails, the device may automatically appear in disabled
status. After adjusting local network or device, click Enable to reconnect the device and restore device
communication.
Synchronize All Data to Devices
Synchronize data of the system to the device. Select device, click Synchronize All Data to Devices and
click OK to complete synchronization.
Figure 3- 7 Synchronize All Data to Devices
Note: Synchronize All Data to Devices will delete all data in the device first (except transactions),
and thus download all settings again. Please keep the internet connection stable and avoid power
down situations. If the device is working normally, please use this function with caution. Execute it in
rare user situations to avoid impact on normal use of the device.
P a g e | 59 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.1.5 Set Up
Set Background Verification Parameters:
Select the required online device; click More > Set Bg verification parameters.
Figure 3- 8 Set Bg-Verification Parameters
Background verification: Enable or Disable Background verification function.
If the device is offline: If the controller is offline, the device has levels of Standard Access Level or
Access Denied.
After setting parameters, click Start button to issue command to the device setting.
Note: If you need advanced access control functions, please enable Background verification, and
issue the background verification parameters to the device.
Set the Registration device
Set the registration device only when the standalone device’s data such as personnel can automatically
upload.
Figure 3- 9 Set the Registration device
P a g e | 60 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Set Device Time Zone
If the device supports the time zone settings and is not in the same time zone with the server, you need
to set the time zone of the device. After setting the time zone, the device will automatically synchronize
the time according to the time zone and server time.
Modify the Fingerprint Identification Threshold (Ensure that the access controller supports
fingerprint function)
Figure 3- 10 Modify the Fingerprint Identification Threshold
Users can modify the fingerprint identification thresholds in the devices; it ranges from 35 to 70 and it is
55 by default. The system will read the thresholds from the device. Users can view the thresholds
devices list. More than one device can be changed by using Batch operation function.
Set Device In/Out Status: We can set the status of device In/Out
Set Extended Parameters: We can set the extended parameters of device like temperature detection
and mask detection
Set Video Intercom Server: We can set the video intercom server of device
3.3.1.6 View/ Get
Get Device Option
It gets the common parameters of the device. For example, get the firmware version after the device is
updated.
Get Personnel Information
Renew the current number of personnel, fingerprints, finger vein and face templates in the device. The
final value will be displayed in the device list.
Get Transactions
Get transactions from the device into the system. Two options are provided for this operation: Get New
Transactions and Get All Transactions.
Get New Transactions
The system only gets new transactions since the last collected and recorded transaction. Repeated
transactions will not be rewritten.
Get All Transactions
The system will get transactions again. Repeated entries will not be shown twice.
When the network status is healthy and the communication between the system and device is normal,
the system will acquire transactions of the device in real-time and save them into the system database.
However, when the network is interrupted or communication is interrupted for any reasons, and the
transactions of the device have not been uploaded into the system in real-time, Get Transactions can
be used to manually acquire transactions of the device. In addition, the system, by default, will
automatically acquire transactions of the device at 00:00 on each day.
P a g e | 61 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Note: Access controller can store up to 100 thousand of transactions. When transactions exceed this
number, the device will automatically delete the oldest stored transactions (deletes 10 thousand
transactions by default).
View Rules of Devices
Shows the Access rules in the device.
Figure 3- 11 View rules of device
View Device Capacity
It checks the capacity of personnel’s biometric details in the device.
Figure 3- 12 View device capacity
P a g e | 62 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.1.7 Communication
Modify Ip Address
Select a device and click Modify IP address to open the modification interface. It will obtain a real-time
network gateway and subnet mask from the device. (Failed to do so, you cannot modify the IP address).
Then enter a new IP address, gateway, and subnet mask. Click OK to save and quit. This function is the
similar as Modify IP Address Function in Device.
Modify Communication Password
The system will ask for the old communication password before modifying it. After verification, input
the new password twice, and click OK to modify the communication password.
Note: Communication password shouldn’t contain spaces; it is recommended to use a combination
of numbers and letters. Communication password setting can improve the device’s security. It is
recommended to set communication password for each device.
Modify Rs485 Address
Only the devices that use RS485 communication and with no DIP Switch can modify RS485 address.
Switch Network Connection
Figure 3- 13 Switch network connection
This function is applicable to InBio5 series access control panels, which is used to switch among
different network connection modes of the control panel.
3.3.1.8 Device Replacement
Introduce the configuration Steps for replacing access control devices in ZKBioCVSecurity.
When a device is unavailable, we can quickly add a new device and synchronize all configurations from
faulty device to the new device by simply entering the serial number of the replaced device.
Step 1: Go to the Access > Access Device, select the unavailable device.
Figure 3- 14 Select the Unavailable Device
Step2: Click Set up > Replace Device.
P a g e | 63 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 15 Replace Device
Step 3: Enter the serial number of the new device, then click OK.
Figure 3- 16 Input the Serial Number
Step 4: Select the new device, then click Control > Enable.
Figure 3- 17 Enable Device
Step 5: Select the new device, then click Control > Synchronize All Data to Device.
P a g e | 64 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 18 Synchronize Device Data
Note:
1. Before replacement, the device needs to configure the server address and IP allocation.
2. Make sure that the replacement device model is the same.
3. After the replacement, please perform the "sync all data" operation.
3.3.2 Door
The setting of door parameters affects the logic judgment of access control verification. The door
parameters support different parameter settings according to the different firmware of the device. The
following describes the configuration Steps of the door parameters with one of the devices.
Operation Step:
Step 1: In the Access Control module, select “Devices > Door”.
Step 2: In the management interface of the door, click the Edit button in the door operation bar to pop
up the door parameter setting box.
Step 3: In the door parameter setting interface, fill in the corresponding parameters according to the
addition requirements, as shown in Figure 3-4, please refer to Table 3-2 for parameter filling
instructions.
P a g e | 65 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 19 Setting Door Parameters
Instructions:
The firmware of different access control devices supports different door parameters. Set the parameters
based on the actual door parameter page. Table 3-4 describes the parameter set for different devices.
Parameter Setup Instructions
Device Name/Door
The basic information about the door is displayed. Reset is not supported.
Number
Name of the Door Customize the name of the door for easy memory.
Select a period when the gate is valid.
Gate Validity Period Not within the validity period of this door, even if the person has the permission
of this door, can not open the door inside.
Verify The Way Set this parameter to the authentication mode supported by the device.
Set the time range for unlocking a lock after authentication. For example, if the
value is set to 5 seconds, the door can be opened within 5 seconds after the
Lock Drive Duration
verification. If the door is not opened after 5 seconds, the door will be
automatically locked, and the door can be opened only after the verification.
Select a Weigand card format that can be recognized by the door’s Weigand
reader.
The card format and Settings are different, will not open the door. There are 9
Weiganka Format
built-in formats in the software, the default is automatic matching wiegand card
format, automatic matching can identify a variety of built-in wiegand card
format.
Set the status of the door exit button, locked, not locked. Lock: the door lock
Exit Button State does not open after pressing the exit button. Not locked: the door lock is
opened after pressing the exit button.
The Exit Button Is When the exit button is set to lock, set the delay time of the exit button, that is,
P a g e | 66 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Setup Instructions
Delayed the delay time of the inspection door alarm after the exit button is locked.
Operation Interval Set the interval for Access Control Operation.
Effective Time of
Select the time period for setting the exit button.
Exit Button
Magnetic Door Type Option No, normally open, normally closed, default none.
Behind Closed
Set whether to lock back after the door is closed.
Doors to Lock
Set the delay for checking the door status sensor after the door is opened.
Magnetic Door When the door is not "normally open", if it is open, it will start timing, alarm will
Delay start after the door magnetic delay time, and alarm will be cancelled when the
door is closed.
Duration Of Anti-
Set a limit on how long an intelligent entry can take.
Passback Entry
Set up the user to open the door when the threat password. An alarm will be
Stress The Password
generated when the coerced code opens the door.
Set a password for the user to use in an emergency. The password is used by the
Emergency Code
administrator and is valid in any period and authentication mode.
The Door Is
Select the time when this door is normally open.
Normally Open
Extended Time of Set on the basis of the original opening time, additional limit time. Common
Passage terms for participants, inconvenient personnel to extend the passage time.
Open Time Delay Set the time for waiting for the delayed door opening after authentication.
Disable Alarm If alarm event occurs on this door, whether there will be alarm sound reminder
Reminder on the real-time monitoring interface.
Allow Superuser
Access When the Set whether the super user can verify access when the door is locked.
Door Is Locked
The Above Settings To set the door parameters above, the options are all doors of the current
Are Copied To device, all doors of all devices.
Table 3- 2 Door Parameters
Step 4: Click OK to complete the setting of the door parameters
Remote Opening/Closing: It can control one door or all doors.
To control a single door, right click over it, and click Remote Opening/ Closing in the pop-up
dialog box. To control all doors, directly click Remote Opening/ Closing behind Current All.
In remote opening, user can define the door opening duration (The default is 15s). You can
select Enable Intraday Passage Mode Time Zone to enable the intraday door passage mode
time zones, or set the door to Normal Open, then the door will not be limited to any time zones
(open for 24 hours).
To close a door, select Disable Intraday Passage Mode Time Zone first, to avoid enabling
other normal open time zones to open the door, and then select Remote Closing.
Note: If Remote Opening /Closing fails, check whether the devices are disconnected or not.
If disconnected, check the network.
P a g e | 67 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Cancel the alarm: Once an alarming door is displayed on the interface, the alarm sound will
be played. Alarm cancellation can be done for single door and all doors. To control a single
door, move the cursor over the door icon, a menu will pop-up, then click Remote
Opening/Closing in the menu. To control all doors, directly click Remote Opening/Closing
behind Current All.
Note: If Cancel the alarm fails, check if any devices are disconnected. If found disconnected,
check the network.
Remote Normally Open: It will set the device as normal open by remote.
Activate Lockdown: It will remotely set the door status to locked status. After this, the door
wouldn’t receive any operations, such as card reading and remote operations. This function is
supported only by certain devices.
Deactivate Lockdown: It will unlock a locked door. This function is supported only by certain
devices.
3.3.3 Reader
This section describes the Step configuration of the Reader binding camera in ZKBio CVSecurity.
Operation Scenario:
After the camera is bound, if related Settings are set during linkage, the Reader will perform video
linkage (capture) once corresponding events occur. The Reader bind cameras in the same way. This
section uses the Reader as an example to describe how to bind cameras.
The Premise Conditions:
A video camera has been added in the Video Management module.
Operation Step:
Step 1: In the access Control module, choose “Device > Reader”.
Step 2: In the Operation column of the corresponding Reader, click Bind/Unbind camera. The
bind/unbind camera page is displayed.
Step 3: On the Select Reader screen, set the Reader as required, as shown in Figure.
Figure 3- 20 Binding A Camera
Step 4: Click OK to bind the camera.
P a g e | 68 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to set
Device Name Customize the name of the device.
Reader Name Display the reader’s name of the device
Wiegand/RS485, Wiegand, RS485, and Disabled are available. When a
Communication
communication type is selected, the reader interface on the device will receive
Type
data (including card and fingerprint data) for the specified type only
In/Out Display the in/out of the device.
Bound Camera connecting the camera with the reader.
Owning Camera The device is automatically added to the selected permission group.
Table 3- 3 Reader Parameters
3.3.4 Auxiliary Input
It is mainly used to connect to the devices, such as the infrared sensors or smog sensors.
Operation Step:
Step 1: Click Access Device > Auxiliary Input on the Action Menu, to access below shown interface.
Step 2: Click on Name or Edit to modify the parameters as shown below:
Figure 3- 21 Auxiliary input
Step 3: Click OK to save the name and remark and exit.
Bind/Unbind Camera:
Through this option, the reader can be connected to the cameras, and the system will make a video
linkage (pop-up videos, videos or screenshots) once there is a corresponding event occurs. For this, the
interaction setting in Linkage or in Global Linkage should be done before. For details, please refer to
Reader: Bind/Unbind Camera.
Note: An auxiliary input point can bind more than one channel.
P a g e | 69 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to set
Device Name Customize the name of the device.
Name Display the name of the device
Number Customize the name of the device
Printed Name Display the input number of the device.
Bound Camera connecting the camera with the reader.
Owning Camera The device is automatically added to the selected permission group.
Table 3- 4 Auxiliary Input Parameters
3.3.5 Auxiliary Output
It is mainly related to alarm and is used when linkage is working.
Operation Step:
Step 1: Click Access Device > Auxiliary Output on the Action Menu to access the following interface:
Figure 3- 22 Auxiliary Output
Step 2: Click Edit to modify the parameters.
Figure 3- 23 Auxiliary Output Edit
Step 3: Click OK to save the name and remark and exit.
P a g e | 70 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.5.1 Remote Opening/Closing
It can control one door or all doors.
To control a single door, right click over it, and click Remote Opening/ Closing in the pop-up dialog
box. To control all doors, directly click Remote Opening/ Closing behind Current All.
3.3.5.2 Remote Normally Open
It will set the device as normal open by remote.
Parameter How to set
Device Name Customize the name of the device.
Name Display the name of the device
Number Customize the name of the device
Printed Name Display the input number of the device.
Bound Camera connecting the camera with the reader.
Owning Camera The device is automatically added to the selected permission group.
Table 3- 5 Remote Normally Open Parameter
3.3.6 Event Type
It will display the event types of the access devices.
Operation Step:
Step 1: Click Access Device > Event to access the following page:
Figure 3- 24 Event Type
P a g e | 71 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: Click Edit or click the event type name to edit.
Figure 3- 25 Event Type Edit
3.3.6.1 Set Audio
Same as the event sound. Click Set Audio:
Figure 3- 26 Event Type Set Audio
You can upload an audio from your local PC. The file must be in wav or mp3 format, and it must not
exceed 10MB.
Parameter How to Set
Event Level Normal, Exception, and Alarm are available
Event Name Display the name of the device and it can’t be modified.
Device Name: Display the name of the device
Event Number Display the event number of the device.
Serial Number Display the serial number of the device
Table 3- 6 Event Parameters
P a g e | 72 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.7 Daylight Saving Time
DST, also called the Daylight-Saving Time, is a system to adjusting the official prescribe local time to
save energy. The unified time adopted during the implementation of known as the "DST". Usually, the
clocks are adjusted forward one hour in the summer to make people sleep early and get up early. It can
also help to save energy. In autumn, clocks are adjusted backwards. The regulations are different in
different countries. At present, nearly 70 countries adopt DST.
To meet the DST requirement, a special function can be customized. You may adjust the clock one hour
forward at XX (hour) XX (day) XX (month) and one hour backward at XX (hour) XX (day) XX (month) if
necessary.
3.3.7.1 Add DST (New)
Step 1: Click Access Device > Daylight Saving Time > New.
