Hikvision DS-K1T8105M Bruksanvisning

Läs nedan 📖 manual på svenska för Hikvision DS-K1T8105M (140 sidor) i kategorin Tillträdeskontrollsystem. Denna guide var användbar för 4 personer och betygsatt med 4.5 stjärnor i genomsnitt av 2 användare

Sida 1/140
Face Recognition Terminal
User Manual
Face Recognion Terminal
User Manual
i
User Manual
© 20 Hangzhou Hikvision Digital Technology Co., Ltd. 18
This manual is applied for face recognion terminal.
Series
Models
Face Recognion Terminal
DS-K1T8105E
DS-K1T8105M
Note: In the model, M and E represents the product supports swiping Mifare card and EM card
respecvely.
It includes instrucons on how to use the Product. The soware embodied in the Product is
governed by the user license agreement covering that Product.
About this Manual
This Manual is subject to domesc and internaonal copyright protecon. Hangzhou Hikvision
Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be
reproduced, changed, translated, or distributed, parally or wholly, by any means, without the
prior wrien permission of Hikvision.
Trademarks
and other Hikvision marks are the property of Hikvision and are registered
trademarks or the subject of applicaons for the same by Hikvision and/or its aliates. Other
trademarks menoned in this manual are the properes of their respecve owners. No right of
license is given to use such trademarks without express permission.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL.
HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE
USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION
CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE
WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY
AT YOUR OWN RISKS. OUR COMPANY SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL
OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER
ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, OUR COMPANY
WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR
JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS
THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS
USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.
Support
Should you have any quesons, please do not hesitate to contact your local dealer.
Face Recognion Terminal
User Manual
ii
Regulatory Informaon
FCC Informaon
Please take aenon that changes or modicaon not expressly approved by the party responsible
for compliance could void the users authority to operate the equipment.
FCC compliance: This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protecon against harmful interference in a residenal installaon. This equipment
generates, uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instrucons, may cause harmful interference to radio communicaons. However, there is
no guarantee that interference will not occur in a parcular installaon. If this equipment does
cause harmful interference to radio or television recepon, which can be determined by turning
the equipment o and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
Reorient or relocate the receiving antenna.
Increase the separaon between the equipment and receiver.
Connect the equipment into an outlet on a circuit dierent from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
This equipment should be installed and operated with a minimum distance 20cm between the
radiator and your body.
FCC Condions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
condions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause
undesired operaon.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE"
and comply therefore with the applicable harmonized European standards listed
under the RE Direcve 2014/53/EU, the EMC Direcve 2014/30/EU, the RoHS
Direcve 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed
of as unsorted municipal waste in the European Union. For proper recycling, return
this product to your local supplier upon the purchase of equivalent new equipment,
or dispose of it at designated collecon points. For more informaon see:
www.recyclethis.info
Face Recognion Terminal
User Manual
iii
2006/66/EC (battery direcve): This product contains a baery that cannot be
disposed of as unsorted municipal waste in the European Union. See the product
documentaon for specic battery informaon. The baery is marked with this
symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or
mercury (Hg). For proper recycling, return the battery to your supplier or to a
designated collecon point. For more informaon see: www.recyclethis.info
(1) 기기는 가정용으로 전자파적합등록을 한 기기로서 주거지역에서는 물론 모든 지역에서 사용
수 있습니다
(2) 당해 무선설비는 전파혼신 가능성이 으므로 인명안전과 관련된 서비스는 할 수 없
Use only power supplies listed in the user instructions:
Model
Manufacturer
Standard
C2000IC12.0-24P- DE
MOSO Power Supply Technology Ltd. Co.,
CEE
C2000IC12.0-24P- GB
MOSO Power Supply Technology Ltd. Co.,
BS
ADS-24S-12 1224GPG
Shenzhen Honor Electronic Co., Ltd.
CEE
Safety Instrucon
These instrucons are intended to ensure that user can use the product correctly to avoid danger
or property loss.
