Zkbiosecurity User Manual v2.4 20181026 For 3.1.5.0 or Above

Download as pdf or txt
Download as pdf or txt
You are on page 1of 412

USER MANUAL

ZKBioSecurity
Version: 2.4

Date: October 2018

Software Version: ZKBioSecurity 3.1.5.0 or above version


Important Statement
Thank you for choosing our product. Before using this product, please read this manual carefully.
Proper operations of the product will result in better performance and faster verification.
None of the content of this document shall be copied or delivered in any forms or by any means
without the prior written consent of our company.
The product described in the manual may include the software whose copyrights are shared by
licensors, including our company. No one shall copy, distribute, revise, modify, extract, decompile,
disassemble, decrypt, reverse engineer, lease, transfer, sub-license the software, or perform other acts
of copyright infringement, unless such restrictions are prohibited by applicable laws or such actions
are approved by respective copyright holders.

Information provided in this manual may differ from actual technical specifications due to the
constant development of products. Our company claims no responsibility for any disputes
arising out of any discrepancy between actual technical parameters and those described in this
document. The document is subject to change without prior notice.

i
Table of Contents
Important Statement .......................................................................................................................................................... i

1. Requirement and Introduction ................................................................................................................................ 1

1.1 Personnel Module ........................................................................................................................................................................................... 1

1.2 Access Control Module ............................................................................................................................................................................... 2

1.3 Attendance Module ...................................................................................................................................................................................... 2

1.4 Elevator Module ............................................................................................................................................................................................... 2

1.5 Hotel Management System Module .................................................................................................................................................. 2

1.6 Visitor Module.................................................................................................................................................................................................... 2

1.7 Parking System Module .............................................................................................................................................................................. 2

1.8 Patrol Module .................................................................................................................................................................................................... 2

1.9 Video Module .................................................................................................................................................................................................... 3

1.10 System Management Module ................................................................................................................................................................ 3

2. System Operations ..................................................................................................................................................... 4

2.1 Login to the System ...................................................................................................................................................................................... 4

2.2 Personal Self-Login ......................................................................................................................................................................................... 5

2.3 Dashboard ........................................................................................................................................................................................................... 6

2.4 Activating the System .................................................................................................................................................................................. 7

2.5 Modifying Password ...................................................................................................................................................................................... 7

2.6 Customer Service ............................................................................................................................................................................................ 8

2.7 Exit the system .................................................................................................................................................................................................. 8

3. Personnel Management .......................................................................................................................................... 10

3.1 Personnel ........................................................................................................................................................................................................... 10

3.1.1 Person......................................................................................................................................................................................................... 10

3.1.2 Department ............................................................................................................................................................................................ 27

3.1.3 Position ...................................................................................................................................................................................................... 31

ZKBioSecurity 3.1.5.0 or above P a g e |I


3.1.4 Dimission Personnel ......................................................................................................................................................................... 32

3.1.5 Temporary Personnel ....................................................................................................................................................................... 33

3.1.6 Custom Attributes .............................................................................................................................................................................. 34

3.1.7 Parameters............................................................................................................................................................................................... 35

3.2 Card Management ...................................................................................................................................................................................... 38

3.2.1 Card .............................................................................................................................................................................................................. 38

3.2.2 Wiegand Format.................................................................................................................................................................................. 38

3.2.3 Issue Card Record ............................................................................................................................................................................... 40

3.3 AD Management .......................................................................................................................................................................................... 41

4. Access.......................................................................................................................................................................... 42

4.1 Device .................................................................................................................................................................................................................. 42

4.1.1 Device ......................................................................................................................................................................................................... 42

4.1.2 Device Operation ................................................................................................................................................................................ 46

4.1.3 Doors ........................................................................................................................................................................................................... 53

4.1.4 Reader ........................................................................................................................................................................................................ 56

4.1.5 Auxiliary Input ....................................................................................................................................................................................... 58

4.1.6 Auxiliary Output ................................................................................................................................................................................... 59

4.1.7 Event Type ............................................................................................................................................................................................... 60

4.1.8 Daylight Saving Time ....................................................................................................................................................................... 61

