FP Reader Software User Manual V1.1
FP Reader Software User Manual V1.1
Version: 1.1
Date: Jul 2010
Applicable Models: F11
Important Claim
Firstly thank you for purchasing this access control management system,
before use, please read this manual carefully to avoid the unnecessary
damage! The company reminds you that the proper user will improve
the use affect and authentication speed.
The product described in the manual maybe includes the software which
copyrights are shared by the licensors including ZKSoftware. Except for
the permission of the relevant holder, any person can’t copy, distribute,
revise, modify, extract, decompile, disassemble, decrypt, reverse
engineering, leasing, transfer, sub-license the software, other acts of
copyright infringement, but the limitations applied to the law is
excluded.
Contents
1. Install and Uninstall Software...................................................................................... 1
1.1 Install Software ...............................................................................1
1.2 Uninstall Software...........................................................................4
2. Department Management............................................................................................. 5
3. User Management ........................................................................................................ 8
3.1 User Fingerprint ..............................................................................8
3.2 Statistic..........................................................................................13
3.3 Upload and Download...................................................................17
4. Device Management ...................................................................................................20
4.1 Communication .............................................................................23
4.2 Device Information .......................................................................24
4.3 Wiegand.........................................................................................25
4.4 Verification ....................................................................................27
4.5 Power Management.......................................................................28
4.6 Access Control ..............................................................................29
4.7 Mifare............................................................................................31
4.8 Other Setup....................................................................................31
4.9 U disk Setting................................................................................33
5. System Management...................................................................................................35
5.1 Operator Management...................................................................35
5.2 System Operation Log...................................................................36
5.3 Data Maintenance..........................................................................37
5.4 Initialize System............................................................................38
5.5 Set Database ..................................................................................39
5.6 Set Password of Database .............................................................41
5.7 System Options .............................................................................41
6. Other Function ............................................................................................................45
I
Table of contents
II
1. Install and Uninstall Software
1
Table of contents
Select the folder where to install the software. Click [Next] enter
following interface.
2
1. Install and Uninstall Software
3
Table of contents
After enter into this interface, it is means that you have finish all
configure to setup, if want to modify, click [Back] to return, otherwise click
[Install], the installing program will copy and write corresponding
information into hard disk, After finish installation, click [Finish] to
complete the process.
If you do not need to use this software any more, and want to uninstall
it from your computer, then may follow next steps to operate:
1. Close the Access Control Reader Software complete.
2. Enter Start/ Control panel.
3. Enter Add/ Cancel Program window, choose Access Control
Reader Software, and click [Remove] button to uninstall.
Like doing this, you still cannot delete all files. You need enter the
install directory of the software to delete the folder where the software
installed.
4
2. Department Management
2. Department Management
Click [Department] in the [Base Options] menu, popup the
Department Management main interface, like as following figure.
5
Table of contents
6
2. Department Management
Select the staff to employ, click “>” to move the staff to the right side
of related department, or click “<<” button to move all employees to the
right side to complete shifting the staff.
To shift a staff can directly process in the [User Management] menu.
7
3. User Management
3. User Management
User Management is the process to maintenance user information,
click [User Manage] in the [Base Options] menu or the shortcut button,
popup the User Information Maintenance interface, as following.
Add User: Click button in the staff maintenance bar to add new user.
Cancel User: Choose the user you want delete, and click button to
delete the user.
Photo: Click button to import user photo, or click button to
delete.
driver, connect the FP sensor to the PC USB port. The current software
version supports to use the “U are U” series, ZK4000/6000/7000 FP sensor
and etc.
(1) Select [Enroll with Sensor] in User Information Maintenance
interface, click [Enroll] button, and enter the fingerprint enrollment
interface, as shown below.
(2) Click the finger which fingerprint is to be enrolled, and the system
enters the interface to enroll, as shown below:
9
Table of contents
(3) After the finger finishes 3 times press on the FP Sensor, the system
prompt “Succeed in fingerprint registration”, shown as blow.
(4) To delete the fingerprints, please click on the enrolled finger twice,
10
3. User Management
11
Table of contents
operation complete.
Note: This function is available only for the FP Reader which supports
Mifare card enrollment.
3. Fingerprints Enroll Status: Shows the detail of user and
fingerprint enroll status.
4. User face Enroll Status: Shows the detail of user and user face
enroll status.
12
3. User Management
5. Sort Order:
You can arrange the record according to the ascending or descending
order in the record list, directly click the head of rank to achieve. Choose a
triangle symbol which is beside the field, according to ascending order to
arrange when the triangle symbol point upwards, otherwise that means the
sort order follow the descending order. You can click the triangle symbol to
change the rise or down rank.
3.2 Statistic
The software can automatically count the total record and count the
13
Table of contents
grouping record.
1. Import
This function enables the user to import many formats of user’s data
file.
This system support following format data to import: MS Excel, MS
Access, DBF, XML, Text File, CSV file. We recommend use the CSV file
to import, the following example which use CSV file to import user’s data
is used to illustrate how to import data.
(1) First click the button of CSV file, then select the file that want
to be import.