The precauon measure is divided into Warnings Cauons and :
Warnings: Neglecng any of the warnings may cause serious injury or death.
Cauons: Neglecng any of the cauons may cause injury or equipment damage.
Warnings
All the electronic operaon should be strictly compliance with the electrical safety regulaons,
re prevenon regulaons and other related regulaons in your local region.
Please use the power adapter, which is provided by normal company. The power consumpon
cannot be less than the required value.
Do not connect several devices to one power adapter as adapter overload may cause over-heat
or re hazard.
Please make sure that the power has been disconnected before you wire, install or dismantle
the device.
Cauons Follow these
precauons to prevent
potenal injury or
material damage.
Face Recognion Terminal
User Manual
iv
When the product is installed on wall or ceiling, the device shall be rmly xed.
If smoke, odors or noise rise from the device, turn o the power at once and unplug the power
cable, and then please contact the service center.
If the product does not work properly, please contact your dealer or the nearest service center.
Never aempt to disassemble the device yourself. (We shall not assume any responsibility for
problems caused by unauthorized repair or maintenance.)
Biometric recognion products are not 100% applicable to an-spoong environments. If you
require a higher security level, use mulple authencaon modes.
Cauons
Do not drop the device or subject it to physical shock, and do not expose it to high
electromagnesm radiaon. Avoid the equipment installaon on vibraons surface or places
subject to shock (ignorance can cause equipment damage).
Do not place the device in extremely hot (refer to the specicaon of the device for the detailed
operang temperature), cold, dusty or damp locaons, and do not expose it to high
electromagnec radiaon.
The device cover for indoor use shall be kept from rain and moisture.
Exposing the equipment to direct sun light, low venlaon or heat source such as heater or
radiator is forbidden (ignorance can cause re danger).
Do not aim the device at the sun or extra bright places. A blooming or smear may occur
otherwise (which is not a malfuncon however), and affecng the endurance of sensor at the
same me.
Please use the provided glove when open up the device cover, avoid direct contact with the
device cover, because the acidic sweat of the ngers may erode the surface coang of the device
cover.
Please use a so and dry cloth when clean inside and outside surfaces of the device cover, do
not use alkaline detergents.
Please keep all wrappers aer unpack them for future use. In case of any failure occurred, you
need to return the device to the factory with the original wrapper. Transportaon without the
original wrapper may result in damage on the device and lead to addional costs.
Improper use or replacement of the baery may result in hazard of explosion. Replace with the
same or equivalent type only. Dispose of used baeries according to the instrucons provided by
the battery manufacturer.
Face Recognion Terminal
User Manual
v
Table of Contents
Chapter 1 Overview ................................................................................................................. 1
1.1 Introducon 1 .........................................................................................................................
1.2 Main Features 1 ......................................................................................................................
Chapter 2 Appearance ............................................................................................................. 2
Chapter 3 Installaon .............................................................................................................. 4
3.1 Installing with Gang Box ....................................................................................................... 4
3.2 Installing without Gang Box ................................................................................................. 5
Chapter 4 Terminal Connecon ................................................................................................ 7
Chapter 5 Device Acitvaon ..................................................................................................... 9
5.1 Acvang via Device ............................................................................................................ 9
5.2 Acvang via SADP Soware ............................................................................................. 10
5.3 Acvang via Client Sowa re ............................................................................................ 11
Chapter 6 Basic Operaon .....................................................................................................14
6.1 Login ................................................................................................................................... 14
6.2 General Parameters Seings .............................................................................................. 16
6.2.1 Communicaon Sengs ................................................................................................ 16
6.2.2 System Settings .............................................................................................................. 19
6.2.3 Seng Time ................................................................................................................... 23
6.3 User Management .............................................................................................................. 23
6.3.1 Adding User .................................................................................................................... 24
6.3.2 Managing User ............................................................................................................... 27
6.4 Seng Access Control Parameters ....................................................................................28
6.5 Other Managements .......................................................................................................... 30
6.5.1 Managing Data ............................................................................................................... 30
6.5.2 Managing Log Query ...................................................................................................... 31
6.5.3 Imporng/Exporng Data .............................................................................................. 32
6.5.4 Tesng ............................................................................................................................ 33
6.5.5 Viewing System Informaon .......................................................................................... 34
6.6 Authencang Identy ...................................................................................................... 35
6.6.1 Authencang via 1:1 Matching .................................................................................... 35
6.6.2 Authencang via Other Types ...................................................................................... 36
Chapter 7 Client Operaon ....................................................................................................37
7.1 User Registraon and Login ...............................................................................................37
7.2 System Conguraon ......................................................................................................... 38
Face Recognion Terminal
User Manual
vi
