Electric plug lock installation steps diagram cathode lock installation steps diagram magnetic lock installation steps diagram electric plug lock use common sense cathode lock use common sense magnetic lock use common sense door clip installation accessories diagram electric plug lock installation animation
[Access Control Function] [Basic Function]
[232-485 or TCP / IP network communication method]
1. 20,000 registration card permissions: Each controller has the right to 20,000 registration cards.
2. 100,000 offline storage records: 100,000 punch-in records can be stored offline, and each record contains complete information such as whether the card number passed the time and place. If the storage is full, the oldest information will be squeezed out in a stack, and the latest information will be saved. If the button information recording and alarm recording functions are enabled, these will also be counted as recording information. If not enabled, only the card swiping information will be recorded.
3. Flexible permission management: You can set which doors a certain person can pass through, or a certain person can pass through all the doors. You can also set which doors some people can pass through. The setting result can be arranged by door or by person, and the user can clearly see who can pass through a door, or which door a person can pass through. At a glance, and can be printed or exported to Excel reports.
4. Time period authority management function: You can set a certain person to a certain door, the day of the week can enter the door, three to several times a day can enter the door.
5. Offline operation: After uploading through software settings, the controller will remember all permissions and record all information. Even if the computer software and computer are closed, the system can still operate normally and normally, even if the power is off, it will never be lost.
6. Real-time monitoring photo display Door status display: You can monitor the card swipe status and the entrance and exit status in real time. You can also display the photos stored in the computer by the card swiper in real time for the security personnel to check with me. If the door magnetic signal line is connected, users can see at a glance which doors are open and which doors are closed.
7. Real-time extraction: The user can automatically retrieve the records in the controller while real-time monitoring, and upload one to the computer database.
8. Forced door closing: If some doors need to be opened for a long time, you can set them to be normally open by software. If some doors need to be closed for a long time and you don't want anyone to enter, you can set it to be normally closed.
9. Remote door opening function: After receiving the instruction, the administrator can click a "remote door opening" button on the software interface to open a door remotely. The remote door opening record can also be formed by setting.
10. Interface lock function: The operator has to leave the job temporarily to lock the interface. The background software continues to run and monitor. Others cannot take advantage of the opportunity to operate the software. After the operator returns, enter the password and return to the software operation interface.
11. Time period link function: If the customer requires more than three time periods per day (from a few minutes to a few minutes to enter), the time period link can be used to expand to six or nine or even more.
12, a small number of permissions to modify the separate upload function: If the user just adds a few or modify the permissions of several people, there is no need to upload all permissions again, the added and modified permissions can be uploaded separately, without much time. The report is the same.
13. Quick query of the number of people in the door: You can query how many people are in a door or in an area (with several doors), and display the list of people in this area. For example: for company management, the boss or the personnel department can quickly know how many people have come to work in the company. If it is abnormal, you can immediately do an attendance statistics and check the personnel who violate the discipline. For example: some companies have meals, you can quickly know how many people are working in the company, you can notify the number of people to the cafeteria, how many people cook, and avoid waste.
14. Personnel quick location query: You can quickly find out where a person is now and how long he has stayed there. It is used by some large companies, because of confidentiality, it is not allowed to turn on the mobile phone, or the mobile phone cannot be contacted, so you can know where he is in the building and find him.
[Access Control Function] [Extended Function]
1. Card + password function: If you use a card reader with a password keyboard, the system will have a card + password function. That is, the door can be set to require the user to enter the correct password after swiping the card, and the door is opened only after the card and password are correct. One card and one password, that is, everyone has their own password. This function can prevent someone from picking up a card to open the door, or stealing a colleague's card to open the door to do things that are not done. For the same door, some people can set the card + password required by some people, and some people only need to swipe the card to enter. The password can be 1 to 6 digits.
2. Manually enter the card number + password to open the door: If the user enables this function, there is no need to bring a card, just enter * card number * password # to open the door and store the access record.
3. Super password function: Each door can be set up to 4 passwords, that is, as long as you enter any of these passwords, you can open the door, the system does not record the event and the person who pressed the password.
4, linkage output function: If the controller is connected to the alarm output and fire linkage expansion board, it will be able to drive another relay to act simultaneously when the door is legally opened, to control more equipment. The action time of the linkage relay can be set from 0 to 600 seconds.
