yeeka 1507 IoT Lock User Manual
- June 6, 2024
- yeeka
Table of Contents
yeeka 1507 IoT Lock User Manual
Preface
Thanks for choosing 1507 IoT lock. On behalf of Yeeka team, we thank you for your purchase. The instructions in this manual provide technicians with information on the installation, operation, and setting of the 1507 IoT lock. Please supervise inexperienced users to ensure pleasant and safe operation
Read and keep instructions
Please read and understand this manual before using the 1507 IoT lock. Retain all instructions for future reference and provide it to subsequent users of the product. And follow all instructions to avoid any hazards caused by improper operation.
The 1507 IoT lock is only applicable for those who have fully read and understood the contents of this manual to use. Make sure everyone who use the 1507 IoT lock have read these instructions and followed them. For product damage caused by incorrect operation, the warranty service will be invalid.
Support and Services
Maintain original purchase records to claim warranty services. Service options
depend on the status of the IoT lock warranty. Please attach the serial name
of the product when contacting yeeka for product support. All 1507 IoT lock
have a serial name, which is a unique identifier used to track the history of
manufacturing, sales, and maintenance.
The serial name is located on the back of the device in the following format:
SN: 167777777.
The service provider of Yeeka products also provides technical support and
services. If yeeka or a certified service provider provides extended warranty
or other services, separate quotation terms may be used. For products
purchased from certified service providers, please contact the original
service provider for assistance before contacting yeeka. For any requests for
support or services, including product information, technical assistance or
explanatory assistance, please contact Yeeka or certified service provider.
Warranty
This product is provided with warranty service. Yeeka provides warranty for all Yeeka brand hardware. Unless otherwise expressly provided, the terms of service (including warranty) constitute the entire agreement between you and yeeka, covering after-sales services and any products you purchase from yeeka, and supersede all prior or contemporaneous communications, proposals and agreements between you and yeeka, whether electronic, oral or handwritten. Please read the warranty instructions for more details of yeeka warranty service in your area.
Overview
Usage
The 1507 series intelligent lock is suitable for data center, which can solve the problem of authority management and data asset security. In addition, the intelligent lock can be controlled remotely and the temperature and humidity of cabinet can be remotely collected.
The access ways can be obtained through mechanical key, password, card, fingerprint, Bluetooth, remote management platform and mobile APP.
It can be used on a stand-alone basis, independently on a network, or connected to a carrier’s network.
Features
- Cabinet intelligent locks can implement functions such as diversified access ways, user authority management, query of lock operation records, and intelligent management of lock tasks.
- Adopt modular design, no special control unit and readers, integrated with password button, card readers, Bluetooth communication modules, fingerprint identification modules, RS485 communication modules.
- Driven by high reliability motor and adopted high stability hardware design to guarantee the stability and reliability of the product.
- High versatility of the cabinet. The lock is suitable for APC, Emerson, Vertiv, Eaton, Toten, Panduit, CPI and etc.
- The electronic lock can connect various intelligent PDU or control unit for remote communication and control.
- The appearance of the product is simple and elegant, easy to use and convenient to install and maintain.
System Architecture Diagram
Management Platform
Features
Monitor Center
- Equipment information overview
- Display lock status by color change
- Real-time alarm alerts
- Powerful search query function to get rapid positioning of the lock
Equipment Management
- Set the lock area
- Manage lock and control unit
User Management
- User authority management
- User department management
Task Management
- Task dispatching
Records Query
- Operation record query
- Alarm record query
Data Analysis
- Data analysis of unlocking
- Data analysis of temperature and humidity
- Data analysis of other sensors
IoT Lock instructions
Product appearance
Installation Diagram
Wiring Diagram
Pin No | Color | Signal Definition | Wire Gauge |
---|---|---|---|
1 | Red | 12V + | UL2464/26AWG |
2 | Black | GND | |
3 | Yellow | 485+ | |
4 | Green | 485- | |
5 | White | DO+ | |
6 | Blue | DO- | |
7 | Orange | lock status | |
8 | Brown | lock status |
Functional schematic diagram
Password functional schematic diagram
Card read functional schematic diagram
Finger print functional schematic diagram
Lock back functional schematic diagram
Back
**Head functional schematic diagram
**
Operation Instructions
Access way of Mechanical key:
Use the key to open the emergency cylinder in an emergency situation, and then lift the handle to unlock.
Access way of DO Remote Control:
The lock can be unlocked by connecting the two wires of the lock DO.
Access way of RS485 Remote Control:
The lock can be unlocked by issuing the unlock command to the two lines of the lock 485.