4.1.9 Device Monitoring ............................................................................................................................................................................. 63

4.1.10 Real-Time Monitoring ...................................................................................................................................................................... 64

4.1.11 Alarm Monitoring ............................................................................................................................................................................... 68

4.1.12 Map .............................................................................................................................................................................................................. 69

4.2 Access Control Management ............................................................................................................................................................... 70

4.2.1 Time Zones ............................................................................................................................................................................................. 70

4.2.2 Holidays ..................................................................................................................................................................................................... 72

4.2.3 Access Levels ......................................................................................................................................................................................... 73

4.2.4 Set Access By Levels .......................................................................................................................................................................... 75

ZKBioSecurity 3.1.5.0 or above P a g e | II


4.2.5 Set Access By Person ........................................................................................................................................................................ 75

4.2.6 Set Access By Department............................................................................................................................................................ 76

4.2.7 Interlock .................................................................................................................................................................................................... 76

4.2.8 Linkage....................................................................................................................................................................................................... 77

4.2.9 Anti-Passback ........................................................................................................................................................................................ 81

4.2.10 First-Person Normally Open ......................................................................................................................................................... 82

4.2.11 Multi-Person Group ........................................................................................................................................................................... 83

4.2.12 Multi-Person Opening Door ........................................................................................................................................................ 84

4.2.13 Verification Mode Group................................................................................................................................................................ 85

4.2.14 Parameters............................................................................................................................................................................................... 85

4.3 Advanced Functions .................................................................................................................................................................................. 86

4.3.1 Zone ............................................................................................................................................................................................................ 86

4.3.2 Reader Define ........................................................................................................................................................................................ 88

4.3.3 Who is Inside .......................................................................................................................................................................................... 89

4.3.4 Global Anti-Passback ........................................................................................................................................................................ 90

4.3.5 Global Linkage ...................................................................................................................................................................................... 92

4.3.6 Global Interlock Group .................................................................................................................................................................... 93

4.3.7 Global Interlock .................................................................................................................................................................................... 93

4.3.8 Person Availability .............................................................................................................................................................................. 94

4.3.9 LED Data ................................................................................................................................................................................................... 98

4.4 Access Reports ............................................................................................................................................................................................... 99

4.4.1 All Transactions .................................................................................................................................................................................... 99

4.4.2 Events from Today .......................................................................................................................................................................... 100

4.4.3 Last Known Position....................................................................................................................................................................... 101

4.4.4 All Exception Events ....................................................................................................................................................................... 102

4.4.5 Access Rights By Door .................................................................................................................................................................. 103

4.4.6 Access Rights By Personnel ....................................................................................................................................................... 104

4.5 Video Integration....................................................................................................................................................................................... 105

ZKBioSecurity 3.1.5.0 or above P a g e | III


5. Attendance Management .................................................................................................................................... 106

5.1 Device ............................................................................................................................................................................................................... 106

5.1.1 Area ........................................................................................................................................................................................................... 107

5.1.2 Device ...................................................................................................................................................................................................... 109

5.1.3 Personnel Area Setting ................................................................................................................................................................. 114

5.1.4 Attendance point ............................................................................................................................................................................ 116

5.1.5 Advertisement ................................................................................................................................................................................... 117

5.1.6 Advertisement Settings ............................................................................................................................................................... 118

5.2 Basic Information ....................................................................................................................................................................................... 119

5.2.1 Rule ........................................................................................................................................................................................................... 119

5.2.2 Holiday .................................................................................................................................................................................................... 122

5.2.3 Leave Type ........................................................................................................................................................................................... 123

5.2.4 Timed Calculation............................................................................................................................................................................ 125

5.2.5 Automatic Report ............................................................................................................................................................................ 125

5.3 Shift..................................................................................................................................................................................................................... 127

5.3.1 Time Zone............................................................................................................................................................................................. 127

5.3.2 Shift ........................................................................................................................................................................................................... 133

5.4 Schedule ......................................................................................................................................................................................................... 143

5.4.1 Group ....................................................................................................................................................................................................... 144

5.4.2 Group Schedule ................................................................................................................................................................................ 147

5.4.3 Department Schedule .................................................................................................................................................................. 149