Figure 3- 27 Daylight Saving Mode
Set as "Month-Weeks-week hour: minute" format. The start time and end time is needed. For example,
the start time can be set as “second Monday in March, 02:00”. The system will be advanced one hour at
the start time. The system will go back to the original time at the end time.
Parameter How to set
DST Name Display the DST name
Start Time Display the start time of the device
End Time Display the end time of the device
Time Zone Display the timezone of the device.
Table 3- 7 Daylight Saving Mode Parameters
P a g e | 73 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.7.2 Delete
Select device, click Delete, and click OK to delete the device.
Figure 3- 28 Daylight Saving Mode Delete
3.3.8 Device Monitoring
By default, it monitors all devices within the current user’s level. You may click Access Device > Device
Monitoring to view a list of operation information of devices: Device Name, Serial No., Area, Operation
Status, Current status, Commands List, and Related Operation.
Figure 3- 29 Device monitoring
P a g e | 74 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.8.1 Export
Device commands can be exported in EXCEL, PDF, CSV file format.
Figure 3- 30 Export
Figure 3- 31 Device monitoring Export
3.3.8.2 Clear All Command
You may clear the command as needed. Click Clear Command in operations column.
Figure 3- 32 Device monitoring Clear command
Click OK to clear.
Notes:
After the implementation of Clear Command, you can perform the Synchronize All Data to
Devices operation on the device list to re-synchronize data in the software to the device, but
this operation cannot be performed when the user capacity and fingerprint capacity are fully
consumed on the device. Once the capacity is insufficient, you can replace the current device
with a higher-capacity one or delete the rights of some personnel to access this device, and
then perform the Synchronize All Data to Devices operation.
Operate State is the content of communications equipment of current device, mainly used for
debugging.
The number of commands to be performed is greater than 0, indicating that the data is not yet
synchronized to the device, so wait for the synchronization to complete.
P a g e | 75 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.9 Real-Time Monitoring
On the real-time management screen, the status of the added device is displayed and the device can be
opened or closed. At the same time, the dynamic of real-time events is monitored. If the door opening
can be verified and corresponding access control events can be generated, the access control
management service configuration is complete.
Operation Step:
Step 1: Check whether the device is online.
In the Access Control module, choose “Access Control Device > Real-time Monitoring”.
Check whether the icon status of the added device is online. For details about the icon status,
see Table 3-8.
Icon State Icon State
The device is disabled. Door offline status
No door status sensor, relay Door status sensor not set,
/ off/no relay status / relay open/no relay state
The door is closed and the
The door is closed and the relay
relay is off/no relay is in online
/ / is on/no relay
state
On line door open, relay On line door open, relay
/ closed/no relay / open/no relay state
The door opens to alarm and
Door opens alarm, relay closes
the relay opens
Door opening timeout alarm, Door opening timeout alarm,
relay closed/no relay, door relay open/no relay, door
/ /
magnetic open magnetic open
Door opening timeout alarm, Door opening timeout alarm,
relay closed/door magnetic relay open/door magnetic
closed close
Door close alarm, relay off/no Door close alarm, relay
/ relay status / open/no relay status
No door magnetic setting, No door magnetic setting, door
door alarm, relay closed alarm, relay open
Door opening timeout alarm,
no relay/door magnetic The door was locked
closing
Note: If there is no relay status, the current firmware does not support the "Check relay Status"
function.
Table 3- 8 Description of Door Types
P a g e | 76 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: Remote opening/closing verification, taking remote opening as an example
Select the online door device, click "Remote door opening", enter the user password in the
pop-up security verification, and click OK.
On the remote door opening screen, enter the time to open the door and tap OK, as shown in
Figure 3-33.
If "Operation succeeded" is displayed, the remote door opening Operation is complete.
Figure 3- 33 Remote Door Opening
Step 3: Permission to verify
Verify personnel permissions on added devices.
In the real-time monitoring window, judge whether the personnel permissions are correctly
configured according to the event status; If the user has been granted access rights, the real-
time access event is a normal verification event, as shown in Figure 3-38, indicating that the
access level service is configured
Figure 3- 34 Real-Time Events
3.3.9.1 Door
Remote Opening/Closing
It can control one door or all doors.
To control a single door, right click over it, and click Remote Opening/ Closing in the pop-up dialog
box. To control all doors, directly click Remote Opening/ Closing behind Current All.
In remote opening, user can define the door opening duration (The default is 15s). You can select
Enable Intraday Passage Mode Time Zone to enable the intraday door passage mode time zones, or
set the door to Normal Open, then the door will not be limited to any time zones (open for 24 hours).
To close a door, select Disable Intraday Passage Mode Time Zone first, to avoid enabling other
normal open time zones to open the door, and then select Remote Closing.
P a g e | 77 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Note: If Remote Opening /Closing fails, check whether the devices are disconnected or not. If
disconnected, check the network.
Cancel the Alarm
Once an alarming door is displayed on the interface, the alarm sound will be played. Alarm cancellation
can be done for single door and all doors. To control a single door, move the cursor over the door icon,
a menu will pop-up, then click Remote Opening/Closing in the menu. To control all doors, directly
click Remote Opening/Closing behind Current All.
Note: If Cancel the alarm fails, check if any devices are disconnected. If found disconnected, check
the network.
Remote Normally Open
It will set the device as normal open by remote.
Activate Lockdown
It will remotely set the door status to locked status. After this, the door wouldn’t receive any operations,
such as card reading and remote operations. This function is supported only by certain devices. Super
User Swipe to Initiate Lockdown after 3 swipes
Deactivate Lockdown
It will unlock a locked door. This function is supported only by certain devices. Super User Swipe to
Initiate disable after 3 swipes
Quick Management of Doors
If you move the cursor to a door’s icon; you can perform the above operations in a quick way. In
addition, you can query the latest events from the door.
Figure 3- 35 Quick management of doors
Personnel Photo Display
If a Real-Time Monitoring event contains personnel activity, the monitor will display the person photo
(if no photo is registered, the monitor will display default photo). The event name, time and date are
P a g e | 78 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
displayed.
Play Audio
If this option is selected, it plays an audio after an alarming event occurs.
Query the Latest Events from The Door
Click to quickly view the latest events happened on the door.
Issue Card to Person
If you swap an unregistered card, a record with a card number will pop-up in real-time monitoring
interface. Right click that card number, and a menu will pop-out. Click “Issue card to person”, to assign
that card to one person.
Event Monitoring:
The system will automatically acquire records of devices being monitored (by default, display 200
records), including normal and abnormal access control events (including alarm events). Normal events
will appear in green; alarm events will appear in red; other abnormal events will appear in orange.
The Superuser can initiate lockdown after 3 swipes and deactivate the same after 3 swipes.
3.3.9.2 Auxiliary Input
It monitors current auxiliary input events in real-time.
Figure 3- 36 Real Time Monitoring Auxiliary Input
P a g e | 79 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.9.3 Auxiliary Output
Here you can perform Remote open, Remote Close, Remote Normally Open.
Figure 3- 37 Real Time Monitoring Auxiliary Output
Monitoring All
By default, the home page displays all doors of the panels within the user's level. User may monitor
door(s) by setting the Area, Access Control or Door.
3.3.10 Alarm Monitoring
It will monitor the status and real-time events of doors under the access control panels in the system in
real-time, including normal events and abnormal events
Figure 3- 38 Alarm Monitoring
P a g e | 80 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.11 Map
Click Access Device > Map > New to add a map.
Figure 3- 39 Map
After adding, users can add door on the map, perform zoom-in, zoom-out, etc. If users relocated or
modified the map, click Save Positions to save. The user can view the new setting at next visit.
Figure 3- 40 Map Position
P a g e | 81 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.3.11.1 Add/Delete Map
Users can add or delete a map as needed.
3.3.11.2 Edit Map
Users can edit map name, change map or the area it belongs to.
Adjust Map (includes door)
Users can add a door on the map or delete an existing one (right click the door icon, and select Delete
Door), or adjust the map or position(s) of the door or camera icons (by dragging the door or camera
icons), adjust the size of the map (click Zoom in or Zoom out or click Full Screen).
Add Doors & Cameras
After adding the map, click on "Add doors" and "Add cams" in the toolbar on the right to select devices
to add to the map.
Door Operation
If you move the cursor to a door, the system will automatically filter and displays the operation
according to the door status. Users can do remotely open/close doors, cancel alarms, etc.
Levels Control
Users need to select the relevant area for the map when adding levels. The area will be relevant to the
user access levels, users can only view or manage the map within levels. If the relevant area of a map is
modified, all doors on the map will be cleared. Users need to add the doors manually again.
When an administrator is adding a new user, he can set the user operation rights in role setting, such as
Save positions, Add Door, Add Camera, etc.
Note:
In map modification, users can choose to modify the map name but not the path. Users only need to
check the box to activate the modification option.
The system supports adding multi doors at the same time. After adding the doors, users need to set the
door position on the map and click Save.
When modifying door icon, especially when users zoomed out the map, the margin for top and left
shall not be smaller than 5 pixels, or system will prompt error.
Users are recommended to add a map size under 1120 * 380 pixels. If several clients access the same
server, the display effect will be different according to resolutions of screen and the settings of
browsers.
Access Rule
Access control rules are the core logic control part of access control, including time period settings,
linkage settings, etc.
3.4.1 Timezone
In Access Control Module, time period is a very important basic concept, which is used to set the use
time of the door and specify that Access Control is available in the valid time period.
This section describes how to configure Step to manually add a time range in ZKBio CVSecurity.
P a g e | 82 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.1.1 Add (New)
Operation Step:
Step 1: In the access Control module, choose “Access Rule > Time zone”.
Step 2: Click New, the interface for adding time segments is displayed.
Step 3: The time segment page is added. Set the content based on the new requirements, as shown in
Figure 3-41. For parameter Settings, see Table 3-9.
Figure 3- 41 Adding A Time Range
Parameter How to set up
Schedule Name You can set a time range name for easy memory.
Note Remarks Description of user-defined Settings.
Set the start time and end time for each time range. The time
Time interval
period includes one week and three holiday-type time periods.
Copy Monday’s time to other
You can quickly copy your Monday Settings to other weekdays.
weekdays
Table 3- 9 Parameters to Be Added in The Time Range
Step 4: Click OK to finish adding the time range.
P a g e | 83 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.1.2 Delete
Select time zone name, click Delete, and click OK to delete the time zone.
Figure 3- 42 Time Zone Delete
3.4.2 Holiday
The access control time on holidays may be different from that on weekdays. To facilitate Operation,
the system supports separate access control time on holidays.
This section describes how to manually add a holiday Step in ZKBio CVSecurity.
3.4.2.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose “Access Rule > Holidays”.
Step 2: Click New, the page for adding holidays is displayed.
Step 3: When a page is added during holidays, set the content as required, as shown in Figure 3-43. For
parameter Settings, see Table 3-10.
Figure 3- 43 Adding Holidays
P a g e | 84 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to set up
Holiday Name You can set holiday names for easy memory.
The holiday type can be: Holiday type 1, Holiday type 2, holiday type 3. Set
Type of Holidays
holiday type to time Range.
Start time/End time Set the holiday time range.
Set whether this holiday cycle by year: yes, no.
According to the annual For example, if New Year’s Day is January 1, set this parameter to
circulation Yes.Mother’s Day falls on the second Sunday in May. If the date is uncertain,
set it to No.
Note Custom Settings description.
Table 3- 10 Parameters for Adding Holidays
Step 4: Click OK to finish adding the holiday.
3.4.2.2 Delete
Select holiday, click Delete, and click OK to delete the holiday.
Figure 3- 44 Holiday Delete
3.4.3 Access Level
Access level groups define groups and categories of internal doors to facilitate subsequent permission
assignment operations.
Setting operations include creating access level groups and adding doors to access level groups.
3.4.3.1 Add (New)
This section describes how to create Step for Access Control groups in ZKBio CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose “Access Rule > Access Level”.
Step 2: Click New in the left column, and the page for adding access level groups is displayed.
Step 3: On the page for adding access level groups, set parameters based on the new requirements, as
shown in Figure 3-45. For parameter Settings, see Table 3-11.
P a g e | 85 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 45 Adding Access Level Groups
Parameter How to set up
Permission Group Name You can customize the name of the access level group for easy query.
Select the configured access time range to define the valid access time
Access Control Period
range for this permission group.
Select the configured area from System > System Management > Area
Area
Settings and define the area to which the Access Control group belongs.
Table 3- 11 Description of Access Control Right Groups
Step 4: Click OK to finish configuring the access control right group.
3.4.3.2 Add Door
This topic describes how to add Operation Step to the door of the created access level group in ZKBio
CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose “Access Rule > Access level>Add Door”.
Step 2: Click “Add Door”, and the page for selecting a door is displayed. add a door as required, as
shown in Figure 3-46.
Figure 3- 46 Adding Access Level Groups Add Doors
P a g e | 86 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 3: Click OK to finish configuring the door for the access control right group.
3.4.3.3 Door Control
Figure 3- 47 Door Control
Remote Opening/Closing
It can control one door or all doors.
To control a single door, right click over it, and click Remote Opening/ Closing in the pop-up dialog
box. To control all doors, directly click Remote Opening/Closing behind Current All.
In remote opening, user can define the door opening duration (The default is 15s). You can select
Enable Intraday Passage Mode Time Zone to enable the intraday door passage mode time zones, or
set the door to Normal Open, then the door will not be limited to any time zones (open for 24 hours).
To close a door, select Disable Intraday Passage Mode Time Zone first, to avoid enabling other
normal open time zones to open the door, and then select Remote Closing.
Note: If Remote Opening/Closing fails, check whether the devices are disconnected or not. If
disconnected, check the network.
Cancel the Alarm
Once an alarming door is displayed on the interface, the alarm sound will be played. Alarm cancellation
can be done for single door and all doors. To control a single door, move the cursor over the door icon,
a menu will pop-up, then click Remote Opening/Closing in the menu. To control all doors, directly
click Remote Opening/Closing behind Current All.
Note: If cancel the alarm fails, check if any devices are disconnected. If found disconnected, check
the network.
Remote Normally Open
It will set the device as normal open by remote.
Activate Lockdown
It will remotely set the door status to locked status. After this, the door wouldn’t receive any operations,
such as card reading and remote operations. This function is supported only by certain devices. Super
User Swipe to Initiate Lockdown after 3 swipes
P a g e | 87 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Deactivate Lockdown
It will unlock a locked door. This function is supported only by certain devices. Super User Swipe to
Initiate disable after 3 swipes.
3.4.3.4 Import or Export Access Level
Step 1: Export and fill in Access Level Template:
In the Access Module, click Access Rule > Access Levels > Export > Export Access Level,
then fill in the Access levels information.