5. Illegal break-in alarm: also called forcible door opening alarm. That is, the door was not forcibly opened or entered through a legal method (swipe button, etc.). The system software monitoring interface will prompt the time and location of the alarm information in red, and drive the computer speakers to remind the staff on duty. If the controller is connected to the alarm output and fire-fighting expansion board, it can also drive the alarm on the spot to scream, deter criminals and remind security guards to come. This function needs to install door sensor or select electric lock with door sensor feedback signal output and connect it to the controller.
6. The door has not been closed for a long time: the door has been opened for a long time (how many seconds is it to open the alarm, this time can be customized) Forgot to close the door, the system software monitoring interface will prompt the time and location of the alarm message with red, and drive the computer The speaker reminds the attendant to pay attention. If an external alarm output and fire-fighting expansion board are connected externally, the alarm can be driven on site to remind the relevant personnel to close the door. This function needs to install door sensor or select electric lock with door sensor feedback signal output and connect it to the controller. It can be set for how many seconds the alarm is issued or until the alarm is reset.
7. Duress alarm: When a staff member is threatened to open the door, the staff member can enter a duress password on the password keyboard, and the door is opened, and the staff member's body will not be harmed by the shameful and angry gangster. The software monitoring interface has shown that there is an alarm message for the door to be forced to open and take measures. At the same time, the computer speaker in the control center will issue an alarm sound to remind the staff on duty to pay attention in time. This function is much used in the halls of savings houses, bank vaults and other occasions.
8. Illegal card swipe alarm: Also called invalid card swipe alarm. That is, if someone attempts to swipe the card with an unauthorized card, the system will give a red alert on the monitoring software interface, and drive the computer speaker to remind the staff on duty. If an external alarm output and a fire-fighting expansion board are connected externally, the alarm can be driven on site to deter people with bad intentions on the scene and remind security guards to come.
9. Anti-passback anti-tracking function: In some specific occasions, cardholders must swipe out from a door when they swipe in from a certain door, and the swipe records must be strictly in and out. When entering the door without swiping the card, following others in, the system will not allow him to go out when swiping the card. If he does not swipe the card, following the others, he will not be allowed to enter next time. Or after someone swipes the card in, throws the card to another person through the window and tries to come in, the system will also refuse that person to swipe in. This function can be realized if the user set to enable this function. This function is generally used in the military, national defense research and other occasions. Our system can only achieve anti-passback inside the door, that is, swipe in from this door, and must swipe out from this door, and cannot swipe in from this door, and swipe out from another door. It is also possible to perform anti-passback in the controller, such as a two-door controller, from any one of the two doors, and exit from any one. It can also be used for a four-door controller, which specifies which door and which doors are anti-passback to each other. It is used in some exhibition venues, which requires entering from a designated door and exiting from a designated door.
10. Interlocking: In some special occasions, before one door is closed, the other door is not allowed to enter. Two-door controller can realize two-door interlock, four-door controller can realize two-door interlock, three-door interlock, and four-door interlock. This function is mainly used in strict occasions such as bank depository vaults.
11. Multi-card door opening: There are certain occasions where this function needs to be enabled, that is, several people are required to be present at the same time, and the card door is opened in turn. Someone could not swipe the card when he came alone. This function is generally used in museums such as bank vault antique collection sites. The system can be set to enter the door with multiple cards and go out with a single card to open the door, or it can be set to enter the door with multiple cards and go out with multiple cards.
12, timing often open the door timing regularly closed function: This function is also called the timing task function. Some foreign administrative offices such as the embassy of the Office of the Civil Affairs Bureau. It is required that the door be opened during working hours during the day, and people who come to work outside can come in and out freely. After work at night, they are required to swipe their cards to allow entry and exit. Outsiders are not allowed to enter. Late at night, the door remained closed, and employees inside the unit were not allowed to go out. You can enable this function to achieve. For example: Set the door to be normally open at 8:30 in the morning and always closed at 12:00 in the morning at 18:30 in the evening. This function can be set for a certain door or all doors. Each controller can set up to 64 timing tasks. This function can be run offline.
13. Record button opening event: Enable this function to record when the button has been opened by someone.
14. Timing extraction record function: You can set the computer program to automatically extract the records in the controller. You can set multiple times for extracting records in a day. This function requires the computer and software to be running at the time.
15. Timing upload permission function: As the upload permission, the controller cannot judge the current and legality of the card permission, and it needs to be uploaded before it is judged. Therefore, if there is a large number of upload permissions, the controller will not allow the upload permission for a short time The card passes, so using the regular upload permission function can make the system automatically upload when the night is quiet and no one uses the access control. Functionality requires the computer and software to be running at the time.
