Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control Terminal User Guide

June 6, 2024
Zhejiang Uniview Technologies

Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control Terminal
User Guide

Packing List

The attachments may vary with models, please see the actual model for details.

No. Name Qty Unit
1 Face recognition access control terminal 1 PCS
2 Screw component 2 Set
3 Bracket 1 PCS
4 Installation sticker 1 PCS
5 20-pin cable 1 PCS
6 10-pin terminal 1 PCS
7 2-pin power cable 1 PCS
8 User manual 1 PCS

Product Overview

The face recognition access control terminal features high performance and high reliability. It perfectly integrates our company face recognition technology and
supports face scanning-based verification and door opening, thereby implementing accurate control of personnel access. The product is highlighted by its high recognition rate, large storage capacity, and fast recognition. It can be widely applied in building systems in smart communities, campuses, and other similar scenes.

Appearance and Dimension

The actual device appearance shall prevail. The figure below shows the dimension of the device.

Structure Description

The figure below shows the structure of the device. The actual device shall prevail.

1. Light supplement lamp 2. Infrared illuminator
3. Camera 4. Display screen
5. Card reading area 6. Reboot button
7. Microphone 8. Tamper proof button
9. 20-pin interface 10. Network interface
11. Loudspeaker

Device Installation

Installation Environment

Try to avoid intense direct light and intense backlighting scenes when installing the device. Please keep the ambient light bright.

Tools Preparations
  • Phillips screwdriver
  • Antistatic wrist strap or antistatic gloves
  • Drill
  • Tape measure
  • Marker
  • Plenty of silicone rubber
  • Silicone gun
Device Wiring
  1. Wiring Embedding
    Before installing the face recognition access control terminal, plan the layout of cables, including the power cable, network cable, door lock cable, alarm cable, and RS485 cable. The number of cables depends on the actual networking conditions.  For details, see Wiring Description.

  2. Wiring Description
    The figures below show the wiring between the access control terminal and different devices. For the wiring terminal of each device, see the operation manual of the device or consult related manufacturers.

NOTE!
In the wiring schematic diagrams, input devices and output devices are defined as follows:

  • Input devices refer to devices that send signals to the access control terminal.
  • Output devices refer to devices that receive output signals from the access control terminal.

Figure 3-1 Wiring Schematic Diagrams (without Security Module)

Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control
Terminal - Device Wiring

NOTE!
You can also connect alarm output devices as follows :

Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control
Terminal - Device Wiring 2

The face recognition access control terminal can be also connected to a security module. The figure below shows the wiring of the security module.
Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control
Terminal - Device Wiring 3

Installation Steps

*With an 8686mm junction box**

1. Determine the position of the 8686mm wall-mounted junction box.
This installation mode embeds an 86
86mm junction box in the wall in
advance or make a hole on the wall to embed the box.Zhejiang Uniview
Technologies 0235C5R4 Face Recognition Access Control Terminal - Installation
Steps NOTE!
There are two installation holes on the 8686mm wall-mounted junction box.
They can be parallel to the ground or vertical to the ground. They need to map to intermediate holes on the bracket during the actual installation.| 2. Align the installation sticker with the 86
86mm junction box and align the two holes B with the two installation
holes on the 8686mm junction box. Determine the positions of installation holes on the wall based on the two holes A.
---|---
3. Use a drill to drill two holes with a depth of 30mm and a diameter of 6mm to 6.5mm on the wall.Zhejiang Uniview Technologies 0235C5R4 Face Recognition
Access Control Terminal - Installation Steps 3 CAUTION!
Avoid embedded wires in the wall during drilling!| 4. Embed expansion bolts inside the two installation holes on the wall.
5. Align holes on the bracket with installation holes on the wall and the the86
86mm wall-mounted junction box and use the Phillips screwdriver to to tighten the screws clockwise to fasten the bracket.| 6. Fasten the access control terminal to the bracket hook.
7. At the bottom of the device, use the wrench to tighten the fastening screws clockwise. |

*Without an 8686mm junction box**

1. Determine the position of installation holes on the wall based on the reference line and hole A on the installation sticker.| 2. Use a drill to drill three holes with a depth of 30mm and  diameter of 6mm to 6.5mm on the wall. CAUTION!
Avoid embedded wires in the wall during drilling!
---|---
3. Embed expansion bolts inside the three installation holes on the wall.| 4. Attach the bracket to the wall with its holes aligned with the installation
holes, and then rotate the screws clockwise using a Phillips screwdriver
to fasten the bracket.
5. Refer to steps 6-7 in With an 86*86mm junction box section to complete installation.