5.4.4 Personnel Scheduling ................................................................................................................................................................... 149

5.4.5 Temporary Schedule ..................................................................................................................................................................... 150

5.5 Exception ........................................................................................................................................................................................................ 151

5.5.1 Appended Receipt .......................................................................................................................................................................... 151

5.5.2 Leave ........................................................................................................................................................................................................ 153

5.5.3 Business Trip ........................................................................................................................................................................................ 156

5.5.4 Go Out ..................................................................................................................................................................................................... 157

ZKBioSecurity 3.1.5.0 or above P a g e | IV


5.5.5 Overtime ................................................................................................................................................................................................ 159

5.5.6 Adjust and Append ........................................................................................................................................................................ 161

5.5.7 Adjust Shift ........................................................................................................................................................................................... 162

5.6 Flow Management ................................................................................................................................................................................... 165

5.6.1 Node Setting ....................................................................................................................................................................................... 165

5.6.2 Flow Setting ........................................................................................................................................................................................ 167

5.6.3 My Application .................................................................................................................................................................................. 169

5.6.4 My Approval ........................................................................................................................................................................................ 171

5.7 Calculate Report......................................................................................................................................................................................... 174

5.7.1 Manual Calculate.............................................................................................................................................................................. 174

5.7.2 Transaction ........................................................................................................................................................................................... 175

5.7.3 Daily Attendance.............................................................................................................................................................................. 177

5.7.4 Leave Summary ................................................................................................................................................................................ 179

5.7.5 Daily Report ......................................................................................................................................................................................... 181

5.7.6 Monthly Detail Report .................................................................................................................................................................. 182

5.7.7 Monthly Statistical Report .......................................................................................................................................................... 183

5.7.8 Departmental Report .................................................................................................................................................................... 184

5.7.9 Annual Report .................................................................................................................................................................................... 185

5.8 Homepage Panel ....................................................................................................................................................................................... 186

5.8.1 Workaholic............................................................................................................................................................................................ 186

5.8.2 Today's Attendance Segmented Statistics...................................................................................................................... 187

5.8.3 Today's attendance ........................................................................................................................................................................ 187

5.8.4 Abnormal Statistics (this month) ........................................................................................................................................... 188

6. Elevator .................................................................................................................................................................... 189

6.1 Elevator Device ........................................................................................................................................................................................... 189

6.1.1 Device ...................................................................................................................................................................................................... 189

6.1.2 Reader ..................................................................................................................................................................................................... 191

6.1.3 Floor .......................................................................................................................................................................................................... 192

ZKBioSecurity 3.1.5.0 or above P a g e |V


6.1.4 Auxiliary Input .................................................................................................................................................................................... 193

6.1.5 Event Type ............................................................................................................................................................................................ 194

6.1.6 Device Monitoring .......................................................................................................................................................................... 195

6.1.7 Real-Time Monitoring ................................................................................................................................................................... 196

6.2 Elevator Rules ............................................................................................................................................................................................... 200

6.2.1 Time Zones .......................................................................................................................................................................................... 200

6.2.2 Holidays .................................................................................................................................................................................................. 202

6.2.3 Elevator Levels ................................................................................................................................................................................... 203

6.2.4 Set Access By Levels ....................................................................................................................................................................... 204

6.2.5 Set Access By Person ..................................................................................................................................................................... 204

6.2.6 Set Access By Department......................................................................................................................................................... 205

6.2.7 Global Linkage ................................................................................................................................................................................... 205

6.2.8 Parameters............................................................................................................................................................................................ 207

6.3 Elevator Reports ......................................................................................................................................................................................... 207

6.3.1 All Transactions ................................................................................................................................................................................. 208

6.3.2 All Exception Events ....................................................................................................................................................................... 208

6.3.3 Access Rights By Floor .................................................................................................................................................................. 209

6.3.4 Access Rights By Personnel ....................................................................................................................................................... 210

7. Hotel Management System ................................................................................................................................. 212

7.1 Hotel Settings .............................................................................................................................................................................................. 212

7.2 Room Management ................................................................................................................................................................................ 213