14
3. User Management
The left side list is a field list, the right side is import file rank, there
are Skip line(s) on the right-up part, that means want to skips amount of the
line, if the first line to be import isn’t material data, you can fill “1” here,
that show to skip the first line to import data.
UserID: The ID only is used in the system interior, it is useless to
import the fields, please don’t use the field.
BadgeNumber: User code, this code is that user adopts the number in
the FP Reader and the software.
Name: User name, these fields must exist.
VerificationMethod: The verification method of user. This item can
be neglected.
DefaultDeptID: Department ID. If you want to import the data from
other origin, this item can be neglected.
Gender: Males or Females.
Title: Title.
Photo: photo, can be neglected.
Privilege: Privilege, can be neglected.
Password: Password can be neglected.
15
Table of contents
16
3. User Management
(2) Click [Star Export] button to export the file via default format,
otherwise, can configure exporting content through to click the
different option card.
Fields: Select the field to be export, the default is all, it is only to
export field’s content after selected field.
Formats: Be exporting format of defined all kinds of field value.
Header & Footer: The file to start and to end of the text.
Caption & Width: The title and width of field.
Excel Options: Set font.
17
Table of contents
Upload: Based your need, select the staff and a uploading FP Reader,
click [Upload], it is able to upload user’s data to the defined FP Reader, it is
better to select [Fingerprint] and [User Face] in the normal condition. If
the information needs not to be modified, it is no need to choose it.
Notice: User’s data include user information, fingerprint and user face.
Delete: If you want to delete a user in a FP Reader, first choose user
and corresponding FP Reader, and then click [Delete] button.
Operation Log: That is an error log during operating process.
Batch: Utilize this function to speed up communication when a lot of
user’s data are uploaded, it isn’t need to a few users (such as less than 30
users).
2. From Device to PC: The user which is store in the FP Reader will
be downloaded to the local database, click [Form Device to PC], popup the
interface to download user’s data.
18
3. User Management
19
4. Device Management
4. Device Management
First add equipment, open [Device List] in the [Base Options] menu,
or click [Device Manage] shortcut on the main interface, and display the
interface as following.
20
4. Device Management
RS232/RS485 Communication:
Machine num: According to the Reader number to fill, for example
the FP Reader number is 1.
Port: Properly select the communication port to connect PC, the
default port is COM1.
Baud Rate: Select the same baud rate as the FP Reader. The default
value is 115200 at its original setup.
Communication key: It isn’t need to fill the pass word in the default
condition, if there is a setup password in the FP Reader, please input correct
password.
Machine Name: According to the purpose of equipment, input an
observable name.
Ethernet Communication:
21
Table of contents
22
4. Device Management
4.1 Communication
23
Table of contents
24
4. Device Management
4.3 Wiegand
25
Table of contents
Click [Read Options] can obtain all the wiegand parameters which
store in the reader.
Defined Format: This format has been defined and built in the system, it
isn’t need that user define the length of Bit and the location of information.
There are four default defined format: wiegand26 with device ID,
wiegand34 with device ID, wiegand26 without device ID, wiegand34
without device ID. The wiegand 26 with device ID means that the
wiegand26 output format along with equipment ID number. The wiegand26
without device ID point that the wiegand26 output format doesn’t own the
unit ID. Here the equipment ID is defined by following: If there is no set of
the site code, then it will output machine code. And if the site code has been
set, it will output the defined site code (which is similar to the machine
code, it is different that this code is defined by user and can recycle to use,
range is 0-255).
Fail ID: Export Fail ID after verified is fail, no export when it has not been
selected. Its output range is 0-65534.
Site Code: Similar to the machine code, which difference is that this code is
defined by user and can recycle to use in different unit, range is 0-255.
Self-define Format: User define Wiegand output format.
26
4. Device Management
4.4 Verification
27
Table of contents
28
4. Device Management
Firstly read the parameter of [Power], modify the state of [Idle Setup]
and minutes of [Idle Time], then click the [Set Options] to complete set.
When the idle time is 0, then the idle setup function is off. When the value
more than 0, the machine will enter into idle state after arrives at define
time. You can resume normal working state via press the button on the top
of reader.
29
Table of contents
30
4. Device Management
4.7 Mifare
Click [Read Options] in [Mifare] menu, display as following.
31
Table of contents
32
4. Device Management
You can use the Access Management software to set the U disk
configuration file. When the device is connected with U disk, it can execute
operations such as Record download, User download, Upload users and
Update firmware.
Using PC software to create and modify configuration files steps:
1. Click [U disk] in [Device manage] menu, enter the following
interface.
2. Select U disk from the down drop menu, click the [Read Options],
the interface display Record download, User download, User upload and
Update firmware four options.
33
Table of contents
3. Select the need for the operation, click [Set Options] button, the
system prompts “Operation finished”, as shown below.
Open the U disk you can see the configuration file named
operatemode.cfg.
The operation to execute the U disk configuration file please refer to
the related device user manual.
34
5. System Management
5. System Management
System Management includes Operator Management, System
Operation Log, Backup Database, Clear Obsolete Data, Initial System, Set
Password of Database and System Options.