Figure 3- 48 Export Access Level Template
Figure 3- 49 Fill in Access Level Template
Note: The Level name can be customized. The Area Name can be set from System > System
Management > Area Settings, the Time Zone can be set from Access > Access Rule > Time
Zones.
Step 2: Export the Doors of Access Level Template:
In the Access Module, click Access Rule > Access Levels > Export > Export Doors of Access
Level, then You can export doors of access level in Excel file format.
Enter the user password in the displayed security verification dialog box, and Click OK. Select
whether to encrypt the file and the file format to export, and Click OK.
Figure 3- 50 Export the Access Level Template 1
P a g e | 88 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 51 Export the Access Level Template 2
Step 3: Import the Access Level Template:
In the Access module, click Access Rule > Access Levels > Import > Import Access Level, and
click Browser to upload the Access Level Template.
Figure 3- 52 Import the Access Level Template 1
Figure 3- 53 Import the Access Level Template 2
Figure 3- 54 Import the Access Level Template 3
P a g e | 89 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 4: After the upload is successful, we can view the uploaded level as the following figure.
Figure 3- 55 Import the Access Level Template 4
Step 5: Import the Doors of Access Level Template:
In the Access module, click Access Rule > Access Levels > Import > Import Doors of Access
Level, and click Browser to upload the Access Level Template.
Figure 3- 56 Import the Doors of Access Level Template 1
Figure 3- 57 Import the Doors of Access Level Template 2
Step 6: After the upload is successful, we can view the uploaded level as the following figure.
P a g e | 90 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 58 Import the Doors of Access Level Template 3
3.4.4 Set Access Level Allocation
Permission assignment Manages the access level of personnel. After permission assignment, personnel
can verify the door opening Operation.
You can assign user rights by user group or assign user rights by user group.
3.4.4.1 Assign Personnel Rights by Permission Group
Assigning personnel permissions by permission group is used to define a set of open-door personnel
for a permission group.
Describes Operation Step that assigns staff permissions by permission group in ZKBio CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose “Access Rule>Set Access by Levels“.
Step 2: In the Operation column of the corresponding permission group, tap “Add Personnel”. The
Add personnel page is displayed. Select personnel as required, as shown in Figure 3-48.
Figure 3- 59 Assigning Rights to Users by Rights Group
Step 3: Click OK to complete the assignment of personnel permissions.
P a g e | 91 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.4.2 Delete Personnel
Select personnel ID, click Delete, and click OK to delete the personnel ID.
Figure 3- 60 Delete Personnel
3.4.4.3 Export
Device information can be exported in EXCEL, PDF, CSV file format.
Figure 3- 61 Export
Figure 3- 62 Set Access level Allocation Export
P a g e | 92 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.5 Set Access Level Groups by Person
Assigning access level groups by person A permission set is used to define the access level set of a
person.
This section describes Operation Step that assigns access control group permissions by person in ZKBio
CVSecurity.
3.4.5.1 Access Control Setting
Operation Step:
Step 1: In the Access Control module, choose "Access Control > Settings by Personnel".
Step 2: In the Operation column of the Access Control group, click “Add Access Control Group”. The
page for adding access control groups is displayed. Select the Access Control group as required.
Figure 3- 63 Assigning Rights Groups by User
Step 3: Click OK to complete the assignment of personnel permissions.
3.4.5.2 Add Level
Permission assignment Manages the access level of personnel. After permission assignment, personnel
can verify the door opening Operation.
You can assign user rights by user group or assign user rights by user group.
Assign Personnel Rights by Permission Level
Assigning personnel permissions by permission group is used to define a set of open-door personnel
for a permission group.
Describes Operation Step that assigns staff permissions by permission group in ZKBio CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose “Access Rule>Set Access by Levels “
Step 2: In the Operation column of the corresponding permission group, tap “Add Levels”. The Add
level page is displayed. Select personnel as required.
P a g e | 93 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 64 Assigning Rights to Users by Rights Group
Step 3: Click OK to complete the assignment of level permissions.
3.4.5.3 Delete from Level
Select level name, click Delete, and click OK to delete the level name.
Figure 3- 65 Access Level Group by Person Delete
3.4.5.4 Export
Device information can be exported in EXCEL, PDF, CSV file format.
Figure 3- 66 Export
P a g e | 94 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 67 Access Level Group by person Export
3.4.5.5 Synchronize Level
Select the level to be synchronized and send the corresponding device area data in the software to the
device.
Figure 3- 68 Synchronize Level
3.4.6 Set Access Level Groups by Department
The access level group assigned by department defines the set of access levels for the personnel in the
department.
This section describes Operation Step that assigns Access Control group permissions by person in
ZKBio CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose “Access Control > Set by department”.
Step 2: In the Operation column of the Access Control group, click “Add Access Control Group”. The
page for adding Access Control groups is displayed. Select the Access Control group as required.
Figure 3- 69 Assigning Rights Groups by Department
P a g e | 95 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 3: Click OK to complete the assignment of department permissions.
3.4.6.1 Add Default Level
Figure 3- 70 Add Default Level Groups by Department
3.4.6.2 Delete Default Level
Select delete default level name, click Delete, and click OK to delete the default level name.
Figure 3- 71 Delete Rights Groups by Department
3.4.7 Interlock
Set interlock control between two or more doors on the access controller device: To verify the opening
of a door, ensure that all other doors interlocked with the door are closed; otherwise, the door cannot
be opened.
This section describes the Step of adding interlock effect in ZKBio CVSecurity.
The Premise Conditions:
The door opening/closing state monitoring is realized by detecting the door magnetic state.
Therefore, interlock function requirements:
1. The door status sensor at the device end must be correctly installed
2. In door setting on the software side, the status of the door status sensor must be set to normally
open or normally closed (based on the actual installation).
P a g e | 96 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.7.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose "Access Control > Interlock" and click New.
Step 2: Select the specified device.
Instructions:
When you add a device for which interlock has been configured, the device cannot be found in
the drop-down list. After the configured interlock information is deleted, the device is returned
to the drop-down list.
Interlock Settings vary with the number of doors controlled by the device:
Single-door controller: no interlock setting
Dual door controller: 1-2 two door interlock Settings
Four-door controller: 1-2 two-door interlock, 3-4 two-door interlock, 1-2-3 three-door interlock,
1-2-3-4 four-door interlock, 1-2 and 3-4 door interlock
Step 3: Select the interlock rule, and click OK to complete the settings, as shown in Figure 3-52. The
new interlock Settings are displayed in the list.
Figure 3- 72 Adding Interlock Configuration
Parameter How to set up
Device Name You can customize the name of the Device
Interlock Rule Select the configured interlock rule.
Table 3- 12 Description of interlock
3.4.7.2 Delete
Select interlock, click Delete, and click OK to delete the interlock.
3.4.8 Linkage
The use method and scenario of linkage are flexible. After a specific event is triggered by an input point
in the Access Control system, a linkage action will be generated at the specified output point to
control events such as verification opening, alarm and abnormality in the system.
This section describes how to add Step to the linkage effect in ZKBio CVSecurity.
Add (New)
The Premise Conditions:
Before adding a linkage configuration, perform the following operations:
Step 1: Add Settings for binding cameras to access control devices, input points, output points, and
P a g e | 97 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
read heads.
Step 2: Optional: In the System Management module, choose “System Management > Mail
Management" to set the sender server. The Step of setting the sender server is as follows:
In the System Management module, choose ‘system Management > Mail Management".
Click “Sender Server Settings" to pop up the sender server Settings interface.
On the Sender server Settings screen, set parameters as required, as shown in Figure 3-73. For
parameter Settings, see Table 3-13.
After setting, click "Test connection" to receive the email, indicating that the test has passed.
Step 3: Click OK to finish setting email parameters.
Figure 3- 73 Mailbox Parameters
Parameter How to set up
You can customize the email server address and port.
The email products that provide the SMTP server can be used, such
Email server address/port as NetEase 163 email, Tencent QQ email, and Foxmail email. The
specific address and port configurations must be obtained from the
corresponding provider.
Email username and password Enter the user’s name and password for the mailbox.
Name of sender Sets the name of the sender on the received message.
Table 3- 13 Mailbox Management Parameters
Operation Step:
Step 1: In the Access Control module, choose “Access Control > Linkage”.
Step 2: On the linkage setting screen, click Add, as shown in Figure 3-69. Table 3-14 and Table 3-15
refer to the linkage parameters.
P a g e | 98 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 74 New Linkage Configuration
Parameter How to set up
Linkage Name You can customize the linkage name for easy query.
Equipment Custom Select an added access control device.
Select the condition triggered by the linkage Operation, that is, the
Linkage Departure Condition
event type generated by the selected device.
Input Point Select the input point to set device input.
Dots Select the output point to set device output.
You can set the linkage action, including Operation, video linkage, and
Linkage Action Setting
email. Table 3-3 describes the configurations of the three modes.
Table 3- 14 New Linkage Parameters
Parameter How to set up
The Output Point Set the output action type: close, open, normally open.
of Operation Sets the delay time if the output action is on.
Pop-up video and display duration: Select pop-up video on the real-time
monitoring screen and set the pop-up duration.
Video recording and Video Duration: Select Video recording to set the video
Video Linkage duration.
Capture: Set linkage action whether to take a photo: If a photo is taken, you also
need to set whether to pop up on the real-time monitoring interface and the
display duration.
Set the email address that receives the linkage content when a linkage event
Mail
occurs.
Table 3- 15 Setting Linkage Actions
Step 3: Click OK to complete the linkage configuration.
P a g e | 99 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.8.1 Delete
Select linkage, click Delete, and click OK to delete the linkage.
Figure 3- 75 Adding Interlock Configuration
3.4.9 Anti-Passback
Some occasions require the personnel that brush card to verify, brush card to come in from a door must
brush card to go out from another door, brush card record must enter a strict correspondence. This
function can be used when users enable it in the settings. It is generally used in special units, scientific
research, bank vaults and other occasions.
This section describes the Step of adding the Anti-Passback effect in ZKBio CVSecurity.
3.4.9.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose "Access Control > Anti-Passback" and click New.
Step 2: Select the specified device.
Instructions:
When you add an Anti-Passback device, the configured Anti-Passback device is not displayed in
the device list. After the antisubmarine information is deleted, the device returns to the device
list.
The Anti-Passback setting varies with the number of gates controlled by the equipment:
Anti-Passback setting of single door controller: Anti-Passback between readers
Two controllers: door 1 Anti-Passback between readers, door 2 Anti-Passback between readers,
door 1 and door 2 Anti-Passback
Four door controllers: door 1 and door 2 Anti-Passback, door 3 and door 4 Anti-Passback, door
1/ door 2 and door 3/ door 4 Anti-Passback, door 1 and door 2/ door 3/ door 4 Anti-Passback,
door 1 and door 2/ door 3/ door 4 Anti-Passback, door 1/ door 2/ door 3/ door 4 Anti-Passback
reader
Step 3: Select the Anti-Passback rule and click OK to complete the settings. The new Anti-Passback
Settings are displayed in the list.
P a g e | 100 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 76 Adding the Anti-Passback Configuration
3.4.9.2 Delete
Select device, click Delete, and click OK to delete the device.
Figure 3- 77 Anti-Passback Delete
3.4.10 The First-Person Normally Open
In the specified period, after the verification of the first person with normally open permission, the door
normally open, the end of the valid period of the door automatically closed.
This section describes how to add Step in ZKBio CVSecurity.
The Premise Conditions:
The time range has been set for the Access Control module.
3.4.10.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose "Access Control > First person normally Open" and
click New.
Step 2: Select the specified device, add Settings for the specified door, and select the normally open
time period, and click OK, as shown in Figure 3-58.
P a g e | 101 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 78 Configuring the First Person to Open the Door
Step 3: Click "Add People" on the interface of "Opening of the first person". After adding people, click
OK to complete the setting of "opening of the first person".
Figure 3- 79 Adding A First Person Normally Open Person Configuration
3.4.10.2 Delete
Select personnel ID, click Delete, and click OK to delete the personnel ID.
Figure 3- 80 Delete Person Normally Open Person Configuration
P a g e | 102 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.11 Multi-Person Group
The door will open only after the consecutive verification of multiple people. Any person verifying
outside of this combination (even if the person belongs to other valid combination) will interrupt the
procedure and you need to wait 10 seconds to restart verification. It will not open by verification by
only one of the combinations.
3.4.11.1 Add (New)
Step 1: Click Access Rule > Multi-Person Group > New to access the following edit interface:
Figure 3- 81 Adding A Multi-Person Group
Group Name: Any combination of up to 30 characters that cannot be identical to an existing group
name.
After editing, click OK to save and return. The added Multi-Person Personnel Group will appear in the
list.
Step 2: Click Add personnel under Related Operations to add personnel to the group.
Step 3: After selecting and adding personnel, click OK to save and return.
Note: A person can only be grouped into one group.
3.4.11.2 Edit
Click Access Rule > Multi-Person Group > Edit after selecting the required section in the interface.
Figure 3- 82 Edit Multi-Person Group
P a g e | 103 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.11.3 Add Personnel
Click Access Rule > Multi-Person Group > Add Personnel after selecting the required section in the
interface.
Figure 3- 83 Adding A personnel for Multi-Person Group
3.4.11.4 Delete
Click Access Rule > Multi-person group > Delete after selecting the required section in the interface.
Figure 3- 84 Delete A Multi-Person Group
P a g e | 104 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.12 Multi-People Open The Door
In a specific scenario, it is necessary for more than one person to be present at the same time to verify
their identity before they can open the door through permission verification.
Instructions:
1. In an application scenario where, multiple users are required to verify their identities before
opening the door, the authentication process is limited to N (no more than 5) by grouping people
into groups.
2. In practice, if all the personnel to be verified are of the same type or level, it can be verified by
multiple people in a single group. If there are different categories or levels of personnel, you can
set a certain number of personnel in each group to achieve verification.
3. Before the multi-party door verification rule is reached, if the verification fails during the process,
wait 10 seconds for the verification again.
3.4.12.1 Add (New)
Step 1: In the Access Control module, choose "Access Rule > Multiple Door Opening Personnel
Group" and click New. After filling in the corresponding parameters, click OK to save the settings.
Step 2: Click "Add Personnel" on the right of the list of created multi-person door opening personnel,
select the personnel to be added to the group in the pop-up function, and click OK to save the settings.
Figure 3- 85 Adding Multiple Door Openers
Step 3: In the multi-person door opening interface, click Add, set permissions for multi-person door
opening personnel group.
Step 4: On the page for adding multiple door users, select the specified door, group information for
multiple door users, and the number of verification personnel for each group, and click OK to save the
settings.