7.2.1 Room Types ......................................................................................................................................................................................... 213

7.2.2 Building .................................................................................................................................................................................................. 214

7.2.3 Floor .......................................................................................................................................................................................................... 214

7.2.4 Room........................................................................................................................................................................................................ 215

7.2.5 Room Areas.......................................................................................................................................................................................... 217

7.2.6 Booking Methods ............................................................................................................................................................................ 218

ZKBioSecurity 3.1.5.0 or above P a g e | VI


7.2.7 Access/Elevator Control Levels ....................................................................................................................................... 218

7.3 Card Service Center ................................................................................................................................................................................. 221

7.3.1 Setting Cards....................................................................................................................................................................................... 222

7.3.2 Employee Card .................................................................................................................................................................................. 226

7.3.3 Maintenance Card ........................................................................................................................................................................... 229

7.4 Hotel Management.................................................................................................................................................................................. 231

7.4.1 Reception .............................................................................................................................................................................................. 231

7.4.2 Reservation........................................................................................................................................................................................... 246

7.4.3 Book Management ......................................................................................................................................................................... 248

7.5 Report Management............................................................................................................................................................................... 252

7.5.1 Guest Check-In Report ................................................................................................................................................................. 252

7.5.2 Room Check-In Report ................................................................................................................................................................. 253

7.5.3 Room Charge Report..................................................................................................................................................................... 253

7.5.4 Issue card Report .............................................................................................................................................................................. 254

7.5.5 Unlock Record Report ................................................................................................................................................................... 255

8. Visitor System ......................................................................................................................................................... 257

8.1 Registration ................................................................................................................................................................................................... 257

8.1.1 Entry Registration............................................................................................................................................................................. 257

8.1.2 Visitor ....................................................................................................................................................................................................... 261

8.2 Reservation .................................................................................................................................................................................................... 261

8.3 Basic Management................................................................................................................................................................................... 262

8.3.1 Parameters............................................................................................................................................................................................ 262

8.3.2 Device Debugging.......................................................................................................................................................................... 265

8.3.3 Print Settings....................................................................................................................................................................................... 266

8.3.4 Visitor Levels ........................................................................................................................................................................................ 267

8.3.5 Host Levels ........................................................................................................................................................................................... 268

8.3.6 Visited Department Levels ......................................................................................................................................................... 270

ZKBioSecurity 3.1.5.0 or above P a g e | VII


8.3.7 Entry Place ............................................................................................................................................................................................ 270

8.3.8 Visit Reason .......................................................................................................................................................................................... 271

8.3.9 Custom Attributes ........................................................................................................................................................................... 272

8.4 Visitor Reports .............................................................................................................................................................................................. 272

8.4.1 Last Visited Location ...................................................................................................................................................................... 272

8.4.2 Visitor History Record .................................................................................................................................................................... 273

9. Parking Lot System ............................................................................................................................................... 274

9.1 Operation Wizard ...................................................................................................................................................................................... 274

9.2 Authorization Management............................................................................................................................................................... 275

9.2.1 License Plate Registration .......................................................................................................................................................... 275

9.2.2 Vehicle Management .................................................................................................................................................................... 277

9.2.3 Vehicle Valid Time Extension.................................................................................................................................................... 281

9.3 Parking Lot Management .................................................................................................................................................................... 283

9.3.1 Vehicle Type ........................................................................................................................................................................................ 283

9.3.2 Parking Lot............................................................................................................................................................................................ 284

9.3.3 Parking Area ........................................................................................................................................................................................ 285

9.3.4 Entrance and Exit Area ................................................................................................................................................................. 286

9.3.5 Device Management ..................................................................................................................................................................... 288

9.3.6 Device Management(When Access Controller is used for Parking) ............................................................... 292

9.3.7 White-Black List ................................................................................................................................................................................. 293

9.3.8 Parameter Setting ............................................................................................................................................................................ 295

9.4 Guard Booth Setting ............................................................................................................................................................................... 298

9.4.1 Guard Booth Setting ...................................................................................................................................................................... 298

9.4.2 Channel Setting ................................................................................................................................................................................ 300

9.4.3 Channel Setting (When Access Controller is used for Parking) ......................................................................... 302