35
Table of contents
The system operation Log is a track record which records this software
operation history, and utilize list mode to record all operation. Click
[Delete], this operation is available to delete operation log to the defined
previous date, appear following figure.
36
5. System Management
37
Table of contents
38
5. System Management
39
Table of contents
Click button, Can select the database file, the default name is
att200.mdb, according to real condition to renew setup of the database
connection.
2. SQL Server Database Connecting Setup
First you should establish the empty database on the database server.
You can find a script file with the name of sqlserver.sql in the directory of
installing CD. The empty database is established in the front of the searcher
of SQL Server, and then opens the sqlserver. Sql script files, to run database
which is to create this software.
In the Provider Select Microsoft OLE DB Provider for SQL Server,
click [Next] or [Connect] to enter this following.
40
5. System Management
Confirm the server name for storing this database, information for
logging on this serve, and the database name. After run test connection
successfully Click [OK] button to complete settings
User who need to encrypt this software database can utilize the
function encrypt the database, we strongly suggest user who uses access
database encrypt the database in order to ensure security, Please distinctly
keep in mind the password after set it.
appears.
42
5. System Management
43
Table of contents
After assigning privilege for user, along with uploading user the system
upload user privilege: Tick the box to confirm.
In downloading attendance records process, whether to add the user
when there is no local user: Tick the box to confirm.
Company Name: The unit name is used in the software.
Set Database connection:
Click [Set Database Connection], will popup the window of the defined
path database, please refer to 5.5 Set Database.
When start-up Windows, start-up this Program:
After select this item, when the PC start, the program will run automatically,
otherwise, when the PC start, the program will not run automatically.
44
6. Other Function
6. Other Function
Select the device and click [OK] to finish the download process. If you
select [After download Finish, Cancel device record], the system will delete
the device record when downloading complete.
45
Table of contents
If you want to clear the device record, please right click the device
icon, and click [Clear log], the system will prompt the dialog as below.
If the device has the older firmware, you can update the firmware by
right click the device, and click the [Update Firmware] button. After
updating, you need to restart the device. The prompt shown as follow.
46
6. Other Function
6.7 Property
Please right click the device, and click [Property] button in the prompt
dialog. Enter the [Device Manage] interface, the specific operation please
refer to 4. Device Management.
47
Table of contents
condition for filtrate. If you want to do classify query, you can drag the
head of rank to the table head area of query table, show as following.
48
7. Appendix
7. Appendix
The blue bar which locates line is current line in the datasheet. All
operation for datasheet is performed on the current line. Only black button
is operational, it can not operate when it is gray.
Click button, put it to corresponded operate.
: First, move from the current line to the first line.
: Previous, move from the current line to the previous line.
: Next, move from the current line to the next line.
: Last, move from the current line to the end line.
: Insert, add new record.
: Delete, cancel current record.
: Edit, enter edit status to modify record.
: Save, save the record to be edited.
: Cancel Edition, cancel modification for the record.
2. Filtrate Data
Filtrate data is that select the record which meet defined condition
from the original table sheet, the current display window is following, the
operation flow of the filtration data’s command.
(1) Click down drop menu of the data rank, appear following figure.
49
Table of contents
(3) Input condition, such as show all user who’s surname is H, appear
following figure.
50
7. Appendix
51
Table of contents
The system offer Fingerprint user, Card user, Card and fingerprint
multi-user verification.
to identify, the other way is verification fingerprint after waving card near
the properly place of the reader. The enroll process is that: Add User →
Input User Basic Information → Connect to FP Reader with ID Card →
Enroll Fingerprint → Wave Card → Save ID Number → Upload User
fingerprint and Information.
2. ID Card User Verification
There are two following verification models for ID card user.
A. Only verification ID card
User only need to wave the registered ID card near to the front of the
reader or place the finger on the sensor to match for verification, this
verification way is applied to the low security requirement area, but it is
easy to use, it is optimized for the officer site which own the high public
security system, reference [Verification] part of FP Reader user manual to
enroll user, the set process is that: Open [Equipment Manage] → Select to
be [Verification] → Click [Verification] → [Read Options] → Remark on
[Verification ID Card] item to [Yes] → [Apply Options].
Notice: There are only [Only verify ID card] and [Only 1:1 verify] to suit
ID card setup in the verification option, the [Register Mifare card only] is
just used for Mifare user. When you set to verify ID card, the [Only 1:1
verify] must be remarked as [NO], the [Register Mifare card only] is set
to read the default.
B. Only 1:1 verify
User must to wave the card near the front of the reader before place
the finger on the sensor to verify until it is positive answer. This verification
way is applied to the higher security requirement area. It is optimized for a
lot of user site, the set process is that: Open [Equipment Manage] → Click
[Verification] → [Read Options] → Remark on [Only verify ID card]
item and [Only 1:1 verify] item to [Yes] → [Apply Options].
We suggest adopt this verification method when the device store
53
Table of contents
fingerprint up 500, because the more fingerprint there are, the more slowly
is device matching speed, the FAR (False Acceptance Rate) will be much
more, the Only verify ID card can speed up to identify and keep away
fingerprint false acceptance.
54
7. Appendix
55