Access way of password:
Input the password in the area of password input; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of password authority, please refer to “Programming instructions”)
Access way of card read:
Read the authorized IC card in the area of card read; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of IC card authority, please refer to “Programming instructions”)
Access way of QR code:
Use the mobile APP to scan the QR code in the QR code recognition area of the lock and operate it on the mobile phone; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock.
Access way of finger print:
Read the authorized finger print in the area of card read; at this moment the lock status LED turns from blue to green with blink and the buzzer sounds three times. When green of the lock status LED keeps on, then you can lift the handle and open the lock. (For the setting of finger print authority, please refer to “Programming instructions”)
Programming instructions
Administrator: The administrator masters the “programming password” who can set the lock parameters, and issue the “password” and “card” to normal users.
Normal users: Normal users can unlock through “password”, “card”, “password +
password” and “card + password”.
(Programming Password factory default:123456,replace below Enter with “#” for
reference)
Entering programming mode process:
- Long pressing “1” key with sound prompt
- Entering Programming Password “#” with sound prompt
Password programming
Programming name | Programming content | Note |
---|---|---|
Add user password | Long press 1 Programming Password #12 new password # | User |
password is 6 digits. The user can set multiple sets of passwords for
unlocking. When users unlock through password, enter the “password” and press
“#” to unlock
Delete user password| Long press 1 Programming Password #13 password #|
Set unlock time| Long press 1 Programming Password #16 XX #| XX refers to
time, the time range is “01” seconds –
“99” seconds.
Set safety mode| Long press 1 Programming Password # 17 #| 1. The default setting of safe mode is off. The first time setting is on-state, then the second time setting is off state. Cycle setting is available.
2. When the security mode is turned on, another password must be verified after the password is successfully verified. After successful card verification, another set of passwords must be verified. password + password (no requirement for the sequence of two groups of passwords) card + password (card always before password) (two-factor authentication)
Delete all users| Long press 1 Programming Password # 21 #| This
operation deletes all users card and password.
Change
Programming Password| Long press 1 Programming Password #90 New
Programming Password #| The programming password is 6 digits. If users
forget the programming password, they can long press the reset button to
restore the factory settings.
Card read programming
Card read programming(when the handle has keypad)
Programming name | Programming content | Note |
---|---|---|
Add user card | Long press 1 Programming Password #14 read the card # | If users |
need to add more than one user cards at a time, they can read the card
continuously.
Delete user card| Long press 1 Programming Password #15 read the card #| If
users need to delete multiple user cards at a time, they can read the card
continuously.
Card read programming(when the handle has no keypad)
Restore factory
settings
| Long press “reset” button for 5 seconds| The programming password is
restored to 123456, and the user information is cleared.
---|---|---
Add administrator card (when the handle has no keypad)| After leaving the
factory, users shortly press the “fingerprint or card setting” button and then
read a card.
The first card read is the administrator card.
| (Only one administrator card can be set, and normal user cards can be added
by pressing keypad and administrator cards.) Clearing administrator card
requires factory reset.
Add user card (when the handle has no keypad)| Read the administrator card →
shortly press “fingerprint or card setting” button and read a new blank card|
Add one card at a time
Delete user card (when the handle has no keypad)| Read the administrator card
→ long press “fingerprint or card setting” button and read the authorized
card| Delete one card at a time
Fingerprint setting
Add finger print
| Shortly press the “fingerprint setting” button and then put your fingerprint
in the authentication area for authentication| Release the fingerprint once
after pressing for two seconds. The beep indicates that the fingerprint needs
to be further authenticated. The successful beep indicate that the
authentication is successful.
---|---|---
Controller instructions
Functional diagram
Operating instructions
Controller configuration
First, insert the interlock cable into the corresponding port of the controller successively, then insert the network cable into the Ethernet interface of the controller, and finally insert the power adapter connector into the power interface of the controller.
Lock C1-L1 corresponds to C1 Controller’s L1 port
Lock C1-L2 corresponds to C1 Controller’s L2 port
Lock C1-L3 corresponds to C1 Controller’s L3 port
Lock C1-L4 corresponds to C1 Controller’s L4 port
Remark: The meaning of C1-L1:Lock corresponds to C1 Controller’s L1 port.
Access unit indicator light
Red: The network is not connected.
Blue: During the network configuration, waiting about 10-20 seconds,
which depending on the network conditions.
Green: The network connection is successful, the server connection is
successful, and the lock can be operated.
Remark: If the network connection is failed, please check your network
first and try to restart the power.
Platform operation
To login→Indoor model→List mode→Choice model→Unlock remotely
FCC Statement
Caution: The user is cautioned that changes or modifications not
expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>