P a g e | 105 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 86 Adding Multiple Door Openers
Step 5: In the Access Control module, choose “Access Rule > Authentication Mode Rule” and click
Add to set the access control authentication rule for the corresponding period.
Figure 3- 87 Delete A Multi-Person Group
Step 6: Click Add Door on the right of the created authentication mode rule, select a door, and set the
authentication mode rule for the door.
Figure 3- 88 Verification Rule Configuration for Adding Multiple Door Openers
Step 7: click OK to save the settings.
P a g e | 106 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.12.2 Delete
Click Access Rule > Multi-person opening door > Delete after selecting the required section in the
interface.
Figure 3- 89 Delete A Multi-Person Group
3.4.13 Verification Mode
Verification Mode:
You can set verification modes for doors and personnel separately in a specified time segment.
3.4.13.1 New
Step 1: Click Access Rule > Verification Mode > New to go to the page for adding a verification mode
rule.
Figure 3- 90 Add Verification mode
Step 2: Set the following parameters: Select a rule name (not repeatable), the time segment, and
verification mode for a door or person in each time segment.
Step 3: Click OK to finish the setting.
On the list page, you can add or delete doors in the verification mode rule.
P a g e | 107 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.4.13.2 Verification Mode Group
You can set verification modes for doors and personnel separately in a specified time segment.
Steps:
Step 1: Click Access Rule > Verification Mode > New to go to the page for adding a verification mode
rule.
Figure 3- 91 Add Verification mode Group
Step 2: Set the following parameters: Select a rule name (not repeatable), the time segment, and
verification mode for a door or person in each time segment.
Step 3: Click OK to finish the setting.
On the list page, you can add or delete doors in the verification mode rule.
Note: If a rule includes the verification mode for personnel, you cannot select doors with the RS485
readers when adding doors. You can modify only the configuration on the reader setting page before
adding doors.
Verification Mode Group:
Set appropriate personnel for configured verification mode rule.
3.4.14 Parameters
Click Access Rule > Parameters to enter the parameter setting interface:
Figure 3- 92 Add Parameters
P a g e | 108 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Type of Getting Transactions:
Periodically
Start from the setting and efficient time, the system attempts to download new transactions every time
interval.
Set the Time for Obtaining New Transactions
The selected Time is up, the system will attempt to download new transactions automatically.
Transaction Auto-Export
The user can choose the export frequency and the data to be exported each time. If the export
frequency is selected as “By day”, you must set the time to export the data. You must also select the
mode of export. It can be daily transactions or all the system data (30000 data units can be sent at a
time. We can customize the data that we need to export from custom report 1 and custom report 2.
If the export frequency is selected as “By Month”, you must select the day to export the data. It can be
the first day of the month or you can specify any particular date. Then select the export frequency as
Daily Data or all System data. Finally, add the recipient’s mail address to send the transaction data.
Figure 3- 93 Transaction Auto Export
The Real Time Monitoring Page Pop-up Staff Photo Size
When an access control event occurs, the personnel photo will pop up. The size of pop photos shall be
between 80 to 500 pixels.
Figure 3- 94 Real Time Monitoring
Alarm Monitoring Recipient Mailbox
The system will send email to alarm monitoring recipient’s mailbox if there is any event.
Figure 3- 95 Alarm Monitoring Recipient Mailbox
P a g e | 109 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Alarm Monitoring Recipient Mobile Number
The system will send alarm monitoring recipients to mobile, if there is any event.
Figure 3- 96 Alarm Monitoring Recipient Mobile Number
Advanced Function
Advanced access control is optional. You must obtain permission to activate the advanced access
control.
In addition to the global linkage function, enable the background authentication function first.
The access control area must be defined when advanced functions such as global Anti-Passback are
used.
3.5.1 Entrance Guard Area(Zone)
Divide areas and define access control areas. The access control area is reserved for advanced access
control but not for system management.
This section describes Step in ZKBio CVSecurity to add an access control area.
3.5.1.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose "Advanced function > zone" and click New.
Step 2: On the page that is displayed, set related parameters, and click OK.
Figure 3- 97 Page for Adding Access Control Areas
P a g e | 110 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.1.2 Delete
Click Advanced function > Zone > Delete after selecting the required section in the interface.
Figure 3- 98 Delete Access Control Areas
3.5.1.3 What rules Apply Inside
Click What rules inside after selecting the required section in the interface we can check the rules are
applied for the particular zone.
Figure 3- 99 What Rules Apply Inside
P a g e | 111 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.2 Reader Definition
This function is configured based on the access control area. To use the global Anti-Passback function,
you must define the read head.
This section describes the Step of adding a Reader definition in ZKBio CVSecurity.
3.5.2.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose " Advanced function > Reader Define" and click New
Step 2: On the page that is displayed, set related parameters and click OK.
Figure 3- 100 Page for Adding a Reader
3.5.2.2 Batch New
Step 1: Click Advanced Functions > Reader Define > Batch New to enter the batch add interface:
Figure 3- 101 Batch New
P a g e | 112 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: Click Add, select Reader(s) and move towards right and click OK.
Figure 3- 102 Add Reader Define
Step 3: Set Goes from and Goes to as required and press OK.
3.5.2.3 Delete
In the Access > Advanced Functions > Reader Define, click Delete button under Operations. Click
OK to delete.
Figure 3- 103 Delete Reader Define
P a g e | 113 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.3 Who is inside
After entering the access control area, users can use this function to view the personnel in the access
control area. You can choose the access control area tree to view the personnel in the corresponding
access control area.
This section describes how to view the Steps of people in a region in ZKBio CVSecurity.
Operation Step:
Step 1: In the Access Control module, choose "Advanced Function > View Personnel in the Area"
Step 2: On the page for viewing personnel in a region, you can select the area on the left to view and
delete personnel in the area, as shown in Figure 3-84.
Figure 3- 104 View Area Personnel Page
3.5.3.1 Delete personnel
Select personnel ID, click Delete, and click OK to delete the level name.
Figure 3- 105 Delete Who Is Inside
P a g e | 114 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.3.2 Export
Device information can be exported in EXCEL, PDF, CSV file format.
Figure 3- 106 Export
Figure 3- 107 Export Who is Inside
3.5.4 Global Anti-Passback
Global Anti-Passback Settings can be carried out across devices, and only push devices support global
Anti-Passback functions. This function supports logical Anti-Passback, timed Anti-Passback and timed
logical Anti-Passback, and can be configured for specific personnel.
This section describes the Step configuration of global Anti-Passback in ZKBio CVSecurity.
The Premise Condition:
1. Background authentication has been enabled on the device.
2. Set the access control area and read head definition.
3.5.4.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose "Advanced Access Control > Global Anti-Passback"
and Click New.
Figure 3- 108 Add Global Anti-Passback
P a g e | 115 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: On the page for adding global Anti-Passback Settings, set related parameters and click OK, as
shown in Figure 3-102. For parameter description, see Table 3-16.
Parameter Description
Rule Name The value can contain a maximum of 30 characters.
Entrance Guard Area Select an option from the access control area drop-down list box.
The Door List Controls
The corresponding door information is displayed. The same gate shall not
Access to The Access
be used to control two independent Anti-Passback boundaries.
Control Area
It contains three types of Anti-Passback: logic Anti-Passback, timing Anti-
Passback and timing logic Anti-Passback.
instructions
Logical Anti-Passback: strictly follow the "one in, one out" rule in the Anti-
Passback area, otherwise the verification will not open
Timed Anti-Passback: A user can enter the Anti-Passback area only once
within a specified period of time. After the specified period expires, the
user’s status will be cleared and the user can enter the Anti-Passback area
Anti-Passback Type
again
Timed logical Anti-Passback: the user can open the door normally only
after following the exit and entry rules of logical Anti-Passback.Timing logic
antisubmarine is only used in abnormal situations. For example: if the
logical Anti-Passback time is set and the personnel follows others out, the
personnel cannot swipe the card machine within the set locking time. The
Anti-Passback state will be reset after the set locking time, and the traffic
can continue.
You can set the locking period only when you select timing Anti-Passback
The Locking Time
or logic Anti-Passback type.
Reset Global Anti-Passback Clear the Anti-Passback status of personnel in the system and restore the
Status initialization status.
The reset time can be selected only when reset global Anti-Passback status
is selected.
Reset Anti-Passback Time
When it is time to reset Anti-Passback, the system will automatically clear
the Anti-Passback status of all personnel in the access control area.
All personnel, selected personnel, except selected personnel three types:
instructions
All personnel: This type can only be edited. Personnel selection is not
supported
Applied
Selected Personnel: If you select this type, you can add personnel. This
Anti-Passback type takes effect only for these personnel.
Personnel other than selected: Select this type, add personnel, this Anti-
Passback type will only take effect for personnel other than selected.
Table 3- 16 Global Anti-Passback Settings
P a g e | 116 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.4.2 Delete
In the Access > Advanced Functions > Global Anti-Pass, click Delete button under Operations. Click
OK to delete.
Figure 3- 109 Delete Global Anti-Passback
3.5.5 Global Linkage
The global linkage function can be set across devices. Only the push device supports the global linkage
function
This section describes how to configure Step for global linkage in ZKBio CVSecurity.
3.5.5.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose “Advanced Functionl > Global Linkage” and Click New.
Figure 3- 110 Add Global Linkage
Step 2: On the page for adding global linkage, set related parameters and tap OK, as shown in Figure 3-
104. Table 3-17 describes the parameter description to complete global linkage Settings.
Parameter Operation Instructions
Linkage Name You can customize the linkage name for easy query
It Works for
After this parameter is selected, the linkage Settings take effect on all personnel
Everyone
P a g e | 117 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Operation Instructions
Linkage Trigger Select the condition triggered by the linkage Operation, that is, the event type
Condition generated by the selected device
Input Point Select the input point to set device input
Select the output point to set device output
Dots Set the output action type: close, open, normally open.
Sets the delay time if the output action is on.
Pop-up video and display duration: Select pop-up video on the real-time monitoring
screen and set the pop-up duration.
Video recording and Video Duration: Select Video recording to set the video
Video Linkage duration.
Capture: Set linkage action whether to take a photo: If a photo is taken, you also
need to set whether to pop up on the real-time monitoring interface and the display
duration.
The reset time can be selected only when reset global Anti-Passback status is
selected
Valid Time
When it is time to reset Anti-Passback, the system will automatically clear the Anti-
Passback status of all personnel in the access control area.
Mail Set the email address that receives the linkage content when a linkage event occurs
Table 3-17 Global Linkage Parameters
Apply to all personnel: If this option is selected, this linkage setting is effective for all personnel.
Active Time: Set the active time of the linkage setting.
Step 3: Choose Global Linkage trigger conditions, the input point (System will filter devices according
to the choice in first step) and the output point, Set up linkage action. For more details about these
parameters, please refer to Linkage Setting.
Note: You can select multiple Door Events, but “Fail to connect server”, “Recover connection” and
“Device connection off” will be filtered automatically from Door Event.
Step 4: Click OK to save and quit. The added Global Linkage will display in the list.
3.5.5.2 Delete
In the Access > Advanced Functions > Global Linkage, click Delete button under Operations. Click
OK to delete.
Figure 3- 111 Delete Global Linkage
P a g e | 118 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.5.3 Enable
After the device is enabled, the upload and download of data are enabled normally. (When the device is
enabled, users can choose whether it is a registration device or not).
Figure 3- 112 Enable Global Linkage
3.5.5.4 Disable
After the device is disabled, the device is not allowed to upload and send data.
Figure 3- 113 Disable Global Linkage
3.5.6 The Global Interlock Group
Global interlocking the global interlocking function can be set across devices. Only the push device
supports global interlocking. By setting the global interlock group to group doors, you can set global
interlock.
This section describes the Step configuration of global interlock in ZKBio CVSecurity.
The Premise Condition:
Background authentication has been enabled on the device.
P a g e | 119 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.6.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose “Advanced Access Control > Global Interlock Group”
and Click New.
Step 2: On the page for adding a global interlock group, set related parameters and Click OK, as shown
in Figure 3-93.
Figure 3- 114 Global Interlock Group Settings Screen
Parameter How to set up
Any combination of up to 30 characters that cannot be identical to an
Group Name
existing group name
Group Interlock Select the configured interlock rule.
Table 3-18 Description of Advance Global Interlock
Step 3: On the global interlock group page, tap Add Door next to the configured group name on the
left, as shown in Figure 3-94.
Figure 3- 115 Adding A Door to A Global Interlock Group
P a g e | 120 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.6.2 Delete
In the Access > Advanced Functions > Global Interlock Group, click Delete button under Operations.
Click OK to delete.
Figure 3- 116 Delete A Door to A Global Interlock Group
3.5.7 The Global Interlock
3.5.7.1 Add (New)
Step 1: In the Access Control module, choose “Advanced Access Control > Global Interlock” and
Click New.
On the page for adding global interlock, set related parameters and Click OK, for example
Step 2: The global interlock name is set.
Figure 3- 117 Global Interlock Settings Screen
Parameter How to set up
Any combination of up to 30 characters that cannot be identical to an
Name
existing name
Remark Select the configured interlock rule.
Table 3- 17 Description of Access Control Right Groups
Step 3: On the global interlock screen, click Add Group next to the configured global interlock on the
left, as shown in Figure 3-112.
P a g e | 121 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 118 Page for Adding Global Interlock Groups
3.5.7.2 Delete
In the Access > Advanced Functions > Global Interlock, click Delete button under Operations. Click
OK to delete.
Figure 3- 119 Page for Adding Global Interlock Groups
3.5.8 Personnel Availability
It is used to restrict the expiration date, the number of days after the first use, and the number of times
the user passes the specified advanced access control area.
The Premise Condition:
1. Background authentication has been enabled on the device
2. Set the access control area and read head definition.
P a g e | 122 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.8.1 Add (New)
Operation Step:
Step 1: In the Access Control module, choose “Advanced Access Control >Personnel Avaliability>
Set Access Control Area Properties”, and Click New.
Step 2: On the Access Control Area Properties page, set related parameters and Click OK.
Figure 3- 120 Page for Setting Access Area Properties
Step 3: In the properties of the access control area that has been set, click Add Personnel on the left
to add the corresponding personnel, and Click OK.
Figure 3- 121 Personnel Availability Add Personnel Settings Screen
Step 4: On the personnel validity screen, tap Add, set related parameters, and tap OK.
Figure 3- 122 Personnel Validity Setting Screen
P a g e | 123 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.8.2 Delete
In the Access > Advanced Functions > Personnel Availability, click Delete button under Operations.
Click OK to delete.
Figure 3- 123 Delete Personnel Validity Setting
3.5.9 Occupancy Control
Control the maximum/minimum capacity of the area in the Advanced Access Control.
This section describes the Step configuration for population control in ZKBio CVSecurity.