9.4.4 Manual Release Button ................................................................................................................................................................ 304

9.5 Charge .............................................................................................................................................................................................................. 306

9.5.1 Temporary Vehicle Charge ........................................................................................................................................................ 306

ZKBioSecurity 3.1.5.0 or above P a g e | VIII


9.5.2 Overtime Charge .............................................................................................................................................................................. 310

9.5.3 Fixed Vehicle Charge ..................................................................................................................................................................... 312

9.5.4 Shift Setting ......................................................................................................................................................................................... 313

9.5.5 Discount Strategy ............................................................................................................................................................................ 315

9.5.6 Business .................................................................................................................................................................................................. 316

9.5.7 Financial Reconciliation ............................................................................................................................................................... 318

9.6 Report ............................................................................................................................................................................................................... 319

9.6.1 License Plate Report....................................................................................................................................................................... 320

9.6.2 Charge Details .................................................................................................................................................................................... 320

9.6.3 Handover Record ............................................................................................................................................................................. 321

9.6.4 Vehicles in the Parking Lot......................................................................................................................................................... 322

9.6.5 Entry Records ...................................................................................................................................................................................... 322

9.6.6 Exit Records.......................................................................................................................................................................................... 323

9.6.7 Daily Reports ....................................................................................................................................................................................... 323

9.6.8 Monthly Reports ............................................................................................................................................................................... 323

9.7 Real-Time Monitoring............................................................................................................................................................................. 324

9.7.1 Guard Booth ........................................................................................................................................................................................ 324

9.7.2 Guard Booth (When Access Controller is used for Parking) ................................................................................. 337

9.7.3 Monitoring Room ............................................................................................................................................................................ 338

10. Patrol System Patrol System ....................................................................................................................... 339

10.1 Operation Wizard ...................................................................................................................................................................................... 339

10.2 Route Monitoring ...................................................................................................................................................................................... 339

10.3 Basic Management................................................................................................................................................................................... 340

10.3.1 Device ...................................................................................................................................................................................................... 340

10.3.2 Checkpoint ........................................................................................................................................................................................... 341

10.3.3 Parameters............................................................................................................................................................................................ 342

10.4 Patrol Management ................................................................................................................................................................................. 342

10.4.1 Plan............................................................................................................................................................................................................ 342

ZKBioSecurity 3.1.5.0 or above P a g e | IX


10.4.2 Patrol Group ........................................................................................................................................................................................ 343

10.4.3 Route ........................................................................................................................................................................................................ 344

10.5 Reports ............................................................................................................................................................................................................. 347

10.5.1 All transactions .................................................................................................................................................................................. 347

10.5.2 Patrol Records Today ..................................................................................................................................................................... 348

10.5.3 Patrol Route Statistics.................................................................................................................................................................... 348

10.5.4 Patrol Personnel Statistics .......................................................................................................................................................... 348

11. Video ................................................................................................................................................................ 350

11.1 Video Device................................................................................................................................................................................................. 350

11.2 Video Channel ............................................................................................................................................................................................. 351

11.3 Video Preview .............................................................................................................................................................................................. 352

11.4 Video Event Record.................................................................................................................................................................................. 354

11.5 Parameters ..................................................................................................................................................................................................... 355

11.6 Solutions of Exceptions ......................................................................................................................................................................... 355

12. System Management ................................................................................................................................... 357

12.1 Basic Management................................................................................................................................................................................... 357

12.1.1 Operation Logs.................................................................................................................................................................................. 357

12.1.2 Database Management ............................................................................................................................................................... 358

12.1.3 Area Setting ......................................................................................................................................................................................... 360

12.1.4 System Parameters ......................................................................................................................................................................... 361

12.1.5 E-mail Management ...................................................................................................................................................................... 361

12.1.6 Data Cleaning ..................................................................................................................................................................................... 362

12.1.7 Audio File .............................................................................................................................................................................................. 363

12.1.8 Certificate Type ................................................................................................................................................................................. 364

12.1.9 Parameters............................................................................................................................................................................................ 364

12.2 Authority Management ........................................................................................................................................................................ 365

