yeeka 1507 IoT Lock User Manual

June 6, 2024
yeeka

yeeka 1507 IoT Lock User Manual
yeeka 1507 IoT Lock

Preface

Thanks for choosing 1507 IoT lock. On behalf of Yeeka team, we thank you for your purchase. The instructions in this manual provide technicians with information on the installation, operation, and setting of the 1507 IoT lock. Please supervise inexperienced users to ensure pleasant and safe operation

Read and keep instructions

Please read and understand this manual before using the 1507 IoT lock. Retain all instructions for future reference and provide it to subsequent users of the product. And follow all instructions to avoid any hazards caused by improper operation.

The 1507 IoT lock is only applicable for those who have fully read and understood the contents of this manual to use. Make sure everyone who use the 1507 IoT lock have read these instructions and followed them. For product damage caused by incorrect operation, the warranty service will be invalid.

Support and Services

Maintain original purchase records to claim warranty services. Service options depend on the status of the IoT lock warranty. Please attach the serial name of the product when contacting yeeka for product support. All 1507 IoT lock have a serial name, which is a unique identifier used to track the history of manufacturing, sales, and maintenance.
The serial name is located on the back of the device in the following format: SN: 167777777.
The service provider of Yeeka products also provides technical support and services. If yeeka or a certified service provider provides extended warranty or other services, separate quotation terms may be used. For products purchased from certified service providers, please contact the original service provider for assistance before contacting yeeka. For any requests for support or services, including product information, technical assistance or explanatory assistance, please contact Yeeka or certified service provider.

Warranty

This product is provided with warranty service. Yeeka provides warranty for all Yeeka brand hardware. Unless otherwise expressly provided, the terms of service (including  warranty) constitute the entire agreement between you and yeeka, covering after-sales services and any products you purchase from yeeka, and supersede all prior or contemporaneous communications, proposals and agreements between you and yeeka, whether electronic, oral or handwritten. Please read the warranty instructions for more details of yeeka warranty service in your area.

Overview

Usage

The 1507 series intelligent lock is suitable for data center, which can solve the problem of authority management and data asset security. In addition, the intelligent lock can be controlled remotely and the temperature and humidity of cabinet can be remotely collected.

The access ways can be obtained through mechanical key, password, card, fingerprint, Bluetooth, remote management platform and mobile APP.

It can be used on a stand-alone basis, independently on a network, or connected to a carrier’s network.

Features

  1. Cabinet intelligent locks can implement functions such as diversified access ways, user authority management, query of lock operation records, and intelligent management of lock tasks.
  2. Adopt modular design, no special control unit and readers, integrated with password button, card readers, Bluetooth communication modules, fingerprint identification modules, RS485 communication modules.
  3. Driven by high reliability motor and adopted high stability hardware design to guarantee the stability and reliability of the product.
  4. High versatility of the cabinet. The lock is suitable for APC, Emerson, Vertiv, Eaton, Toten, Panduit, CPI and etc.
  5. The electronic lock can connect various intelligent PDU or control unit for remote communication and control.
  6. The appearance of the product is simple and elegant, easy to use and convenient to install and maintain.
System Architecture Diagram

System Architecture Diagram

Management Platform

Management Platform

Features

Monitor Center

  • Equipment information overview
  • Display lock status by color change
  • Real-time alarm alerts
  • Powerful search query function to get rapid positioning of the lock

Equipment Management

  • Set the lock area
  • Manage lock and control unit

User Management

  • User authority management
  • User department management

Task Management

  • Task dispatching

Records Query

  • Operation record query
  • Alarm record query

Data Analysis

  • Data analysis of unlocking
  • Data analysis of temperature and humidity
  • Data analysis of other sensors

IoT Lock instructions

Product appearance
Installation Diagram

Installation Diagram

Wiring Diagram

Wiring Diagram

Pin No Color Signal Definition Wire Gauge
1 Red 12V + UL2464/26AWG
2 Black GND
3 Yellow 485+
4 Green 485-
5 White DO+
6 Blue DO-
7 Orange lock status
8 Brown lock status
Functional schematic diagram

Password functional schematic diagram
Functional schematic diagram

Card read functional schematic diagram
Functional schematic diagram

Finger print functional schematic diagram
Functional schematic diagram

Lock back functional schematic diagram
Back
Lock back functional schematic diagram

**Head functional schematic diagram

**

Operation Instructions

Access way of Mechanical key:

Use the key to open the emergency cylinder in an emergency situation, and then lift the handle to unlock.

Access way of DO Remote Control:

The lock can be unlocked by connecting the two wires of the lock DO.

Access way of RS485 Remote Control:

The lock can be unlocked by issuing the unlock command to the two lines of the lock 485.