16. You can directly switch to the community management interface: You can switch from the office management interface to the community management interface through the settings in the options. The name of the original "department team" in the corresponding interface is automatically changed to "building number", etc. Fully meet the personalized interface requirements and name matching of the community management.
17. Emergency door closing function: In some occasions, it is called “emergency double-close function”. This function does not require software setting. You only need to connect the emergency switch to the specific connection point of the controller. When an emergency occurs, press the emergency switch and the controller All the doors under its jurisdiction are closed, and the buttons cannot be locked by pressing the button and swiping the card. Used for "close the door to catch thieves" and other occasions. Unplug the emergency switch system to resume normal operation.
18. Operator sub-department management functions: Some companies require sub-departments to manage access control and attendance, and operators of their own departments manage the door and authority of their own departments. Senior administrators can manage doors and people across the company.
19. Video access control function (take photos and videos after swiping card and button): If the access control system is equipped with micro-farming video access control accessories, you can automatically take photos and 3 seconds of video after swiping the card or button to open the door, which is convenient for checking whether The card holder himself came to open the door with the card. Recording photos and videos is convenient for inquiries afterwards, and it is also possible to monitor the video scene of several doors in real time. This function requires the computer to be running and running the software's video surveillance interface.
20. Electronic map function: The icon of the door can be placed at a certain position on the corresponding map, and the display is more intuitive and user-friendly during real-time monitoring.
21. Swipe the card to open and close the door: Swipe the legal card, the relay is on, and the relay is off.
For example, the audio-visual classrooms and projectors of some schools are not allowed to be used casually. A legitimate teacher swipes the card and supplies power to the projector through a relay. After class, swipe the card again to turn off the power. Others cannot use it.
22. First door opening: For example, a company requires that several of the companies designated by the company have the first door opening authority. Only those who have the first door opening authority in the morning swipe the card, and other people can legally enter, or keep the door open until the door is on time at night. Close. After setting this function, if the person who has the first card door opening authority does not come, other legal cards cannot enter, you must wait for someone who has the first card door opening authority to come.
[Attendance function] [Normal attendance management function]
1. Flexible commuting time setting: You can set a few minutes late to work, not to be late, to adapt to the inconsistency of the schedule of each employee, or the company's humanization rules can be a little late, and if strict requirements can be set to 0, that is not allowed One second late.
2. You can set statutory or custom holidays, and the processing function of National Day holiday: you can set holidays such as May Day New Year's Day, or you can define your own. For example, "factory's day", etc., completely intelligently solve the problem of attendance setting for long holidays such as National Day. National Day long holiday is a policy implemented in China in recent years. The government will transfer a Saturday and Sunday before National Day to rest together with National Day holiday Holidays, and find a similar Saturday and Sunday to make up for work. Many software can not manage the attendance of this special situation and form a loophole in attendance.
3. Define punishment measures: for example, how many minutes are late for leave and early leave count as absenteeism.
4. Some gates can be designated for time and attendance: some points can be designated for time and attendance, and some points are only disabled for gates to avoid overly complicated or impure attendance data.
5. You can set the number of punches per day: you can set the requirements to punch 2 or 4 times per day according to the regulations.
6. You can flexibly set the attendance settings on Saturdays: you can set Saturdays and Sundays to rest, Saturdays to work and Sundays to rest, Saturdays and Sundays to rest and so on.
7. You can enter the leave form to flexibly increase and customize the holiday name: You can enter vacations such as leave, sick leave, and annual vacation.
8. Manual sign-in can be legally performed: if an employee fails to check in or is late for special legal reasons, the personnel department can sign in according to the sign-in notice issued by the department head.
9, detailed attendance report: you can check the list and print or export to EXCEL, daily attendance details of employees, whether they are late for work, etc. You can choose from several months to several months to check the detailed attendance by the department team and individual, or you can only query the abnormal attendance, such as only the late attendance details.
10. Detailed summary attendance report: list query and print, or output to EXCEL, monthly attendance summary report of employees, or time attendance summary for a certain period of time (easy to handle the attendance summary of employees who left midway to the financial department), can be divided into The department team or individual attendance summary can count how many minutes are late, how late, how early, how many minutes are early, how many hours are overtime, how many hours are absent, how many days are not swiped, how many times are signed in, how many days are on business, how many days are on vacation, how many days are on sick days, and how many days are sick. Because there are many items to print, you can choose to print in landscape or portrait.
11. The report format can be customized: you can select the width order of the items to be printed and save it, so that you can use the format next time.
Some people can be set up for attendance, and some people don't need to be on time: for example, some special positions such as general manager or positions that need to go out frequently, this part of the employees can not be punched out, the software can set them to not attend attendance, and the report can be blocked Show the attendance records of these people.
[Attendance function] [Multi-shift shift attendance management function]
1. You can set up 99 shifts: in addition to normal shifts, you can set up 99 shifts.
2, support for night shifts: the commute time is set at 0:00 to cross the night.
3. Support batch scheduling according to the scheduling rule of the scheduling cycle: The scheduling cycle can be customized, and the system will automatically schedule the designated time range according to the scheduling rule. Scheduling can be divided into departments and groups and individuals, and you can manually modify the shift of a certain day manually.
4. You can set the number of punches for each shift: each shift can be set to punch 2 punches 4 punches 6 punches 8 punches. You can define whether this shift is used for overtime.
5. You can calculate overtime for two overtime modes: postponing overtime and starting overtime at regular intervals.
Postponing overtime means that employees need to work overtime after work without using an overtime card. They only need to swipe their cards when they leave after overtime. The software will only be able to calculate his overtime.
For example: 17:30 off work, if you set 30 minutes after work as the start of overtime calculation, then 17: 30-18: 00 is the free time to punch off work, after 18:00 off work belongs to the overtime calculation range, overtime from 17:30 off work time Counting to half an hour.
For example: 18:15 counts overtime for half an hour, 18:35 counts overtime for 1 hour, and 19:08 counts overtime for 1.5 hours.
Start overtime mode at regular intervals: After the employees get off work, they get off the work card. After eating, work overtime according to the company's prescribed time, and the software will intelligently calculate his overtime.
For example, if a company leaves work at 17:30 and requires employees to work overtime after 19:00, you can set 19: 00-20: 00 as the overtime period. If the employee leaves work at 19:35, half-hour overtime is calculated. If you get off work at 21:06, it counts as two hours of overtime.
[Online patrol function] Basic functions:
1. You can flexibly set the inspection error time: for example, you can set how many minutes are late or early. The inspection is normal, and how much time is missed.
2. Inspectors can be designated: All employees of the company have a card, and the inspectors of the department responsible for inspection can be assigned to have inspection functions.
3. Inspection points can be designated: There may be many access points of the company, only some of which are also used as inspection points. After designation, the setting is more clear, accurate and convenient.
4. You can define the planned inspection route: some points can be used as inspection points when you return, and they can also be used as inspection points when you return.
5. It is possible to define inspection tasks: set which inspection route a certain inspector will start on which months and days.
6. Clear inspection report: you can see the inspection status of all inspection tasks, whether late or missed.
7, monthly or a certain period of inspection statistical reports: convenient for monthly summary and temporary spot checks to summarize the quality of inspection work.
Humanized design concept of management software
1. The combination of advancedness and compatibility: Windows access control and attendance card smart management software based on the advanced .net environment and the C / S structure of ACCESS2000 SQL database. While ensuring the advancedness, we attach great importance to the compatibility of customers , To ensure that customers can easily and smoothly install Windows2000 NT / XP / 2003 / Vista and other operating systems.
2. Multi-language format is suitable for more customer groups: Simplified Chinese version Traditional Chinese version English version Three versions are released simultaneously. There are installers in different languages to easily install to the operating system of each language. You can also install software on the simplified operating system and switch to traditional or English interface, bringing more convenience to users.
3, a variety of popular and stable communication and networking methods: fully support serial 232 485 TCP / IP three communication methods, truly fully support LAN and internet wide area Internet communication and management.
4. "Approachable, easy-to-understand, fast and convenient operation interface": powerful and simple, practical and convenient operation, fully in line with Microsoft's software style and operating habits, quick menu and user-friendly design make the training work can be completed in a few minutes, Users can easily grasp the manual by looking at the manual. Users can leave the company and new employees can get started easily. This eliminates the worries of end customers in using. A more humane operation entry guide makes it easy for customers to get started and manage the access control system even without reading the manual. We try to avoid abstract or professional descriptions on the interface as much as possible, and try to show it in a way that is easy to understand and clear at a glance. For example, after setting, customers do not need to know the special terms and settings such as controller card reader, etc. What I see is a group of intuitive door icons that directly perform the desired operation on the access control.
5. Convenient, convenient and safe "fool-like" upgrade mode: The database is automatically and seamlessly upgraded when the software is upgraded. The database does not require professional knowledge and professional maintenance. The software upgrade is "fool-like", as long as you simply perform uninstallation and installation can. The database will automatically determine the software version, add and delete fields, and everything is done inadvertently, allowing customers to easily get the latest software features. The software will automatically retain the customer's original settings and parameters. The database will also be automatically compressed to improve the speed and efficiency of the next use, and it can automatically retain the backup of the most recent 4 databases to prevent the database from being restored due to the illegal operation of the operating system.