The Premise Condition
1. Background authentication has been enabled on the device.
2. Set the access control area and read head definition.
3.5.9.1 Add (New)
Operation Step
Step 1: In the Access Control module, choose "Advanced Function> Occupancy" and Click New.
Step 2: On the Add Person control screen, set related parameters and click OK.
Figure 3- 124 Configuring the People Counting Function
P a g e | 124 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.9.2 Delete
In the Access > Advanced Functions > Occupancy Control, click Delete button under Operations.
Click OK to delete.
Figure 3- 125 Delete Configuring the People Counting Function
3.5.10 Muster Point
Designate the access control device of a certain place as the Muster Point. When an emergency event
(such as a fire alarm) occurs, the linkage triggers the activation of the Muster Point to open the door,
and the AC Device is used to count the escape of personnel, and quickly identify the escaped personnel
and dangerous personnel.
3.5.10.1 Add (New)
Select the access control devices as the equipment of Muster Point, and assign the corresponding
department. Note: The equipment selected is equipped with safe house conditions to facilitate
evacuation of personnel in the department.
Operation Steps:
Step 1: Set device as Muster Point, go to “Access Control > Advanced Functions > Muster Point >
New: Sign device to the point”.
Figure 3- 126 Sign Point
P a g e | 125 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 2: Click add department to the point.
Figure 3- 127 Add Department
Step 3: Set Global Linkage: set Linkage Trigger Conditions and Input Point, Selete Muster Point as an
output action.
Figure 3- 128 Global Linkage
Note: Before you use global linkage, you must confirm that your device has enable background
authentication.
P a g e | 126 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 129 Enable Bg-Verification Options.
3.5.10.2 Activated
When the linkage event is triggered, the door is opened remotely.and the Muster Point would be
actived.
Figure 3- 130 Real-Time Monitoring
Figure 3- 131 Muster Point
P a g e | 127 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.10.3 Delete
In the Access > Advanced Functions > Muster Point, click Delete button under Operations. Click OK
to delete.
Figure 3- 132 Delete Muster Point
3.5.10.4 Cancel
In the Access > Advanced Functions > Muster Point, click Cancel button under Operations. Click OK
to cancel.
Figure 3- 133 Cancel Muster Point
P a g e | 128 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.11 Muster Point Setting
Select the access control devices as the equipment of Muster Point and assign the corresponding
department. Note: The equipment selected is equipped with safe house conditions to facilitate
evacuation of personnel in the department.
Operation Steps:
Step 1: Set device as Muster Pointsetting, go to “Access Control > Advanced Functions > Muster
Point Setting”.
Figure 3- 134 Check the Report
3.5.11.1 Sign In Manually
If someone is not verified on the device, the administrator can manually sign in: Select Sign in
Manunally, see the picture below.
Figure 3- 135 Sign in Manually
Check the statues will change to “safe”.
P a g e | 129 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 136 Sign in Manually
3.5.11.2 Generate Reports
Click “Generate Reports” to check the reports.the report format: Excel/PDF/CVS/TXT that you can
selete.
Figure 3- 137 Download Report
Figure 3- 138 Report
P a g e | 130 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.5.11.3 Clear All Data
In the Access > Advanced Functions > Muster Point Setting, click Clear All Data button under
Operations. Click OK to clear all data.
Figure 3- 139 Clear All Data
3.5.11.4 Export
On the All Records screen, click Export, enter the user password in the displayed security verification
dialog box, and Click OK. Select whether to encrypt the file and the file format to export, and click OK.
Figure 3- 140 Export
Figure 3- 141 Export
Access Control Reports
In the access control report, you can query all access control records, including All records, Today’s
Access records, All abnormal records, door query, personnel query and Personnel access records
reports.You can export all records or query records.
This section describes the Step for querying and exporting reports in ZKBio CVSecurity.
P a g e | 131 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
3.6.1 All Transactions
Operation Step
Step 1: In the Access Control module, choose “Access Control Report > All Records”.
Step 2: On the All Records interface, fill in the corresponding query information and click the “search"
symbol to complete the query of all records, as shown in Figure 3-120.
Figure 3- 142 Report Query Page
Step 3: On the All Records screen, click Export, enter the user password in the displayed security
verification dialog box, and Click OK. Select whether to encrypt the file and the file format to export,
and Click OK.
Figure 3- 143 Report Export Page
Step 4: You can export the file by selecting the address for storing the file.
Media File: You can view or download the photos and videos created in the video system.
Clear All Data: Click Clear All Data to pop up prompt and click OK to clear all transactions.
P a g e | 132 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 144 Report Clear All Data
3.6.2 Events from Today
Check out the system record today.
Click Access Control Reports > Events from Today to view today’s records. You can export all events
from today in Excel, PDF, CSV format.
Figure 3- 145 Event from Today
Click Export, enter the user password in the displayed security verification dialog box, and Click OK.
Select whether to encrypt the file and the file format to export, and Click OK.
P a g e | 133 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 146 Report Export Page
Clear All Data: Click Clear All Data to pop up prompt, and then click OK to clear all events from today.
Figure 3- 147 Events Clear All Data
3.6.3 All Exception Events
Click Access Control Reports > All Exception Events to view exception events in specified condition.
The options are same as those of All Transactions.
P a g e | 134 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 148 All Exception events
Clear All Data: Click Clear All Data to pop up prompt, and then click OK to clear all exception events.
Export: You can export all exception events in Excel, PDF, CSV format.
Figure 3- 149 All Exception Events Export
3.6.4 Access Rights by Door
View related access levels by door. Click Access Control Reports > Access Rights by Door, the data list
in the left side shows all doors in the system, select a door, the personnel having access levels to the
door will be displayed on the right data list.
P a g e | 135 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 150 Access Right by Door
You can export all the personnel having access levels to the door data in Excel, PDF, CSV format.
Figure 3- 151 Access Right by Door Export Page
3.6.5 Access Rights by Personnel
View related access levels by door or personnel.
Click Access Control Reports > Access Rights by Personnel, the data list in the left side shows all
doors in the system, select personnel, the personnel having access levels to the door will display on the
right data list.
Figure 3- 152 Access Right by Personnel
You can export all the door information in Excel, PDF, CSV format.
P a g e | 136 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 3- 153 Access Right by Personnel Export Page
3.6.6 First In and Last Out
Click Access Control Reports > First in And Last Out to view the First and the Last time interval.
Figure 3- 154 Access Right by Door Export Page
3.6.6.1 Clear All Data
In the Access > Advanced Control Reports > First in and Last Out, click Clear All Data button under
Operations. Click OK to clear all data.
Figure 3- 155 Clear All Data
3.6.6.2 Export
On the All Records screen, click Export, enter the user password in the displayed security verification
dialog box, and click OK. Select whether to encrypt the file and the file format to export, and click OK,
P a g e | 137 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4 Video Management
Video view
Click Video Management > Video View.
In this module you can access the videos as Video Preview and Video Playback.
4.1.1 Video Preview
Click Video Management > Video View > Video Preview.
You can review recorded videos here
4.1.1.1 Live Preview
Description:
When applying video monitoring products, please strictly comply with the applicable laws and
regulations for the application and maintenance of video monitoring, recording, snapping and other
services. It is forbidden for enterprises or individuals to install monitoring device in office areas, monitor
employees” behaviors, or use video monitoring device to snoop on other people’s privacy for illegal
purposes.
Single camera live preview:
Step 1: In the Video Management module, select Video View > Video Preview.
Step 2: In Full Devices, double-click the online camera to the live playback pane to open live preview.
Description:
During live preview, please do not overlap the windows, interfaces, or dialog boxes of other
programs on the window that opens live, otherwise it may cause live screen or video playback
to be unsmooth.
Live preview of group camera:
Step 1: In the Video Management module, select "Device Management > Grouping Management"
to group the cameras.
Step 2: Click Add in the grouping list, enter the grouping name, and click "Confirm" to complete the
addition of camera grouping.
Step 3: Select the newly created camera group and click "Add Camera" on the right side. Double-click
the camera in the new interface that pops up, and click OK to add it to the grouping, as shown in Figure
4-1.
Step 4: In Intelligent module, select "Video View > Video Preview", and in "Grouping Devices",
double-click the online camera to the live playback pane to open the live preview.
Description:
During live preview, please do not overlap the windows, interfaces, or dialog boxes of other
programs on the window that opens live, otherwise it may cause live screen or video playback
to be unsmooth.
P a g e | 138 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 1 Camera Grouping
4.1.1.2 Video Preview
Operation scenario:
Using the round patrol function, the user can switch the live pictures monitored by multiple cameras
regularly. For example, there are multiple cameras in a scene, and the live situation of all cameras
cannot be displayed on a live split screen interface. The administrator can automatically switch the
cameras of a scene to monitor the live situation every 30 seconds by using the round patrol function
and realize the live browsing of all cameras in batches and time periods.
Operating Steps:
Step 1: In the Video Management module, select Video View > Video Preview.
Step 2: Under the list of grouped devices or full devices, click " " on the right to pop up the
"Multiple Camera Operation Settings" page.
Step 3: Click "Round Tour" to open the round tour setting window and configure round tour
information, as shown in Figure 4-2, and the parameter description is shown in Table 4-1.
Figure 4- 2 New Rotation Training Group
P a g e | 139 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
The number of round-robin windows must be less than the number of round-
Window number
robin cameras.
Set the camera rotation picture residence time under the selected main
Time interval (seconds)
device.
Main code stream: large code stream, high definition, and high
bandwidth occupation.
Auxiliary code stream: The code stream is small, the definition is low, and
Stream type the bandwidth is small.
Description:
When there is bandwidth limitation, it is recommended to select secondary
code stream.
Table 4- 1 Parameter Description of Round Patrol Configuration
Step 4: Click OK to start the round tour.
Step 5: End the round and click the toolbar below to close all screens.
Fast Target Search:
Screenshot for quick target search during preview or replay:
When security guards view real-time surveillance or playback video and find a suspicious person in the
screen, they can zoom in on that person and take a screenshot to support quick "target search" to jump
to target search and person track mapping.
Step 1: Go to the Video Management > Video Preview, click to snap a screenshot.
Figure 4- 3 Video Preview
Step 2: Then click Target search.
Figure 4- 4 Screenshot
P a g e | 140 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 3: Next click Retrieval.
Figure 4- 5 Target search
Step 4: After the retrieval, the retrieval results appear.
Figure 4- 6 Object Lookup Retrieval Results
Step 5: In the retrieval result, you can click Generate Trend Report in the upper right corner of the
interface to export the trend report in PDF format, as shown in Figure 4-7 and Figure 4-8.
Figure 4- 7 Trend Report 1
P a g e | 141 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 8 Trend Report 2
4.1.2 Video Playback
Click Video Management > Video View > Video Playback.
Device Management
Step 1: Click Video Management > Device Management.
Step 2: Adding Device, Camera and Group Management are included.
4.2.1 Device (Add Device)
Scene Description:
This operation is used to instruct users how to connect NVR to the platform andcameras, so that the
platform can manage the connected devices uniformly, such as viewing the live and video recordings
of cameras.
4.2.1.1 Adding Devices (New)
Maximum supports 1024 video channels, support 64 channels prereview and 16 channels real-time
playback simultaneously.
Operating Steps:
Step 1: Under the Video Management module, select Device Management > Device.
Step 2: Click New under the main device list to display the adding interface as shown in Figure 4-9, and
the description of each parameter is shown in Table 4-2.
Figure 4- 9 New Master Device
P a g e | 142 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Description:
There are 4 types you can select (AS1700/NVR800/ZKNVR/TD NVR3000) , If the purchased
device is AS1700, select "AS1700" for the type.
Parameters/Buttons Description
Type Select the device type.
Name Customize the device name.
Configure the device address. The format is: xxx.xxx.xxx.xxx, for example:
Address
192.168. 6.5.
Port Configure the device port.
The NVR’S user name and password.
Username and Note:
Password For ZKNVR, the default account is (admin,12345678)
For AS1700, you should to login the web page to add a new account.
Table 4- 2 Adding Device Parameters or Function Description
Step 3: Click OK.
4.2.1.2 Delete
Click Video Management > Device Management > Device, then select Delete.
4.2.1.3 Search
Click Video Management > Device Management > Device, then select Search.
Note: Search is not supported for AS1700/TD NVR3000.
Figure 4- 10 Auto Search
4.2.1.4 Sync Camera
Click Video Management > Device Management > Device, then select Sync Camera.
P a g e | 143 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.2.1.5 More
For AS1700: It Includes options like Edit, Target Maintenance, Maintenance management, View
Information, Personnel Frequency Analysis, Face Fortify, Face list library, Vehicle Fortify, Vehicle List
Library, Alarm Management, Task Manage, Storage Management, Third-Party Algorithm Configuration,
Email Configuration, Subscription, Unsubscribe and Sync Time.
Figure 4- 11 AS1700 More (Device)
For ZKNVR: It include options like Edit, Maintenance Management, Email Configuration, Subscription,
Unsubscribe, and Sync Time.
Figure 4- 12 ZKNVR More (Device)
P a g e | 144 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.2.1.6 Group Device
Click Video Management > Device Management > Device, then select Grouping Device.
Figure 4- 13 Group Device
4.2.2 Camera
Click Intelliegent Video > Device Management > Camera.
Figure 4- 14 Camera
4.2.2.1 Search Method Add (Recommended)
For AS1700: cameras that can be accessed to AS1700 through HWSDK and ONVIF protocol, this access
method is recommended, which can complete the fast access of cameras.
Operating Steps:
Step 1: In the Video Management module, select Device Management >Device.
Step 2: Select AS1700 to add cameras under the main device list, and then click Search under the list of
cameras on the right.
Step 3: Search the camera by IP address.
In the search interface, select the protocol type and the start and end IP address of the input
device.
Description:
The protocol type supports the selection of ONVIF and HWSDK protocols
It is recommended to set the starting IP address and ending IP address accurately. If there are
fewer cameras in a large IP address range, the search time will be longer.
If the start IP address and the end IP address are set, the system searches the cameras in unicast
form, and the system can search the cameras in the IP address segment. If multiple IP address
segments are set, the system can search for cameras in multiple VLANs.
If the starting IP address and ending IP address are not set, the system searches cameras in the
form of broadcast. At this time, the system can only search cameras in the same network
segment as the IP address of this server but can’t search cameras in other IP address segments
or other VLAN. Therefore, it is recommended to set IP address segment to search cameras or
add cameras in batches.
Click Start Search to start searching for online cameras.
P a g e | 145 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Step 4: Account verification.
For the searched camera, select a camera in the camera list, and then verify the account, as
shown in Figure 4-15. Refer to Table 4-3 for parameter description.
Figure 4- 15 Account Verification
Parameter Parameter description
When suggestions are added through HWSDK protocol, the default port is 6061.
Port
When recommendations are added through the ONVIF protocol, the default port is 80.
Registered username and password of the camera.
If all the cameras to be added have the same registered username and password, you
can also use the username and password at the bottom of the search list for batch
verification.
Description:
For Intelligent cameras, when accessing through different protocol types, the location of
the registration password in the camera Web interface is different:
Account/ HWSDK Protocol: The registered password is ‘sDK Password" in "Advanced
Password Configuration > Network > Platform Docking Parameters > Password
Management".
ONVIF protocol: The registered password is "ONVIF password" in "Advanced
Configuration > Network > Platform Docking Parameters > Password
Management".
GB/T 28181 Protocol: The registered password is "Password" in "Advanced
Configuration > Network > Platform Docking Parameters > Second Protocol
Parameters".
Table 4- 3 Parameter Description
Description:
About port numbers:
If the camera is added through ONVIF protocol, the port does not need to be modified; If the
camera is added through HWSDK protocol, it is recommended to configure port 6061. After the
camera is connected, the message transmission will be encrypted, which improves the security
of information transmission.
About camera registration username and registration password:
Usually, the registered username and password of the camera are the username and password
of logging in to the Web interface. For some cameras, there may be inconsistency between the
P a g e | 146 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
two. Please use the registered username and password of the actual camera as the value of this
parameter.
If the camera default password has been modified, please do not click "Verify" continuously.
Clicking 5 times or more continuously will cause the platform to lock. After the platform is
locked, you need to wait for the platform to be unlocked or restart the camera to add it again.
Step 5: Select the camera to add and click Add Camera.
The return result interface pops up to display the result of camera access.
Step 6: Close the pop-up window and complete the search and addition of cameras.
Step 7: Subsequent configurations are shown in Table 4-5.
Scene Configuration location Configure
Add Cameras Configure docking parameters, see Camera Web
Through ONVIF Camera Web Interface Interface Docking Configuration-ONVIF for
Protocol details.
Camera Join Device Management > Group Create groups and add cameras to facilitate the
Grouping Management grouping management of cameras.
Under the "Camera device" list, you can check
Device Management > Master one or more cameras and click the "Adjust Area"
Adjustment Area
Device > Camera Device button to adjust the area where the cameras
belong.
Table 4- 4 Subsequent Configuration Instructions
4.2.2.2 Camera to ZKNVR Device
Search Method Added (Recommended):
This section describes the configuration steps for automatically adding cameras in batches in the ZKBio
CVSecurity. For cameras th Step 4: In Intelligent module, select "Video View > Video Preview", and in
"Grouping Devices", double-click the online camera to the live playback pane to open the live preview.
Description:
During live preview, please do not overlap the windows, interfaces, or dialog boxes of other programs
on the window that opens live, otherwise it may cause live screen or video playback to be unsmooth.at
can be connected to ZK NVR through ZKTeco-P, Rtsp, ZKTeco and ONVIF protocols, this access method
is recommended to complete the quick access of cameras.
Steps:
Step 1: In the Video Management module, select "Device Management > Main Device".
Step 2: Select the ZKNVR whose camera is to be added under the main device list, and then click
Search under the camera list on the right.
Step 3: Search for cameras by IP address.
In the search interface, select the protocol type, that is, the protocol type ZKTeco-P, Rtsp,
ZKTeco or ONVIF (recommended to use ZKTeco) connected to the camera.
Instruction:
1. Protocol type supports the selection of zkteco-P, Rtsp, zkteco and ONVIF protocols.
(recommended to use zkteco).
2. Using zkteco protocol access, all functions can be used normally.
3. The ONVIF protocol is used to access, and the IPC parameter configuration except "camera"
and "image parameter" does not take effect.
P a g e | 147 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4. Using zkteco-P, Rtsp, protocol access, PTZ control cannot be used, and IPC parameter
configuration does not take effect.
Click Start Search to start searching for online cameras.
Step 4: Account verification.
For the searched cameras, directly check the cameras in the camera list, and then perform
account verification (the account number and password are the camera's registered user name
and password), as shown in Figure 4-16, and parameter descriptions are shown in Table 4-5.
Figure 4- 16 search methods added
Parameter Parameter Description
Port Through zkteco-p, rtsp, zkteco, onvif protocols, the default port is 80.
The registered username and password of the camera.
If all cameras to be added have the same registered username and
Account Password
the same registered password, you can also use the username and
password at the bottom of the search list for batch verification.
Table 4- 5 Parameter Description
Step 5: Close the pop-up window to complete the search and addition of cameras.
Step 6: The subsequent configuration is shown in Table 4-6.
Scenes Configuration Location Configure
On the Group Management interface, click Add to create a
Camera "Device Management >
group, click Add Camera on the right, and check the camera to
Grouping Group Management"
complete the camera grouping.
"Device Management > Under the Camera Device tab, you can select single or multiple
Adjust
Main Device > Camera cameras, and then click the button to
Area
Device" list adjust the area to which the cameras belong.
Table 4- 6 Subsequent configuration instructions
P a g e | 148 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.2.2.3 Manual Add
This paper introduces the configuration Steps of adding cameras in platform by "adding".
Operation Steps:
For AS1700: In the Video Management module, select Device Management > Master Device.
Step 1: Select the AS1700 to which a camera is to be added in the main device list and Click Add under
the camera list on the right. The add camera page is displayed.
Step 2: Set the corresponding content according to the new requirements, as shown in Figure 4-17.
Please refer to Table 4-7 for parameter filling instructions.
Figure 4- 17 New Camera
Parameter Description
The name of the device displayed on the platform. It is recommended to enter the
Device Name
installation location or monitoring area of the device.
Protocol type of camera access.
Description:
When Dahua camera accesses AS1700, it needs DHSDK protocol. When
accessing the camera, please ensure that the corresponding plug-in has been
installed, and you need to wait for 5 minutes before accessing the device,
Drive otherwise the device cannot be accessed normally.
When T3B15-ISor BioX Series cameras are accessed to AS1700, it is
recommended to access them by HWSDK protocol: if the cameras are
accessed to AS1700 by ONVIF protocol, the front-end video occlusion, motion
detection and behavior analysis functions cannot be enabled, and can only be
used when accessing by HWSDK protocol.
Select the area where the camera belongs. If it is not specified, the current camera
belongs to the default area.
The area is the area that has been configured in System Administration Module >
Authorized Area
System Administration > Regional Settings.
Users with permissions on this zone can view and operate devices under the
current zone.
This parameter can be configured only when the Add Devicees the system through
T28181 protocol.
Interconnect
Consistent with the "Device ID" of T3B15-IS or BioX Series Camera/Consistent with
Coding
the ‘sIP User Authentication ID" of Haikang Camera, in which 11 ~ 13 bits are
required to be 132.
P a g e | 149 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
Description:
Interconnection coding is required to be a 20-bit integer, and when it is less than
20 bits, it needs to be supplemented with 0.
This parameter can be configured only when the Add Devicees the system through
DHSDK protocol.
After RTSP is enabled, when users browse the live picture through the platform, the
Enable RTSP live picture is directly fetched from the camera without MU processing and
forwarding, which reduces the pressure of the system.
Enable RTSP fetching function and require the platform and front-end device to
configure the same port (default port 554).
The registered username and password used by the camera when registering with
the device.
For Intelligent cameras, when accessing through different protocol types, the
location of the registration password in the camera Web interface is different:
HWSDK Protocol: The registered password is ‘sDK Password" in "Advanced
Configuration > Network > Platform Docking Parameters > Password
Username/
Management".
Password
ONVIF protocol: The registered password is "ONVIF password" in "Advanced
Configuration > Network > Platform Docking Parameters > Password
Management".
GB/T 28181 Protocol: The registered password is "Password" in "Advanced
Configuration > Network > Platform Docking Parameters > Second Protocol
Parameters".
IP Address Represents the IP address of the device.
Represents the access port of the device. It is recommended to keep the default
value of the port. If the camera side modifies the port number, please fill it in
according to the actual situation.
Instructions:
When the camera is registered using HWSDK protocol, it is recommended to
Port
configure port 6061. After the camera is connected, the message transmission
will be encrypted, which improves the security of information transmission.
After the camera is successfully accessed, if the port number is modified, the
live camera will be disconnected and reconnected for about 1-5 seconds,
which is related to the actual network situation.
Table 4- 7 Parameter Description for Manual Single Access
Step 3: Click OK to complete the addition of camera device.
Step 4: See Table 4-8 for subsequent configuration.
In the following cases, it is necessary to complete the subsequent configuration on the camera side
before the camera can be used normally.
Scene Configuration location Configure
Adding Cameras To configure docking parameters, please
Through T28181 Camera Web interface refer to 4.1. 2.3. 1 Camera Web Interface
Protocol Docking Configuration-GB/T28181 for details
Configure docking parameters, see 4.1. 2.3. 2
Adding Camera Via
Camera Web interface Camera Web Interface Docking Settings-
ONVIF Protocol
ONIVIF for details.
Camera Join Grouping Device Management > Group Create groups and add cameras to facilitate
P a g e | 150 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Scene Configuration location Configure
Management the grouping management of cameras.
Under the "Camera device" list, you can
"Device Management > Master check one or more cameras and click the
Adjustment Area
Device > Camera Device" "Adjust Area" button to adjust the area
where the cameras belong.
Table 4- 8 Subsequent Configuration Instructions
4.2.2.4 Camera Connect to AS1700
Camera Web Interface Configuration-Gb/T28181
When cameras dock the platform through GB/T28181 protocol, the corresponding docking parameters
need to be configured in the camera Web interface.
Precondition:
1. GB/T28181 protocol uses MD5 digest authentication, MD5 is a weak algorithm, there are security
risks. And the signaling stream and media stream are not encrypted, please use this protocol in
trusted network, otherwise there may be security risks.
2. When using GB/T28181 protocol to interface with AS1700, you need to obtain the parameters
when adding cameras on the platform side, such as device ID.
Set System Time:
By docking with the platform through this protocol, it is necessary to make sure that the system time of
the camera is calibrated by NTP.
Step 1: Enter the IP address of the camera in the browser address bar and click Enter.
Step 2: Enter the camera’s "username" and "password" and click Login.
Step 3: In the Camera Web interface, select the "Advanced Configuration > System Configuration >
Time Setting" tab to enter the "Time Setting" configuration interface.
Step 4: In the Time Setting interface, set NTP timing and click Save, as shown in Figure 4-18. Please
refer to Table 4-9 for parameter description.
Figure 4- 18 Configuring NTP Timing
Parameter Description
Time zone Select the time zone where the NTP server is located.
Timing method Select NTP Timing.
NTP Server IP address of AS1700.
Synchronization time interval The interval at which time synchronization takes place.
Table 4- 9 Explanation of NTP Timing Parameters
P a g e | 151 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Configure Gb/T28181 Protocol Parameters
Steps:
Step 1: Log in to the camera through the Web and select “Advanced Configuration > Network >
Platform Docking Parameters”. The system displays the interface of "Platform Docking Parameters".
Step 2: Select “Second Protocol Parameters > T28181" and check "GB/T28181" to enable GB/T28181
protocol.
Step 3: Configure the GB/T28181 parameters, as shown in Figure 4-19, and the parameter description is
shown in Table 4-10.
Figure 4- 19 Gb/T28181 Parameter Interface
Parameter How to Configure
Enable the "Media Stream Keep Alive Switch” and tick it to indicate that it is enabled.
After the media stream keeping alive function is turned on, if the camera does not
Media Streams
receive the media keeping alive packet sent by AS1700 within a certain period of
Keep Alive Switch
time, the camera stops sending the media stream. When the platform supports
keep-alive function, it is recommended to "enable".
The number of keep-alive connections between the camera and AS1700 media
stream is an integer in the range of 2 to 24, and the single keep-alive time is 5s. For
example, when the number of keep-alive times is 2, the media stream keep-alive
Keep-alive Times time is 2*5s, that is, 10s. Even if the camera does not receive the media keep-alive
packet within 10s, it will not stop sending the media stream, and if it does not
receive the keep-alive packet for more than 10s, it will stop sending the media
stream.
Name Customize the login name used when registering with AS1700 system.
Platform IP Enter the IP address of the AS1700 system.
Platform listens on GB/T28181 protocol port number.
Port Number Port number 5080 is used when docking H” platform. If the server and camera are on
different networks and NAT exists, it is configured as the mapped port of 5080.
Custom setting device ID, requiring 132 bits 11 to 13 and 0 bits last, and the ID of
Device ID
each device must be unique.
P a g e | 152 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to Configure
GB/T28181 server code. Custom input 20 digits, which require the 11th to 13th digits
to be 200.
Server Code
For cameras connected to the same AS1700 system, the server codes must be
consistent.
@ Domain name, custom input 10 digits.
Customize the registration password of the camera in the platform.
Password In order to improve security, it is recommended that the password should be 8 to 20
characters in length and contain at least two letters, numbers and special characters.
Custom setting device lens ID number, required to be 20 digits and the 11 to 13
Lens ID
digits must be 131, otherwise AS1700 system cannot view the live.
ID of the device alarm input.
Alarm Input ID
The platform assigns an alarm input ID to the camera according to the device ID.
ID of the device audio output.
Audio Output ID
The platform assigns an audio output ID to the camera according to the device ID.
Table 4- 10 Parameter Explanation
Step 4: Click Save.
Camera Web Interface Configuration-ONVIF
When the camera docks AS1700 through ONVIF protocol, the corresponding docking parameters
should be configured in the camera Web interface.
Precondition:
ONVIF retains MD5 digest authentication. MD5 is a weak algorithm with security risks, and the media
stream is not encrypted. Please use this protocol in a trusted network, otherwise there may be security
risks.
If the ONVIF protocol needs to use the H.265 encoding protocol, the ONVIF version of the
camera and AS1700 need to support the H.265 encoding protocol. Intelligent cameras require
V200R003C10 and later. Please contact the provider for AS1700 to confirm support. Otherwise,
please modify the coding protocol of video stream (including main code stream and sub-code
stream) to H.264 first, and then configure the parameters in the device. For specific operation,
please log in to the camera Web interface, select "Advanced Configuration > Audio View >
Video Stream Parameters", and set "Encoding Protocol" to "H.264".
The ONVIF protocol defaults to the HTTP/HTTPS transport protocol type.
ONVIF protocol only supports G711U audio coding format, and other audio coding formats will
cause the functions such as accompanying voice, voice intercom and voice broadcast to be
unavailable.
When using ONVIF protocol to interface with AS1700, the default port number is "80".
Operating Steps:
Step 1: Log in to the camera’s Web interface (https://IP address).
Step 2: Select Advanced Configuration > Network > Platform Docking Parameters. The system
displays the interface of Platform Docking Parameters.
Step 3: Select Second Protocol Parameters > ONVIF to enter ONVIF Protocol Parameters
Configuration Interface.Configure the ONVIF parameters, as shown in Figure 4-20, and the parameter
description is shown in Table 4-11.
P a g e | 153 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 20 ONVIF Parameter Interface
Parameter How to configure
Enable the "Media Stream Keep Alive Switch” and tick it to indicate that it is enabled.
Media Streams After the media stream keeping alive function is turned on, if the SDC does not
Keep Alive receive the media keeping alive packet sent by AS1700 within a certain period of
Switch time, the SDC stops sending the media stream. When the platform supports keep-
alive function, it is recommended to "enable".
Time (s) for SDC and AS1700 media streams to keep alive, an integer in the range of
10 to 120.
For example, when the keep-alive time is set to 60s, the SDC will not stop sending
Lifetime
the media stream even if it does not receive the media keep-alive packet within 60s
and will stop sending the media stream if it does not receive the keep-alive packet
after 60s.
Enable ONVIF Enable ONVIF protocol, ticked to indicate enabled.
Enable "ONVIF message validity period” and tick it to indicate that it is enabled.
After the ONVIF message expiration date function is turned on, if the expiration date
set by the platform is exceeded, the ONVIF message will be invalid.
ONVIF message Description:
validity period This function is only enabled when the platform supports ONVIF message validity
function, otherwise it cannot be successfully docked with AS1700, and it is only
recommended to enable it when there is a security risk, and it is turned off by
default.
If "ONVIF Metadata Stream Switch" is checked, the metadata stream of the camera
Onvif Metadata
can be obtained, otherwise, only video stream and audio stream can be obtained.
Flow Switch
"ONVIF Metadata Flow Switch" is checked by default.
Please select the desired streaming type in the drop-down box after Streaming
Type, and the default is Basic Stream.
Elementary Stream: ES (Elementary Stream) packaging method is adopted.
ONVIF Stream Program Stream: PS (Program Stream) packaging mode is adopted.
Transmission Description:
Type Please select the stream transmission type according to the requirements of
decoding device, so as not to be unable to decode.
The configuration of the ONVIF media stream is only valid when the SDC
interfaces with the platform through the ONVIF protocol.
ONVIF Please select the required authentication method in the drop-down box after
Authentication Authentication Method.
P a g e | 154 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to configure
Mode Digest_MD5: Digest authentication for MD5 encryption.
Digest_SHA256: Digest authentication for SHA256 encryption.
Digest_MD5/Digest_SHA256: Both Digest_MD5 and Digest_SHA256
authentication methods are supported.
Digest_MD5 (priority)/WSSE: Both Digest_MD5 and WSSE authentication
modes are supported, but Digest_MD5 authentication mode is preferred.
WSSE (Web Service Security): "WSSE" authentication method.
None: Indicates no authentication.
Description:
There is a security risk using ONVIF WSSE authentication.
− It is recommended to enable Digest_MD5 (priority)/WSSE authentication
when some platforms accessed by the camera do not support HTTP digest
authentication and only support ONVIF WSSE authentication.
− It is recommended that WSSE authentication be enabled when HTTP digest
authentication is not supported on all platforms on which the camera is
accessed and only ONVIF WSSE authentication is supported.
− It is recommended that WSSE authentication be enabled when some
platforms fail to properly handle Digest messages.
There are security risks in using None authentication, so it is only recommended
to enable it when the platform does not support authentication. When
using None authentication mode, the ONVIF protocol is used to drain and
the RTSP protocol is used to request live, and authentication will not be
carried out.
ONVIF Version The ONVIF version supported by the camera needs to be consistent with the ONVIF
Information version supported by the platform.
ONVIF transport uses protocol types:
HTTP/HTTPS: It can be transmitted over HTTP or HTTPS protocols, respectively.
ONVIF
HTTP: Transport using the HTTP protocol.
Transport
HTTPS: Transport using the HTTPS protocol.
Protocol Type
Description:
HTTP protocol is not safe protocol, there are risks, please use cautiously.
Method 1:
1. Select the "Password Management" tab under ‘second Protocol Parameters".
2. Select "ONVIF Password" and enter "Web User Password", "New Password" and
"Confirm Password" for the ONVIF protocol.
3. Click Save.
Method 2:
1. Select Advanced Configuration > System Configuration > Password
Management.
2. Select Protocol Password.
Modify The
3. Select "ONVIF Password" and enter "Web User Password", "New Password" and
ONVIF
"Confirm Password" for the ONVIF protocol.
Password
4. Click Save.
Description:
To ensure the security of data information, please change the ONVIF password
in time.
When using ONVIF protocol to dock with AS1700, the username and password used
by AS1700 must be consistent with this password, otherwise the docking with
AS1700 cannot be successful, and the platform will be locked for 5 minutes after 20
consecutive authentication failures. After the password is modified, please record
and save it in time.
P a g e | 155 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter How to configure
The default username is "admin," and the Web user password is the same as the
user currently logged on to the Web. In order to improve security, it is
recommended that the password length be 8 to 20 characters, and contain at
least two uppercase letters, lowercase letters, numbers and special characters.
Table 4- 11 Explanation of ONVIF Parameters
4.2.2.5 Result
In the video device management interface, the added device status is displayed as "online", and the live
broadcast can be seen at the same time, which means the addition is successful.
Operating Steps:
Step 1: Check to see if the device is online.
In the Video Management module, select Device Management > Master Device.
Select the master device list AS1700 devices, and in the camera device list on the right, check
whether the added device status is "online" under the "device status" parameter.
Description:
If the camera is offline due to some reasons after the camera is successfully added for the first
time, the offline reason reminder will not pop up in the interface at this time, so it is necessary
to manually check the offline reason of the camera.
Step 2: Check the facts.
In the Video Management module, select Video View > Video Preview.
Select the preview window and double-click the added camera to the live window, which can
play the live normally, indicating that the access is successful.
Figure 4- 21 View Live
Description:
To load the video preview for the first time, you need to download the video plug-in and install
it before you can successfully view the video picture.
If the added camera does not appear in the camera list, you can click Refresh Camera List.
Users can customize the new camera grouping. Custom camera groups can be created under
Device Management > Grouping Management.
P a g e | 156 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Grouping device: Show all camera groups and cameras in the group and view the live cameras
individually or in the whole group.
Full device: Shows all the device of AS1700 and can view the live camera individually.
4.2.3 Group Management
Click Video Management > Device Management > Group Management.
Figure 4- 22 Group Management
4.2.3.1 New
Click Video Management > Device Management > Group Management, then select New.
Figure 4- 23 New (Group Management)
Click OK to save and exit.
4.2.3.2 Delete
Click Video Management > Device Management > Group Management, then select Delete.
Decoding On the Wall
Click Video Management > Decoding on The Wall.
Figure 4- 24 Decoding on the Wall
P a g e | 157 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.3.1 Decoder
Click Video Management > Decoding on the wall > Decoder.
4.3.1.1 New (Add Decoder)
Click Video Management > Decoding on The Wall, then select New.
Figure 4- 25 New (Decoding Wall)
Parameter Description
Decoder Name Custom decoder name.
IP Address IP Address of the decoder
Port Default port 10200
Select the device model to access the decoder
Type
Support PEMXP70 and DEC6109 decoder access
Username Enter the business username
Password Enter the business password
Table 4- 12 New
Click OK to save and exit, or click Save and New to continue.
4.3.1.2 Delete
Click Video Management > Decoding on The Wall, then select Delete.
4.3.2 TV Wall
Click Video Management > Decoding on the wall > TV Wall.
4.3.2.1 New (Create TV Wall)
Click Video Management > Decoding on the wall > TV Wall, then select New (Create TV Wall).
Step 1: In the Video Management module, select "Decoding Wall > TV Wall".
Step 2: Click Add to enter the "Add TV Wall" page, as shown in Figure 4-26.
P a g e | 158 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 26 Creating Tv Wall Layout
Step 3: Enter a custom TV Wall Name.
Step 4: In the Matrix Settings box, customize the number of rows and list of input layouts, and click
Settings to apply the layout.
Description:
Matrix Layout pane settings, supporting a minimum of 1 * 1 and a maximum of 8 * 8.
Step 5: Click next to enter the TV wall binding decoder interface, as shown in Figure 4-27.
Figure 4- 27 TV Wall Binding Decoder
Step 6: Select the TV wall pane to which you want to add a decoder channel, and then click Decoder
Channel on the left to complete the binding.
Step 7: Click Finish to finish adding the TV wall.
P a g e | 159 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.3.2.2 TV Wall Live
Precondition:
The TV wall layout has been created and the decoder docking has been completed. See 4.4. 1
Configuring TV Wall for details.
Operating Steps:
Step 1: In Video Management, select "Decoding on the Wall > Large Screen Control", as shown in
Figure 4-28.
Figure 4- 28 Live Upper Wall
Step 2: Select the created TV wall layout in the TV wall drop-down box.
Step 3: Select a window bound to the decoder channel, click the camera device under the device list to
realize the association between the camera and the TV wall window, and then click Go to the wall or
Go to the wall all below to complete the decoder going to the wall operation, so that users can view
the live situation on the TV wall screen.
Description:
"Go to the wall" is only for a single window and click "Go to the wall all" when setting split
screens.
4.3.2.3 Delete
Click Video Management > Decoding on the Wall > TV Wall, then select Delete.
4.3.3 Large Screen Control
Click Video Management > Decoding on the wall > Large Screen Control.
Figure 4- 29 Large Screen Control
P a g e | 160 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Search
Click Video Management, then select Search.
Figure 4- 30 Search
4.4.1 Face Search
Step 1: Click Video Management > Search, then select Face Search.
Figure 4- 31 Face Search
P a g e | 161 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
Search Type Set Search type as Face Search or Target Overall Search.
Device Selecta device.
Channel Select an option for channel from list and click Ok.
Start Time Set start time.
End Time Set end time.
Gender Set gender as Unknown, Male, or Female.
Set age as per list: under 18, 18 to 25 years old, 26 to 30 years old, 31 to 35 years old,
Age
36 to 40 years old, 41 to 50 years old, and 51 years old and above.
Mouth Mask Set to Unknown, Unlimited, Wear mask, and No.
Glasses Set to Unlimited, Unknown, Have, and No.
Hat Set to Unknown, Wear a Hat, and No.
Hair Set to Unlimited, Unknown, long hair, and short hair.
List Library Select an option from List and click OK.
Table 4- 13 Face Search
Step 2: Click Search to complete.
4.4.1.1 Export
Step 1: Click Video Management > Search > Face Search, then select Export.
Figure 4- 32 Export
Step 2: Click OK to save and exit.
P a g e | 162 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.4.2 Vehicle Retrieval (AS1700)
Click Video Management > Search, then select Vehicle Retrieval.
Figure 4- 33 Vehicle Retrieval
Parameter Description
Device Select Device.
Channel Select an option from the list and slick OK.
Start/ End Time Set Start/End Time.
Search Unknown Plate Select Search Unknown Plate as requirement.
Plate Number Mention Plate Number.
Vehicle Brands Select Unlimited.
Vehicle Sub-Model Select Unlimited.
Year Model Set year as Unlimited, Unknown and 2013 to 2021.
Mention Car type as Unknown, Van, Car, Medium Bus, Motorcycle, SUV, Bus,
Car type
Unlimited, Small truck, and Truck.
Set Car color from list as: Unlimited, Unknown, Red, Green, Black, Purple,
Car Color
White, Brown, blue, Pink, Yellow, and Gray.
Special Car Set as Unlimited, Not Special car, and School Bus.
Set as Unlimited, White, Yellow, Green, Blue, Black, Gradient green, Yellow and
Plate Color
Green, Red and Gray.
P a g e | 163 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
Set Type of plate as: Personalized License Plate, Single Yellow Card, Single-
Layer Military Card, Single Layer Blue card, Double-Decker Military Card,
Type of Plate
Double Yellow card, Single Layer Black Card, White Armed Police, White Police
Sign, Unknown, and Unlimited.
Plate Obscured Set as Unlimited, Unobstructed License Plate, and Hide the License Plate.
Annual Logo Set as Unlimited, None, and Yes.
Table 4- 14 Vehicle retrieval
4.4.2.1 Export
Click Video Management > Search > Vehicle Retrieval, then select Export.
4.4.3 Target Comparision (AS1700)
Step 1: Click Video Management > Search, then select Target Comparison.
Figure 4- 34 Target Comparison
Step 2: Upload the personnel photos to be compared and click Compare.
4.4.4 Search for Pictures with Pictures
Step 1: Click Video Management > Search, then select Search for Pictures with Pictures.
Figure 4- 35 Search for Pictures with Pictures
Step 2: Fill the parameters like Device, Channel, Start/End Time, and Similarity, click Search to finish.
P a g e | 164 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.4.4.1 Export
Click Video Management > Search > Search for Pictures with Pictures, then select Export.
4.4.5 Personnel Frequency Retrieval (NVR800)
Step 1: Click Video Management > Search, then select Personnel Frequency Retrieval.
Figure 4- 36 Personnel Frequency Retrieval
Parameter Description
NVR800 Select the device.
Channel Select Channel as all or single and click OK.
List Library Select list library from list either all or in single and click OK.
Start Time Set start time.
End Time Set end time.
Min Interval(s) Set the Min Intervals(s).
Similarity Enter or Set the Similarity.
Gender Set gender as Unknown, Male, or Female.
Set age as per list: under 18, 18 to 25 years old, 26 to 30 years old, 31 to 35
Age years old, 36 to 40 years old, 41 to 50 years old, and 51 years old and
above.
Mouth Mask Set to Unknown, Unlimited, Wear mask, and No.
Hair Style Set to Unlimited, Unknown, long hair, and short hair.
P a g e | 165 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
Glasses Set to Unlimited, Unknown, Have, and No.
Hat Set to Unknown, Wear a Hat, and No.
Maximum Display Quantity Set a Maximum Display Quantity.
Table 4- 15 Personnel Frequency Retrieval
Step 2: Click Search to complete.
Intelligent
Click Video Management, then select Intelligent.
Figure 4- 37 Intelligent
4.5.1 Algorithm Model (AS1700 Supported)
Click Video Management> Intelligent, then select Algorithm Model.
4.5.1.1 Get Algorithm Pattern
Click Video Management> Intelligent > Algorithm Model, then select Get Algorithm Model.
4.5.2 Target Intelligence
Click Video Management> Intelligent, then select Target Intelligence.
Figure 4- 38 Target Intelligence
P a g e | 166 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.2.1 Target Parameters
In this, parameters like Parameter Configuration, Advanced Parameter, Regional Settings, and
Schedule Settings are included and can be operated according to requirement.