Access way of password:

Input the password in the area of password input; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of password authority, please refer to “Programming instructions”)

Access way of card read:

Read the authorized IC card in the area of card read; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of IC card authority, please refer to “Programming instructions”)

Access way of QR code:

Use the mobile APP to scan the QR code in the QR code recognition area of the lock and operate it on the mobile phone; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock.

Access way of finger print:

Read the authorized finger print in the area of card read; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of finger print authority, please refer to “Programming instructions”)

Programming instructions

Administrator: The administrator masters the “programming password” who can set the lock parameters, and issue the “password” and “card” to normal users.

Normal users: Normal users can unlock through “password”, “card”, “password + password” and “card + password”.
(Programming Password factory default:123456,replace below Enter with “#” for reference)

Entering programming mode process:

  1. Long pressing “1” key with sound prompt
  2. Entering Programming Password “#” with sound prompt

Password programming

Programming name Programming content Note
Add user password Long press 1 Programming Password #12 new password # User

password is 6 digits. The user can set multiple sets of passwords for unlocking. When users unlock through password, enter the “password” and press “#” to unlock
Delete user password| Long press 1 Programming Password #13 password #|
Set unlock time| Long press 1 Programming Password #16 XX #| XX refers to time, the time range is “01” seconds –

“99” seconds.

Set safety mode| Long press 1 Programming Password # 17 #| 1.  The default setting of safe mode is off. The first time setting is on-state, then the second time setting is off state. Cycle setting is available.

2.  When the security mode is turned on, another password must be verified after the password is successfully verified. After successful card verification, another set of passwords must be verified. password + password (no requirement for the sequence of two groups of passwords) card + password (card always before password) (two-factor authentication)

Delete all users| Long press 1 Programming Password # 21 #| This operation deletes all users card and password.
Change
Programming Password| Long press 1 Programming Password #90 New Programming Password #| The programming password is 6 digits. If users forget the programming password, they can long press the reset button to restore the factory settings.

Card read programming

Card read programming(when the handle has keypad)

Programming name Programming content Note
Add user card Long press 1 Programming Password #14 read the card # If users

need to add more than one user cards at a time, they can read the card continuously.
Delete user card| Long press 1 Programming Password #15 read the card #| If users need to delete multiple user cards at a time, they can read the card continuously.

Card read programming(when the handle has no keypad)

Restore factory

settings

| Long press “reset” button for 5 seconds| The programming password is restored to 123456, and the user information is cleared.
---|---|---
Add administrator card (when the handle has no keypad)| After leaving the factory, users shortly press the “fingerprint or card setting” button and then read a card.

The first card read is the administrator card.

| (Only one administrator card can be set, and normal user cards can be added by pressing keypad and administrator cards.) Clearing administrator card requires factory reset.
Add user card (when the handle has no keypad)| Read the administrator card → shortly press “fingerprint or card setting” button and read a new blank card| Add one card at a time
Delete user card (when the handle has no keypad)| Read the administrator card → long press “fingerprint or card setting” button and read the authorized card| Delete one card at a time

Fingerprint setting

Add finger print


| Shortly press the “fingerprint setting” button and then put your fingerprint in the authentication area for authentication| Release the fingerprint once after pressing for two seconds. The beep indicates that the fingerprint needs to be further authenticated. The successful beep indicate that the authentication is successful.
---|---|---

Controller instructions

Functional diagram

Functional diagram
Functional diagram

Operating instructions

Controller configuration

First, insert the interlock cable into the corresponding port of the controller successively, then insert the network cable into the Ethernet interface of the controller, and finally insert the power adapter connector into the power interface of the controller.

Lock C1-L1 corresponds to C1 Controller’s L1 port
Lock C1-L2 corresponds to C1 Controller’s L2 port
Lock C1-L3 corresponds to C1 Controller’s L3 port
Lock C1-L4 corresponds to C1 Controller’s L4 port
Remark: The meaning of C1-L1:Lock corresponds to C1 Controller’s L1 port.

Access unit indicator light

Red: The network is not connected.
Blue: During the network configuration, waiting about 10-20 seconds, which depending on the network conditions.
Green: The network connection is successful, the server connection is successful, and the lock can be operated.
Remark: If the network connection is failed, please check your network first and try to restart the power.

Platform operation

To login→Indoor model→List mode→Choice model→Unlock remotely
Platform operation
Platform operation

FCC Statement

Caution: The user is cautioned that changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.

This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

  • Reorient or relocate the receiving antenna.
  • Increase the separation between the equipment and receiver.
  • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
  • Consult the dealer or an experienced radio/TV technician for help.

FCC Radiation Exposure Statement

This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.

www.yeekaco.com

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals