SF Series User Manual V1.2
SF Series User Manual V1.2
SF Series User Manual V1.2
Version: 1.2
Date: July, 2011
Important Notice:
Firstly thank you for purchasing this SF series terminal, before use, please
read this manual carefully to avoid the unnecessary damage! The company
reminds you that the proper using will improve the using affect and
verification speed.
No written consent by ZKSoftware Inc., any unit or individual isn’t allowed to
excerpt, copy the content of this manual in part or in full, also spread in any
form.
The product described in the manual maybe includes the software which
copyrights are shared by the licensors including ZKSoftware Inc. Except for
the permission of the relevant holder, any person can’t copy, distribute, revise,
modify, extract, decompile, disassemble, decrypt, reverse engineering,
leasing, transfer, sublicense the software, other acts of copyright
infringement, but the limitations applied to the law is excluded.
Notational Conventions:
This document includes such notational conventions as tips, important
notices and precautions. The notations contained in this manual include:
We can neither promise that the information consistent with the actual
product because of the constantly updated of product, nor assume any dispute
resulting from the actual technical parameters does not match this information,
any change without prior notice.
2
Contents
Contents
2. Basic Operations................................................................. 6
3. Appendix ............................................................................ 15
SF Series product can directly use the lock control, and also can use the
fingerprint access controller connected. The product have only Enroll, Delete,
and doorbell buttons, the operation of every step have the voice prompts,
make the customer more simple and convenient to operate. No LCD and
sensor buckle cover played a good role to ensure the product clean.
USBclient communication greatly reduces the tedious wiring. Standard ID
card module provides customers with greater choice. This product is suitable
for small office environment, enterprise internal and some lower security level
sites.
Door Sensor
Alarm
Out switch
Lock
1
SF Series User Manual
①LED indicator
⑥Fingerprint sensor
①LED indicator: Display operation results and abnormal state. For details,
see 1.6 LED and Buzzer.
②Enroll button: Operation key, used to register users and administrators.
③Delete button: Operation key, delete users and administrators.
④Doorbell button: Press to send a ring signal, the doorbell will ring after
receiving this signal.
⑤Sensor buckle cover: Protection fingerprint sensor, with antidust,
antiglare and so on.
⑥Fingerprint sensor: Enroll and verify the fingerprint.
⑦Card sensor area (with the red line box): Enroll and verify the card.
The device is in verification state after powering on. User can verify and then
unlock the door in this state. During this state, the user can also enter or exit
the normal user registration state, administrator registration state, single user
deletion state and clear users state, each step has voice and light prompt,
2
1. Instruction for Use
the system will automatically return to the verification status when it’s time
out.
3
SF Series User Manual
Recommended fingers: The index finger, middle finger or the ring finger; the
thumb and little finger are not recommended (because they are usually
clumsy on the fingerprint collection screen).
Slanting Offcenter
Please enroll and verify your fingerprint by using the proper finger placement
mode. We shall not be held accountable for any consequences arising out of the
degradation in verification performance due to improper user operations. We shall
reserve the right of final interpretation and revision of this document.
4
1. Instruction for Use
If the device's LED and buzzer indicator does not match the
description above, please contact the relevant technical staff.
5
2. Basic Operations
2. Basic Operations
The users are divided into two types: administrators and ordinary users. For
the first time of using this device, which is the case the administrator has not
registered, ordinary users can not register, and you must register at least one
administrator first.
The privilege of administrator and ordinary user are as follows:
Administrator: Has all operating privilege, can enroll, delete all of the
administrators and ordinary users (except himself).
Ordinary users: Only has the privilege of verification and unlock the door.
Enroll administrator steps are as follows:
1) During verification state, press the Enroll key for 3 seconds, the device
prompts "— : Enter the Administrator enrollment status", and the device
enters the administrator register status.
enrollment status
2) When the device prompts “—: Please confirm with the administrator,
press Enroll button to exit”, please press the administrator fingerprint by the
6
2. Basic Operations
proper way or swipe the administrator card. Please refer to 1.5 Finger
Placement for more details.
Note: If the device does not register an administrator, go directly to step
(4).