7.3 Access Control Management ............................................................................................. 38
7.3.1 Adding Access Control Device ........................................................................................ 39
7.3.2 Viewing Device Status .................................................................................................... 49
7.3.3 Eding Basic Informaon ............................................................................................... 49
7.3.4 Network Sengs ............................................................................................................ 50
7.3.5 Capture Setngs ............................................................................................................. 52
7.3.6 -485 Sengs RS ............................................................................................................... 53
7.3.7 Wiegand Sengs ........................................................................................................... 54
7.3.8 Remote Conguraon .................................................................................................... 55
7.4 Organizaon Management ................................................................................................62
7.4.1 Adding Organizaon ....................................................................................................... 62
7.4.2 Modifying and Deleng Organizaon ............................................................................ 63
7.5 Person Management .......................................................................................................... 63
7.5.1 Adding Person ................................................................................................................ 63
7.5.2 Managing Person ............................................................................................................74
7.5.3 Issuing Card in Batch ...................................................................................................... 75
7.6 Schedule and Template ...................................................................................................... 76
7.6.1 Week Schedule ............................................................................................................... 77
7.6.2 Holiday Group ................................................................................................................78
7.6.3 Template ......................................................................................................................... 79
7.7 Permission Conguraon ................................................................................................... 81
7.7.1 Adding Permission .......................................................................................................... 82
7.7.2 Applying Permission ....................................................................................................... 83
7.8 Advanced Funcons ........................................................................................................... 84
7.8.1 Access Control Parameters ............................................................................................. 84
7.8.2 Card Reader Authencaon ........................................................................................... 87
7.8.3 Mulple Authencaon ................................................................................................. 89
7.8.4 Open Door with First Card .............................................................................................92
7.8.5 An-Passing Back ...........................................................................................................93
7.9 Searching Access Control Event .........................................................................................94
7.9.1 Searching Local Access Control Event ............................................................................ 95
7.9.2 Searching Remote Access Control Event ........................................................................ 95
7.10 Access Control Event Conguraon ................................................................................... 96
7.10.1 Access Control Event Linkage ..................................................................................... 96
7.10.2 Event Card Linkage ..................................................................................................... 97
7.10.3 Cross-Device Linkage ................................................................................................ 100
Face Recognition Terminal
User Manual
vii
7.11 Door Status Management ................................................................................................ 101
7.11.1 Access Control Group Management ........................................................................ 101
7.11.2 Anti-control the Access Control Point (Door) ........................................................... 103
7.11.3 Status Duration Configuration .................................................................................104
7.11.4 Real-time Card Swiping Record ................................................................................ 106
7.11.5 Real-time Access Control Alarm ............................................................................... 106
7.12 Arming Control ................................................................................................................. 108
7.13 Time and Attendance ....................................................................................................... 108
7.13.1 Shift Schedule Management .................................................................................... 109
7.13.2 Attendance Handling ................................................................................................ 115
7.13.3 Advanced Settings .................................................................................................... 119
7.13.4 Attendance Statistics ................................................................................................ 123
Appendix A Tips When Collecting/Comparing Face Picture ..................................................... 127
A.1 Positions (Recommended Distance: 0.5m) ........................................................................ 127
A.2 Expression ........................................................................................................................ 127
A.3 Posture ............................................................................................................................ 128
A.4 Size .................................................................................................................................. 128
Appendix B Relationship between Device Height, Person Height, and Standing Distance ......... 129
Appendix C Tips for Installation Environment ......................................................................... 130
Appendix D Dimension ........................................................................................................... 131
Face Recognition Terminal
User Manual
1
Chapter 1 Overview
1.1 Introduction
DS-K1T8105 series face recognition terminal adopts deep learning algorithm, which helps to
recognize the face faster and more accurate. It also supports multiple authentication modes:
1:N face picture match, IC card authentication, etc. Face recognition terminal can apply to
the scenarios of buildings, businesses, and other important areas.