Device Startup

After the device is installed correctly, connect one end of the power adapter (purchased or prepared) to the mains supply and the other end to the power interface of the face recognition access control terminal, and then start the device. The display screen of the outdoor monitor is energized and lights up, and the live view is displayed on the screen, indicating that the device is started successfully.

Web Login

You can log in to the Web page of the access control terminal to manage and maintain the device. For detailed operations, see the Face Recognition Access Control Terminal User Manual.

  1. On a client PC, open the Internet Explorer (IE9 or later), enter the IP address of the device 192.168.1.13 into the address bar, and press Enter.
  2. In the login dialog box, enter the username (admin by default) and password (123456 by default), and click Login to access the Web page.

NOTE!

  • DHCP is enabled by default. If a DHCP server is used in the network environment, an IP address may be dynamically assigned to the device. Log in with the actual IP address.

  • At initial login, the system will prompt you to install a plugin. Close all browsers when installing the plugin. Follow instructions on the page to complete the plugin installation, and then restart the Internet Explorer to log in to the system.

  • The default password of this product is used only for initial login. You are required to change the default password after the initial login to ensure security.
    Set a strong password of at least nine characters including all three elements: digits, letters, and special characters.

  • If the password has been changed, use the new password to log in to the Web interface.

Personnel Management

The face recognition access control terminal supports personnel management on the Web interface and GUI interface.

  • Personnel management on the Web interface
    On the Web interface, you can add persons (one by one or in batches), modify personal information, or delete persons (one by one or together). The detailed operations are described as follows:
    1. Log in to the Web interface.
    2. Choose Setup > Intelligent > Face Library to go to the Face Library interface, on which you can manage personnel information. For detailed operations, see the Face Recognition Access Control Terminal User Manual.

  • Personnel management on the GUI
    1. Tap and hold the main interface of the face recognition ac cess control terminal (for more than 3s).
    2. On the displayed password input interface, enter the correct activation password to go to the Activation Config interface.
    3. On the Activation Config interface, click User Management. On the displayed User Management interface, input personnel information. For detailed operations, see the Face Recognition Access Control Terminal User Manual.

Appendix

Face Recognition Precautions
Face Photo Collection Requirements

  • General requirement: bareheaded full-face photo, with the front side facing the camera.
  • Range requirement: The photo should show the outline of a person’s both ears and cover the range from the top of the head (including all hair) to the bottom of the neck.
  • Color requirement: true-color photo.
  • Makeup requirement: There should be no cosmetic color that affects the true appearance during collection, such as eyebrow makeup and eyelash makeup.
  • Background requirement: The white, blue, or other pure color background is acceptable.
  • Light requirement: Light with appropriate brightness is required during collection. Too dark photos, too bright photos, and light- and dark-colored face photos should be avoided.

Face Match Position

The figure below shows the correct face match position.

Figure 7-1 Face Match Position

Zhejiang Uniview Technologies 0235C5R4 Face Recognition Access Control
Terminal - Face Match Position

NOTE!
The face match position should be within the recognizable range shown in the figure. If the face match fails in area 1 shown in the figure, move backward. If face the match fails in area 2 shown in the figure, move forward.

 Face Match Posture
  1. Facial Expression
    To ensure the accuracy of the face match, keep natural expression during the match (as shown in the figure below).
    Figure 7-2 Correct Expression

  2. Fascial Posture
    To ensure the accuracy of the face match, keep the face facing the recognition window during the match. Avoid the head to one side, side face, head too high, head too low, and other incorrect postures.
    Figure 7-3 Correct and Incorrect PosturesZhejiang Uniview Technologies
0235C5R4 Face Recognition Access Control Terminal - Incorrect
Postures