Parameter Configuration
Figure 4- 39 Parameter Configuration
Parameter Description
Target Capture Select Target capture as requirement.
Target Properties Select Target properties as requirement.
Set Detection mode to Object detection, Overall Target Detection,
Detection Mode
and Target and Overall Target detection.
Capture Mode Set Capture Mode to Optimization, Speed, and Timing.
Alarm Detection Interval Set a number to Alarm detection as requirement.
Target Detection Sensitivity Set a Target Detection Sensitivity.
Overall Sensitivity of Target
Set an Overall Sensitivity of Target Detection.
Detection
Target Minimum Size Set a range to Target Minimum Size.
Maximum Target Size Set a range to Maximum Target Size.
Table 4- 16 Parameter Configuration
Advanced Parameters
Figure 4- 40 Advanced Parameter
Parameter Description
Send Target Matting Set Send Target Matting by selecting Number of Pictures.
Send Target Global Matting Select Number of pictures to Send Target Global Matting.
Send Panorama Select panorama as requirement.
Target Brightness Compensation Select Target Brightness Compensation as requirement.
Target Image Capture Quality Set Target Image Capture Quality.
Image Capture Quality of Target Set Image Capture Quality of Target.
Panoramic Image Capture Quality Set Panoramic Image Capture Quality.
Target Compensation Coefficient Set Target Compensation Coefficient.
Target Exposure Duration (minutes) Set Target Exposure Duration (minutes).
Table 4- 17 Advanced Parameter
P a g e | 167 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Regional Settings
Figure 4- 41 Regional Settings
In Regional Settings select Video Line Drawing as Crossed or Not Scribed.
Schedule Setting
Figure 4- 42 Schedule Setting
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one click to complete delete option.
4.5.2.2 Mask Recognition
Parameter Configuration
Figure 4- 43 Parameter Configuration
Set Alarm Type to Close, No Mask, and Have a Mask.
Audible Alert
Figure 4- 44 Audible Alert
Set Audible Alert in options like Audio Alarm, Audio Output, and Count.
Light Flashing Alarm
Figure 4- 45 Light Flashing Alarm
Parameter Description
Light Flashing Alarm Set Light Flashing Alarm if require.
Set Light flashing Frequency as Low Frequency, Hight Frequency,
Light flashing Frequency
Medium Frequency, and Steady On.
P a g e | 168 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Description
Light flashing time Set Light flashing time if require.
Figure 4- 46 Light Flashing Alarm
Schedule Settings
Figure 4- 47 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.2.3 Target Recognition
Parameter Configuration
It includes Enable Target recognition, Target Parameter Model, Target Recognition Model, and Usage
Mode.
Figure 4- 48 Parameter Configuration
Click OK to save and exit.
P a g e | 169 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.3 Behavior Analysis (AS1700 Supported)
4.5.3.1 IGT Alarm Config
Figure 4- 49 IGT Alarm Configuration
4.5.3.2 Intrusion Detection
Parameter Configuration
Figure 4- 50 Parameter Configuration
Set Target Detect as Pedestrian, Motor vehicles, and Non-motorized Vehicles.
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Audible Alert
Figure 4- 51 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
P a g e | 170 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Light Flashing Alarm
Figure 4- 52 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 53 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 54 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one-click to complete delete option.
4.5.3.3 Perimeter Line
Parameter Configuration
Figure 4- 55 Parameter Configuration
Set Target Detect as Pedestrian, Motor vehicles, and Non-motorized Vehicles.
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
P a g e | 171 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Audible Alert
Figure 4- 56 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 57 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 58 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 59 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
P a g e | 172 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.3.4 Region Entrance Detection
Parameter Configuration
Figure 4- 60 Parameter Configuration
Set Target Detect as Pedestrian, Motor vehicles, and Non-motorized Vehicles.
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Audible Alert
Figure 4- 61 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 62 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 63 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 64 Schedule Settings
P a g e | 173 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.3.5 Region Exiting
Parameter Configuration
Figure 4- 65 Parameter Configuration
Set Target Detect as Pedestrian, Motor vehicles, and Non-motorized Vehicles.
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Audible Alert
Figure 4- 66 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 67 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 68 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
P a g e | 174 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Schedule Settings
Figure 4- 69 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.3.6 Object Left
Parameter Configuration
Figure 4- 70 Parameter Configuration
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Set Alarm Tolerance Time(second).
Audible Alert
Figure 4- 71 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 72
Figure 4-64 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
P a g e | 175 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Regional Settings
Figure 4- 73 Regional Settings.
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 74 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one-click to complete delete option.
4.5.3.7 Object Remove
Parameter Configuration
Figure 4- 75 Parameter Configuration
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Audible Alert
Figure 4- 76 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 77 Light Flashing Alarm
P a g e | 176 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 78 Regional Settings.
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 79 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.3.8 Loitering
Parameter Configuration
Figure 4- 80 Parameter Configuration
Set Target Detect as Pedestrian, Motor vehicles, and Non-motorized Vehicles.
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Set Alarm Tolerance Time(second).
Audible Alert
Figure 4- 81 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
P a g e | 177 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 82 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 83 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 84 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.3.9 Fast Move
Parameter Configuration
Figure 4- 85 Fast Move
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
P a g e | 178 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Audible Alert
Figure 4- 86 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 87 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 88 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 89 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.3.10 Electric Bike
Parameter Configuration
Figure 4- 90 Parameter Configuration
P a g e | 179 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Set Alarm Detection Interval(s).
Set Recognize Mode as Center, Bottom, and Top.
Set Sensitivity as requirement.
Audible Alert
Figure 4- 91 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 92 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 93 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 94 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
P a g e | 180 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.4 Crowd Situation
Figure 4- 95 Crowd Situation
4.5.4.1 Line Crossing Status
Parameter Configuration
Figure 4- 96 Parameter Configuration
Set Parameters like Enable Line Crossing Statistics, Zero Cleaning Enable, Statistics Reset, Alarm
Detection Interval(s), and Alarm Number.
Audible Alert
Figure 4- 97 Audio Alert
Light Flashing Alarm
Figure 4- 98 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
P a g e | 181 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 99 Regional Settings.
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 100 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one-click to complete delete option.
4.5.4.2 Queue Length
Parameter Configuration
Figure 4- 101 Queue Length
Set Parameters like Enable Queue Length, Alarm Detection Interval(s), Single Processing Time,
Alarm Threshold(minute), and Sensitivity.
Audible Alert
Figure 4- 102 Audio Alert
Light Flashing Alarm
Figure 4- 103 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
P a g e | 182 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Figure 4- 104 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 105 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.4.3 Population Density
Parameter Configuration
Figure 4- 106 Parameter Configuration
Set Parameters like Enable Population Density, Alarm Detection Interval(s), Alarm
Threshold(people), and Sensitivity.
Audible Alert
Figure 4- 107 Audible Alert
Light Flashing Alarm
Figure 4- 108 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
P a g e | 183 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Regional Settings
Figure 4- 109 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 110 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.4.4 Heat Map
Parameter Configuration
Figure 4- 111 Parameter Configuration
Set Parameters Like Enable Heat Map and Send Metadata.
Regional Settings
Figure 4- 112 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
P a g e | 184 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.4.5 Off Duty Detection
Figure 4- 113 Regional Settings
Parameter Configuration
Figure 4- 114 Parameter Configuration
Set Parameters like Enable Off Duty Detection, Is Metadata Superimposed on The Alarm Snapshot,
Number of Posts, Departure Time, and Alarm Detection Interval(s).
Audible Alert
Figure 4- 115 Audio Alert
Light Flashing Alarm
Figure 4- 116 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
P a g e | 185 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Regional Settings
Figure 4- 117 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 118 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
Click OK to save and exit.
4.5.5 General Intelligence (AS1700/ZKNVR Supported)
Figure 4- 119 General Intelligence
Privacy Protection Setting
Figure 4- 120 Privacy Protection Setting
Set Privacy Protection Setting as Enable or Disable.
P a g e | 186 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Parameter Configuration
Figure 4- 121 Parameter Configuration
Audible Alert
Figure 4- 122 Audible Alert
Light Flashing Alarm
Figure 4- 123 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 124 Regional Settings
Set Video Line Drawing as Crossed or Not Scribed.
Schedule Settings
Figure 4- 125 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
P a g e | 187 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.5.1 Lens Blocking
Parameter Configuration
Figure 4- 126 Parameter Configuration
Set Parameters like Enable or Disable Lens Blocking, Alarm Detection Interval(s), and Sensitivity.
Audible Alert
Figure 4- 127 Audible Alert
Set Audio Alarm to Enable or Disable.
Set Audio Output.
Set Count for Audible Alert.
Light Flashing Alarm
Figure 4- 128 Light Flashing Alarm
Set Light Flashing Alarm to Enable or Disable.
Set Light Flashing Frequency to Low Frequency, Medium frequency, High frequency, and Steady
On.
Set Light Flashing time as required.
Regional Settings
Figure 4- 129 Regional Settings
Schedule Settings
Figure 4- 130 Schedule Settings
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
P a g e | 188 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
4.5.5.2 Sound Detect
Rise Audio
Figure 4- 131 Rise Audio
Set Rise Audio and Alarm Audio as Enable or Disable.
Set Sensitivity, Audio Output and Count.
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
Decline Audio
Figure 4- 132 Decline Audio
Set Decline Audio and Alarm Audio as Enable or Disable.
Set Sensitivity, Audio Output and Count.
New
Click New to add new schedule for Start time, End Time, Date, Mode, and Operations.
Delete All
Click Delete All to delete all schedule, if to delete individual one Click to complete delete option.
Click OK to save and exit.
P a g e | 189 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.5.6 Vehicle Intelligence (AS1700 Supported)
Figure 4- 133 Vehicle Intelligence
4.5.7 Intelligent Application
It Includes Mixed Detection and Live Alarm.
Figure 4- 134 Intelligent Application
P a g e | 190 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Mixed Detection
Click on Mixed Detection.
Figure 4- 135 Mixed Detection
Device List
It will disaplays the list of devices which are connected to the software.
Target Recognition
This function will help you to recognition of the seleted target parking vehicles.
Live Alarm
Click On Live Alarm.
Figure 4- 136 Live Alarm
Full Screen
View the video in the full screen.
Pause Alarm.
This function will help you to pause the alarm.
P a g e | 191 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
Statistics
4.6.1 Face Analysis
Click Statistics > Face Analysis, then select Statistical Period as Daily, Weekly, Monthly, or Quarterly.
In this module, you can access the data for the type of personnel or person as dd, aa, VIP, or VIP,
Forbidden list, pass list, and Stranger to get data to follow the options.
Figure 4- 137 Face Analysis
Parameters Description
Device Select the desired device.
Channel Select the channel.
Statistical Period Choose your required statistical time period.
Confirm Click confirm to view a detailed copy of the types of people or persons.
Table 4- 18 Face Analysis
4.6.1.1 Export
Export selected personnel information in the area, you can export Excel, PDF, CSV format.
Figure 4- 138 Export
P a g e | 192 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.2 Face Report
Click Statistics > Face Report, then select Statistical Period as Daily, Weekly, Monthly, or Quarterly.
In this module, you can access the data for the type of personnel or person as Unknown, Juvenile (17
years old and below), Youth (18 to 35 years old), Middle Aged (36 to 59 years old), or Elderly (Over 60
years old) to get data to follow the options.
Figure 4- 139 Face Report
Parameters Description
Device Select the desired device.
Channel Select the channel.
Statistical Period Choose your required statistical time period.
Confirm Click confirm to view a detailed copy of the types of people or persons.
Start Time Select the desired time.
Table 4- 19 Face Report
4.6.2.1 Export
Export selected personnel information in the area; you can export Excel, PDF, CSV format.
Figure 4- 140 Export
P a g e | 193 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.3 Cross-Line Statistics
Click Statistics > Cross Line Statistics then select Statistical Period as Daily, Weekly, Monthly, or
Quarterly.
In this module, you can access the data for the type of personnel or person as the number of people
entering or leaving starting time to get data to follow the options.
Figure 4- 141 Cross-Line Statistics
Parameters Description
Device Select the desired device.
Channel Select the required channel.
Statistical Period Choose your required statistical time period.
Confirm Click confirm to view a detailed copy of the types of people or persons.
Over Line Select the number of people entering or leaving.
Start Time Select the desired time.
Table 4- 20 Cross-Line Statistics
4.6.3.1 Export
Export selected personnel information in the area; you can export Excel, PDF, CSV format.
Figure 4- 142 Export
P a g e | 194 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.4 Heat Map
Click Statistics > Heat Map then select Statistical Period as Daily, Weekly, Monthly, or Quarterly.
In this module, you can access the data for the type of personnel or person as Time Heat Map and
image Heat Map to follow the options.
Figure 4- 143 Heat Map
Parameters Description
Device Select the desired device.
Channel Select the required channel.
Statistical Period Choose your required statistical time period.
Confirm Click confirm to view a detailed copy of the types of Maps.
Heat Map Type Select the list of Heat Map types.
Start Time Select the desired time.
Table 4- 21 Heat Map
4.6.4.1 Export
Export selected personnel information in the area, you can export Excel, PDF, CSV format.
Figure 4- 144 Export
P a g e | 195 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.5 Object Statistics
Click Statistics > Face Report, then select Statistical Period as Daily, Weekly, Monthly, or Quarterly.
Figure 4- 145 Object Statistics
Parameters Description
Device Select the desired device.
Channel Select the channel.
Statistical Period Choose your required statistical time period.
Confirm Click confirm to view a detailed copy of the types of people or persons.
Table 4-22 Object Statistics
4.6.5.1 Export
Export selected personnel information in the area, you can export Excel, PDF, CSV format.
Figure 4- 146 Export
P a g e | 196 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.6 Alarm Report
Click Statistics > Alarm Report then select Alarm Type.
In this module, you can access the data for the type of personnel or person can select the start time and
end time the serial number of the video channel, and different alarm types to filter the report.
Figure 4- 147 Alarm Report
4.6.6.1 Export
Export selected personnel information in the area; you can export Excel, PDF, or CSV format.
Figure 4- 148 Export
P a g e | 197 Copyright©2022 ZKTECO CO., LTD. All rights reserved.
ZKBio CVSecurity User Manual
4.6.7 Patrol Report
Click Statistics > Patrol Report, then select Plan Name.
In this module, you can access the data for the type of personnel or person as dd, aa, vip, or VIP,
Forbidden list, pass list, and Stranger to get data to follow the options.
Figure 4- 149 Patrol Report
4.6.7.1 Export
Export selected personnel information in the area; you can export Excel, PDF, CSV format.
Figure 4- 150 Export
P a g e | 198 Copyright©2022 ZKTECO CO., LTD. All rights reserved.