1.2 Main Features
Wall mounting and base mounting
5-inch LCD touch screen to display operation interface
0.3 MP wide-angle lens
Face recognition distance: 0.3 m to 1 m
High performance processor with deep learning algorithm
Max. 1000 face pictures storage
Multiple authentication modes: authentication by comparing face picture, by swiping card
comparing face picture, by custom mode, etc.
Applies face picture data and card data to the device via TCP/IP or uploading them to the
device via the USB flash drive
Stand-alone operation
Transmits and saves the comparing results and the captured face picture to the client software
or others
Supports TCP/IP, Wi-Fi, and EHome public network communication
Connects to external access controller or card reader via Wiegand communication
Connects to secure door control unit via RS-485 communication to avoid the door opening
when the terminal is destroyed
Watchdog design for protecting the device and ensuring device running propery
Voice prompt
Face Recognition Terminal
User Manual
2
Chapter 2 Appearance
Refer to the following contents for detailed information of the face recognition terminal:
Table 1-1 Description of Face Recognition Terminal
No.
Name
Description
1
Indicator
Solid Red: Standby.
Flashing Red: Authentication failed.
Solid Green: Authentication completed.
Flashing Green: Authenticating (combined).
2
Card Swiping Area
Swipe card on the area .
3
Sensor
Detect the illumination intensity. When the environment is
too dark, the device will enable the supplement light
automatically.
4
Display Screen
5-inch LCD touch screen with the resolution o 800*480. f
5
Supplement Light
Support white light and IR light. Maximum distance for
supplement light: . 1m
6
Camera
Support bi-spectrum.
7
Loudspeaker
The part that the sound comes from.
8
Doorbell Button
Hold the button for 3s to power on and the device indicator
will light up.
After setting the power button function, hold the doorbell
Face Recognition Terminal
User Manual
4
Chapter 3 Installation
Installation Environment:
Install the device indoors, at least 2 meters away from the light, and at least 3 meters away
from the window or the door.
Avoid backlight, direct and indirect sunlight.
Make sure the environment illumination is more than 100Lux.
Note: For details about installation environment, see Appendix C Tips for Installation Environment.
Installation Types: Wall mounting and base mounting.
3.1 Installing with Gang Box
Before you start:
According to the datum on the mounting template, stick the mounting template on the wall or
other surface, 1.1 meters higher than the ground.
Steps:
1. Drill holes on the wall or other surface according to the mounting template and install the gang
box (80mm×80mm).
2. Use two supplied screws to secure the mounting plate on the gang box.
3. Remove the two screws at the bottom of the device.
4. Align the terminal with the mounting plate and buckle them together.
5. Use a hex wrench to fasten the two screws at the bottom.
Notes:
The installation height here is the recommended height. You can change it according to your
actual needs.
You can also install the device on the wall or otoher places without the gang box. For details,
see 3.2 Installing without Gang Box.
Face Recognition Terminal
User Manual
5
For easy installation, drill holes on mounting surface according to the supplied mounting
template.
3.2 Installing without Gang Box
Before you start:
According to the basline on the mounting template, stick the mounting template on the wall or
other surface, 1.1 meters higher than the ground.