Disclaimer and Safety Warnings

Copyright Statement
No part of this manual may be copied, reproduced, translated or distributed in any form by any means without prior content in writing from our company (referred to as us hereafter). The product described in this manual may contain proprietary software owned by our company and its possible licensors. Unless permitted, no one is allowed to copy, distribute, modify, abstract, decompile, disassemble, decrypt, reverse engineer, rent, transfer, or sublicense the Software in any form by any means.
Export Compliance Statement
Our company complies with applicable export control laws and regulations worldwide, including that of the People’s Republic of China and the United States, and abides by relevant regulations relating to the export, re-export, and transfer of hardware, software, and technology. Regarding the product described in this manual, our company asks you to fully understand and strictly abide by the applicable export laws and regulations worldwide.
Privacy Protection Reminder
Our company complies with appropriate privacy protection laws and is committed to protecting user privacy. You may want to read our full privacy policy at our website and get to know the ways we process your personal information. Please be aware, using the product described in this manual may involve the collection of personal information such as the face, fingerprint, license plate number, email, phone number, GPS. Please abide by your local laws and regulations while using the product.
About This Manual

  • This manual is intended for multiple product models, and the photos, illustrations, descriptions, etc, in this manual may be different from the actual appearances, functions, features, etc, of the product.
  • This manual is intended for multiple software versions, and the illustrations and descriptions in this manual may be different from the actual GUI and functions of the software.
  • Despite our best efforts, technical or typographical errors may exist in this manual. Our company cannot be held responsible for any such errors and reserves the right to change the manual without prior notice.
  • Users are fully responsible for the damages and losses that arise due to improper operation.
  • Our company reserves the right to change any information in this manual without any prior notice or indication. Due to such reasons as product version upgrades or regulatory requirements of relevant regions, this manual will be periodically updated.

Disclaimer of Liability

  • To the extent allowed by applicable law, in no event will our company be liable for any special, incidental, indirect, consequential damages, nor for any loss of profits, data, and documents.
  • The product described in this manual is provided on an “as is” basis. Unless required by applicable law, this manual is only for informational purpose, and all statements, information, and recommendations in this manual are presented without warranty of any kind, expressed or implied, including, but not limited to, merchantability, satisfaction with quality, fitness for a particular purpose, and non-infringement.
  • Users must assume total responsibility and all risks for connecting the product to the Internet, including, but not limited to, network attack, hacking, and virus. We strongly recommend that users take all necessary measures to enhance the protection of network, device, data, and personal information. Our company disclaims any liability related thereto but will readily provide necessary security-related support.
  • To the extent not prohibited by applicable law, in no event will our company and its employees, licensors, subsidiary, affiliates are liable for results arising out of using or inability to use the product or service, including, not limited to, loss of profits and any other commercial damages or losses, loss of data,  procurement of substitute goods or services; property damage, personal injury, business interruption, loss of business information, or any special, direct, indirect, incidental, consequential, pecuniary, coverage, exemplary, subsidiary losses, however, caused and on any theory of liability, whether in contract, strict liability or tort (including negligence or otherwise) in any way out of the use of the product, even if our company has been advised of the possibility of such damages (other than as may be required by applicable law in cases involving personal injury, incidental or subsidiary damage).
  • To the extent allowed by applicable law, in no event shall our total liability to you for all damages for the product described in this manual (other than as may be required by applicable law in cases involving personal injury) exceed the amount of money that you have paid for the product.
Network Security

Please take all necessary measures to enhance network security for your device.
The following are necessary measures for the network security of your device:

  • Change the default password and set a strong password: You are strongly recommended to change the default password after your first login and set a strong password of at least nine characters including all three elements: digits, letters, and special characters.

  • Keep firmware up to date: It is recommended that your device is always upgraded to the latest version for the latest functions and better security. Visit our official website or contact your local dealer for the latest firmware.
    The following are recommendations for enhancing the network security of your device:

  • Change the password regularly: Change your device password on a regular basis and keep the password safe. Make sure only the authorized user can log in to the device.

  • Enable HTTPS/SSL: Use an SSL certificate to encrypt HTTP communications and ensure data security.

  • Enable IP address filtering: Allow access only from the specified IP addresses.

  • Minimum port mapping: Configure your router or firewall to open a minimum set of ports to the WAN and keep only the necessary port mappings. Never set the device as the DMZ host or configure a full cone NAT.

  • Disable the automatic login and save password features: If multiple users have access to your computer, it is recommended that you disable these features to prevent unauthorized access.

  • Choose Username and password discretely: Avoid using the username and password of your social media, bank, email account, etc, as the username and password of your device, in case your social media, bank, and email account information is leaked.

  • Restrict user permissions: If more than one user needs access to your system, make sure each user is granted only the necessary permissions.