3) If the verification is successful, the device enters the register mode,
continue with step (4). If the verification fails, the device prompts”—: Please
try again” or”—: Please punch card again”. After three consecutive
verification failures, the device will prompt”—: Administrator failed to confirm,
system back to validated status”, and return to verify status.
4) When the device prompt”—: Please press fingerprint or punch card, press
Enroll button to exit" to start register administrator. The device supports two
kinds of register methods, fingerprint registration and card registration, follow
these steps:
① Fingerprint registration
a. Use the proper way to press a finger on the fingerprint sensor, the device
prompts “—: Please press the finger again".
b. Press the same finger for another time, the device prompts “—: Please
press the fingerprint for the last time”.
c. Press the same finger for the third time, the registration is successful, the
device prompts “— : User ID ×××, enrollment succeeded (××× indicates the
user's ID number, starting from 001, the valid user ID is 001 to 999). If the
registration is failed, the device prompts “—: Fingerprint repeat, please try
again" and return to the register state, repeat the step a.
② Card registration
Swipe the card near to the card sensor area, if the registration is successful,
the device prompts”—: User number ×××, registration is successful". If the
registration is failed, the device prompts “—: Duplicated card number” and
return to register state, waiting for swipe card or press fingerprint.
5) After successful registration, the device will enter the register state
7
SF Series User Manual
8
2. Basic Operations
Note: If the device did not register an administrator, the device prompts
“—: Extended press the Enroll button to enroll an administrator", enter
the administrator enrollment process.
2) The following steps are same to the administrator enrollment. Please refer
to 2.1 Enroll an Administrator for specific operations.
3) After successful registration, the device will enter the register state
automatically, and continue to register other users.
9
SF Series User Manual
10
2. Basic Operations
11
SF Series User Manual
1) If the deleting user was the last administrator, the device will prompt”—:
Forbid to delete the last administrator, system back to validated status", and
automatically returns to the verify status.
2) In finger pressing process, if the fingerprint with a bad quality, the device
prompts “— : Please try again”.
12
2. Basic Operations
13
SF Series User Manual
14
3. Appendix
3. Appendix
Access control parameters and the sleep function are set by the access
control software.
15
SF Series User Manual
Dear Customers:
Thank you for choosing the hybrid biometric products designed and
manufactured by us. As a worldrenowned provider of biometric technologies
and services, we pay much attention to the compliance with the laws related
to human rights and privacy in every country while constantly performing
research and development.
We hereby make the following statements:
1. All of our fingerprint recognition devices for civil use only collect the
characteristic points of fingerprints instead of the fingerprint images, and
therefore no privacy issues are involved.
2. The characteristic points of fingerprints collected by our products cannot
be used to restore the original fingerprint images, and therefore no
privacy issues are involved.
3. We, as the equipment provider, shall not be held legally accountable,
directly or indirectly, for any consequences arising due to the use of our
products.
4. For any dispute involving the human rights or privacy when using our
products, please contact your employer directly.
Our fingerprint products for police use, or development tools support the
collection of the original fingerprint images. As for whether such a type of
fingerprint collection constitutes an infringement of your privacy, please
contact the government or the final equipment provider. We, as the original
equipment manufacturer, shall not be held legally accountable for any
infringement arising thereof.
The law of the People’s Republic of China has the following regulations
regarding the personal freedom:
16
3. Appendix
17
SF Series User Manual
SMD resistor × ○ ○ ○ ○ ○
SMD capacitor × ○ ○ ○ ○ ○
SMD inductance × ○ ○ ○ ○ ○
SMD diode × ○ ○ ○ ○ ○
ESD × ○ ○ ○ ○ ○
components
Buzzer × ○ ○ ○ ○ ○
Adapter × ○ ○ ○ ○ ○
Screw ○ ○ ○ × ○ ○
○:Indicate that the content of the toxic and harmful substance contained in all homogeneous
materials of this part is in the limitation requirement stipulated in SJ / T 113632006.
×:Indicate the content of the toxic and harmful substance contained in at least one
homogeneous material of this part is beyond the limitation requirement stipulated in SJ / T
113632006.
Note: The 80% product has adopted the manufacture with nontoxic and harmless
environmental protection materials, the nontoxic and harmless substances or elements
instead of the toxic and harmful substances or elements contained can not be achieved
because of the current technology and economic constraints.
18