Step s:
1. Drill holes on the wall or other surface according to the mounting template.
2. Insert the screw sockets of the setscrews in the drilled holes.
Face Recognition Terminal
User Manual
6
3. Align the two holes the mounting plate with the drilled holes. to
4. Fix and fasten the screws in the sockets on the wall or other surface.
5. Remove the two screws at the bottom of the device.
6. Align the terminal with the mounting plate and buckle them together.
7. Use a hex wrench to fasten the two screws at the bottom.
Face Recognition Terminal
User Manual
7
Chapter 4 Terminal Connectio n
You can connect the DOOR terminal with the door lock, connect the SEN/BUT/GND terminal with
the exit button, connect the ALARM OUT/ALRM IN terminal with the alarm output/in t devicespu ,
and connect the WIEGAND terminal with the Wiegand card reader or the access controller. You can
also connect the DS_IN can with the power supply.
If connect the WIEGAND terminal with the access controller, the face recognition terminal can
transmit the authentication information to the access controller and the access controller can
judge whether to open the door or not.
The wiring diagram is as follows:
You can also connect the terminal with the seucure door control unit. The wiring diagram is as
follows:
Face Recognition Terminal
User Manual
9
Chapter 5 Device Acitvation
Purpose:
You are required to activate the terminal first before using it.
Activation via device, activation via SADP, and activation via client software are supported.
The default values of the control terminal are as follows.
The default IP address: 192.0.0.64.
The default port No.: 8000.
The default user name: admin.
5.1 Activating via Device
If the device is not activated, you can activate the device after it is powered on.
Steps:
1. Tap the Password field and create a password.
2. Tap the Confirm field and input the password again.
3. Tap The device will be activated and you will enter the application mode selection page. Next.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong
password of your own choosing (using a minimum of 8 characters, including upper case
letters, lower case letters, numbers, and special characters) in order to increase the
security of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or weekly can
better protect your product.
4. Select or Indoor Others from the drop-down list.
5. Tap to save the settings. OK
Face Recognition Terminal
User Manual
10
Note: You can also change the settings in System Settings page. For details, see Section 6.2.2
System Settings.
5.2 Activating via SADP Software
Purpose:
SADP software is used for detecting the online device, activating the device, and resetting the
password.
Get the SADP software from the supplied disk, and install the SADP according to the prompts.
Follow the steps to activate the device.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
3. Create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong
password of your own choosing (using a minimum of 8 characters, including upper case
letters, lower case letters, numbers, and special characters) in order to increase the
security of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or weekly can
better protect your product.
4. Click Activate to activate the device.
5. Check the activated device. You can change the device IP address to the same network
segment with your computer by either editing the IP address manually or checking the Enable
DHCP checkbox.
Face Recognition Terminal
User Manual
12
2. Click Device Management to enter the Device Management interface.
3. Check the device status from the device list, and select an inactive device.
4. Check the device status from the device list, and select an inactive device.
5. Click Activate to pop up the Activation interface.
6. In the pop-up window, create a password in the password field, and confirm the password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong
password of your own choosing (using a minimum of 8 characters, including upper
case letters, lower case letters, numbers, and special characters) in order to increase
the security of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or weekly can
better protect your product.
Face Recognition Terminal
User Manual
13
7. Click button to start activation. OK
8. Click the Modify Netinfor button to pop up the Network Parameter Modification interface.
9. Change the device IP address to the same network segment your computer by modifying as
the IP address manually.
10. Input the password and click to save the settings. OK
By default, the device will enter the initial page, and the application mode will be set as Indoor.
Note: You can also change the settings in System Settings page. For details, see Section 6.2.2
System Settings.
Face Recognition Terminal
User Manual
15
3. Authenticate permissions to enter the home page.
Tap one of the four authentication modes on the upper side of the page and authenticate
permissions.
Or t ap Login via Activation Password and input the device activation password to enter the
home page.
The home page is shown as below:
Notes:
The device will be locked for 30 minutes after 5 failed password attempts.
The supported authentication modes are as follows:
card or password face picture and password, face picture and card, card and password, ,
face picture, employee ID and password, card, card or password, employee ID and face
picture.
Face Recognition Terminal
User Manual
18
If selecting , you should input the Wi-Fi password. Dynamic
Note: mbers, upper case letters, lower case letters, and special characters are allowed in the Nu
Wi-Fi password.