  • Disable UPnP: When UPnP is enabled, the router will automatically map internal ports, and the system will automatically forward port data, which results in the risks of data leakage. Therefore, it is recommended to disable UPnP if HTTP and TCP port mapping have been enabled manually on your router.

  • SNMP: Disable SNMP if you do not use it. If you do use it, then SNMPv3 is recommended.

  • Multicast: Multicast is intended to transmit video to multiple devices. If you do not use this function, it is recommended you disable multicast on your network.

  • Check logs: Check your device logs regularly to detect unauthorized access or abnormal operations.

  • Physical protection: Keep the device in a locked room or cabinet to prevent unauthorized physical access.

  • Isolate video surveillance network: Isolating your video surveillance network with other service networks helps prevent unauthorized access to devices in your security system from other service networks.

Safety Warnings

The device must be installed, serviced, and maintained by a trained professional with the necessary safety knowledge and skills. Before you start using the device, please read through this guide carefully and make sure all applicable requirements are met to avoid danger and loss of property.
Storage, Transportation, and Use

  • Store or use the device in a proper environment that meets environmental requirements, including and not limited to, temperature, humidity, dust, corrosive gases, electromagnetic radiation, etc.
  • Make sure the device is securely installed or placed on a flat surface to prevent falling.
  • Unless otherwise specified, do not stack devices.
  • Ensure good ventilation in the operating environment. Do not cover the vents on the device. Allow adequate space for ventilation.
  • Protect the device from the liquid of any kind.
  • Make sure the power supply provides a stable voltage that meets the power requirements of the device. Make sure the power supply’s output power exceeds the total maximum power of all the connected devices.
  • Verify that the device is properly installed before connecting it to power.
  • Do not remove the seal from the device body without consulting our company first. Do not attempt to service the product yourself. Contact a trained professional for maintenance.
  • Always disconnect the device from power before attempting to move the device.
  • Take proper waterproof measures in accordance with requirements before using the device outdoors.

Power Requirements

  • Installation and use of the device must be in strict accordance with your local electrical safety regulations.
  • Use a UL-certified power supply that meets LPS requirements if an adapter is used.
  • Use the recommended cordset (power cord) in accordance with the specified ratings.
  • Only use the power adapter supplied with your device.
  • Use a mains socket outlet with a protective earthing (grounding) connection.
  • Ground your device properly if the device is intended to be grounded.

Battery Use Caution

  • When the battery is used, avoid:
  • High or low extreme temperatures during use, storage, and transportation;
  • Extremely low air pressure, or low air pressure at high altitude;
  • Battery replacement.
  • Use the battery properly. Improper use of the battery such as the following may cause risks of fire, explosion, or leakage of flammable liquid or gas.
  • Replace the battery with an incorrect type;
  • Dispose of a battery into fire or a hot oven, or mechanically crushing or cutting of a battery;
  • Dispose of the used battery according to your local regulations or the battery manufacturer’s instructions.

Personal safety warnings:

  • Chemical Burn Hazard. This product contains a coin cell battery. Do not ingest the battery. If the coin cell battery is swallowed, it can cause severe internal burns in just 2 hours and can lead to death.
  • Keep new and used batteries away from children.
  • If the battery compartment does not close securely, stop using the product and keep it away from children.
  • If you think batteries might have been swallowed or placed inside any part of the body, seek immediate medical attention.

Regulatory Compliance

FCC Statements
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Caution: The user is cautioned that changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

  • Reorient or relocate the receiving antenna.
  • Increase the separation between the equipment and receiver.
  • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
  • Consult the dealer or an experienced radio/TV technician for help.

IC Statements
This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions:

  • This device may not cause interference, and
  • This device must accept any interference, including interference that may cause undesired operation of the device.

LVD/EMC Directive
This product complies with the European Low Voltage Directive 2014/35/EU and EMC Directive 2014/30/EU.
WEEE Directive–2012/19/EU
The product this manual refers to is covered by the Waste Electrical & Electronic Equipment (WEEE) Directive and must be disposed of in a responsible manner.
Battery Directive-2013/56/EC
The battery in the product complies with the European Battery Directive
2013/56/EC. For proper recycling, return the battery to your supplier or to a designated collection point.

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Zhejiang Uniview Technologies User Manuals

Related Manuals