6. "Batch setting" makes customers more efficient in the process of use: Batch setting is one of our design ideas from the perspective of customers. We use it in many places where software is commonly used or may be used. , Have arranged batch setting function. Let operators use this software more efficiently and easily. For example: batch setting of access control permissions, you can batch set the passable people for a certain door, and you can also set the passable doors for a group of people in batches. Of course, you can also delete their permissions in batches. In addition, for the setting of attendance and leave, we It can also be processed in batches. The card number and name department of employees can be imported and exported in batches through Excel.
7. "A clear view" interface mode and report format: We condensed the operations of almost all commonly used functions into the overall console interface, and easily realized powerful functional operations through a clear button and right-click shortcut menu. In ensuring the system interface At the same time, the client can see all the practical functions and report items of the current interface at a glance.
8. "Perfect unity with powerful functions but simple operation": Although our system is powerful and suitable for the access control needs of units and functional departments in various fields, we hide many uncommon functions in the extended functions. If customers really need Use this function, you can release the use, if you do not shield it, customers do not need to learn and master the use of these functions. Make the software look more easy to understand. The system contains many specific uses of access control for specific industries, such as using For the anti-passback of troops and scientific research institutions, it is used for interlocking multi-card opening of bank vault systems and other functions to meet the needs of multi-directional customers for access control. Users who do not need to use these functions, the system will automatically block these functions, making the operation interface more simple and practical.
9, "what you see" custom report query output printing mode: the design concept of what you see, all the results of the query can be printed directly, the query results are printed whatever. Several commonly used reports You can define the items that are to be queried or printed, arrange the printing order of these items, and save the custom report format for next use. Many settings and reports can be quickly exported to the Exce format for reporting secondary development or submitting to the financial department for reference and reference.
10. Humanized interactive software interface of "Make sure to report mistakes": The software will automatically detect whether the settings and input data of many customers are correct or meet the specifications. If they are not correct, they will prompt the operator in time. Inspection function, allowing customers to find and resolve faults or setting errors in a timely manner.
11. "Detailed operation log" is easy to find the fault and implement the responsibility: customers are using software, all operations have operation logs to record who did what and when, and what the system feedback was at that time, so that when the engineer found the fault, provided Clues can also be used as the responsibility and evidence to implement certain operators' violation of company regulations.
12. "Multi-user administrator" function: You can set the operation authority and password of the lower-level administrator through the advanced administrator, forbid certain functions of the operator at a certain level, and it is more convenient to manage and use.
Real-time color and sound reminder function: During real-time monitoring, not only can the photos of the card reader's previously stored in the computer be displayed in real time, but also the legal card swipe is displayed in green, the illegal card or the record of denied entry is displayed in orange. Alarm information is displayed through red records, and alarm sound is emitted through computer speakers. There is a new monitoring record, and the computer also sends out a peaceful tone to remind the operator to come and pay attention to avoid the operator looking at the computer screen for a long time, which will cause fatigue.
Interface lock function: The operator must temporarily leave the job (for example, go to the bathroom). The interface can be locked. The background software continues to run and monitor. Others cannot take the opportunity to operate the software. After the operator returns, enter the password and return to the software operation. interface.
Designated card reader for card issuance: No card reader is required, just enter the card number and authorize the card to issue the card. You can also specify the reader of any door as the card issuer, and issue the card by swiping in batches. On the one hand, it saves costs for customers, on the other hand, avoids input errors, and improves card issuing efficiency and speed. You can also purchase a USB card issuer, which does not require a dedicated power supply and is compatible with both ID and IC cards. Input is easier and more convenient.
Inheritability of data after reporting a loss: General software will report all new card numbers to modify the previous record settings after losing the card. Our software will scientifically mark the previous records. The previous records can be retained and used with the new function of replacing card numbers. .
Fuzzy search function: Many interfaces can (ctr + F) fast fuzzy search, making the operation easier and faster.
Handling of National Day holiday: Generally, National Day holiday will require a certain Saturday and Sunday to come to work. In these two days, many software can not handle the normal work and use the rest to deal with it. In the event of inaccurate attendance data or must be manually corrected, our software can Handle this special case automatically and reasonably.
Unused functions and interfaces can be shielded: For example, some companies may block the functions and modules of attendance through option settings as long as they do not need attendance at the door, making the operation interface more concise.
8:00 am-22:00 pm except holidays