5. Tap to save the settings and go back to the Wi-Fi tab. OK
6. Tap to save the Wi-Fi parameters and go back to the Home page.
Setting RS-485 Parameters
Purpose:
The face recognition terminal can connect secure door control unit via the RS-485 terminal.
Steps:
1. On the Communication Settings page, tap to enter the RS-485 tab. RS-485
2. Select an Unit or None according to your actual needs.
Note: Unit represents the secure door control unit.
3. Tap to save the settings.
Note: If you change the selection, the device will reboot automatically after you save the
settings.
Face Recognion Terminal
User Manual
25
2. Tap the Employee ID. eld and edit the employee ID.
Notes:
The employee should be between 1 and 99999999. The employee should not start with 0 ID ID
and should not be duplicated.
3. Tap the Name eld and input the user name on the so keyboard.
Notes:
Numbers, upper case letters, lower case letters, and special characters are allowed in the
user name.
Up to 32 characters are allowed in the user name.
4. Tap the eld and input the card No. Card
Opon 1: Input the card No. manually.
Opon2: Swipe the card over the card swiping area to get the card No.
Notes:
The card No. cannot be empty.
Up to 20 characters are allowed in the card No.
By default, the card No. contains 10 characters. The system will use 0 to supplement the
10-character-card No. For example, 5 and 0000000005 are two dierent card No.
The card No. cannot be duplicated.
Face Recognion Terminal
User Manual
31
Parameter
Descripon
Delete All Data:
Delete all user data and events stored in the device.
Clear Permission:
Clear the administrator s permission but the administrator and
the related logs will not be delet . ed
Delete Captured Pic. :
Delete the device captured pictured.
Restore to Factory:
Restore the system to the factory sengs. The device will reboot
aer the seng.
Restore to Default:
Restore the system to the default sengs. The system will save
the communicaon sengs and the remote user sengs. Other
parameters will be restored to default.
3. Tap Yes on the pop-up dialog to complete the setngs.
6.5.2 Managing Log Query
Purpose:
You can search the authencaon logs within a period of me by inpung employee ID, card No.,
or user name.
Steps:
1. On the Home page, tap (Log) to enter the Log page. Log
2. Tap on the le of the page and select a search type from the drop-down list. Card
3. Tap the input box and input the employee ID, the card No., or the user name for search.
4. Select me.
You can select from , , , , , , or Custom Yesterday This Week Last Week This Month Last Month
All.

Produktspecifikationer

Varumärke: Hikvision
Kategori: Tillträdeskontrollsystem
Modell: DS-K1T8105M
Vikt: 177 g
Bredd: 126 mm
Djup: 18 mm
Höjd: 82 mm
Användarmanual: Ja
Batterikapacitet: 1200 mAh
Blåtand: Ja
Skärm diagonal: 4.3 "
Pekskärm: Ja
Vormfaktor: Handheld
Snabbstartsguide: Ja
Internminne: 2048 MB
Typ av lagringsmedia: Flash
Text-till-tal-meddelandeläsare: Ja
Typ av anslutning: Aanraakscherm
Antal mini-USB 2.0-portar: 1
Batteriteknik: Lithium-Ion (Li-Ion)
Widescreen: Ja
Vatten: Nee
Sport (kondition, löpning): Nee
Utomhus: Nee
Geocaching: Nee
Bil: Ja
Att flyga: Nee
Hastighetsgräns: Ja
Igenkänningspunkter i 3D: Ja
Röstkartor: Ja
Trafikmeddelandekanal (TMC): Ja
Alternativ för kartvy: 3D

Behöver du hjälp?

Om du behöver hjälp med Hikvision DS-K1T8105M ställ en fråga nedan och andra användare kommer att svara dig




Tillträdeskontrollsystem Hikvision Manualer

Tillträdeskontrollsystem Manualer

Nyaste Tillträdeskontrollsystem Manualer