12.2.1 User ........................................................................................................................................................................................................... 365

ZKBioSecurity 3.1.5.0 or above P a g e |X


12.2.2 Role ........................................................................................................................................................................................................... 366

12.2.3 Role Group ........................................................................................................................................................................................... 367

12.2.4 API Authorization ............................................................................................................................................................................. 368

12.2.5 Client Register .................................................................................................................................................................................... 371

12.3 Communication ......................................................................................................................................................................................... 372

12.4 Extended Management ........................................................................................................................................................................ 373

12.4.1 LED Device ........................................................................................................................................................................................... 373

Appendices ...................................................................................................................................................................... 379

Common Operations ..................................................................................................................................................................................................... 379

Access Event Type............................................................................................................................................................................................................ 382

Elevator Event Type......................................................................................................................................................................................................... 386

Offline Elevator Control Manual .............................................................................................................................................................................. 388

Offline Elevator Device ...................................................................................................................................................................................... 388

Initialize Card............................................................................................................................................................................................................ 392

Write Card .................................................................................................................................................................................................................. 392

Write management card .................................................................................................................................................................................. 394

Personnel System - Card .................................................................................................................................................................................. 395

FAQs .......................................................................................................................................................................................................................................... 396

END-USER LICENSE AGREEMENT............................................................................................................................................................................ 396

ZKBioSecurity 3.1.5.0 or above P a g e | XI


1. Requirement and Introduction
Today, modern companies' concern for security has rapidly increased. Every company wants to work
in a secured environment. To reach this level, ZKTECO brings to you a management system that
helps customers to integrate operations of safety procedures on one platform. The system is divided
into ten modules, namely: Personnel, Access, Attendance, Elevator, Hotel Systems, Visitor Systems,
Parking Lot Systems, Patrol Systems, Video Systems and Systems Management.

 Features

 It can manage around 30,000 personnel data with its powerful data processing capacity.

 Users’ data are more secured with multi-level management role-based level management.

 It can track events and operations in Real-time to ensures prompt feedbacks of data to the
supervisor.

 Configuration Requirements

 Dual core processor with speeds of 2.4GHz or above.

 System Memory of 4GB or above.

 Available space of 30GB or above. We recommend using NTFS hard disk partition as the
software installation directory.

 Monitor Resolution of 1024*768px or above.

 Operating System

 Supported Operating Systems: Windows 7 / Windows 8 / Windows 8.1 / Windows 10 /


Windows Server 2008/2013(32/64).

 Supported Databases: PostgreSQL(Default), SQL Server & Oracle(Optional).

 Recommended browser version: IE 11+/Firefox 27+/Chrome 33+

Note: You must use IE 8.0 or newer version for fingerprint registration and verification.

1.1 Personnel Module


This module is used to set Person details and their department. It primarily consists of two parts:
Department Management settings, which is used to set the Company’s organizational chart;
Personnel Management settings, which is used to input person information, assign departments,
maintain and manage personnel.

ZKBioSecurity 3.1.0.0 or above Page | 1


1.2 Access Control Module
This module is a web-based management system which enables normal access control functions,
management of networked access control panel via computer, and unified personnel access
management. The access control system sets door opening time and levels for registered users.

1.3 Attendance Module


It can achieve cross-regional attendance centralized control through the shift and shift management.
You can apply for Appended Receipt, Leave, Overtime, etc. in Exception Management. In this
module, you can also attendance point for access/parking and other functions.

1.4 Elevator Module


This module is mainly used to set device parameters (such as the swiping interval for taking elevators
and elevator key drive duration), manage personnel's access rights to different floors and elevator
control time, and supervise elevator control events. You may set registered users' rights to floors.
Only authorized users can reach certain floors within a period of time after being authenticated.

1.5 Hotel Management System Module


It provides hotel service management functions covering check-in, overstay, check-out, rate
settlement, and lock setup and management.

1.6 Visitor Module


It is a web-based management system that implements entry registration, exit registration, snapshot
capturing, visitor quantity statistics, booking management, and shares information among
registration sites. It is highly integrated with the access control system and elevator control system. It
is generally used at reception desks and gates of enterprises, to manage visitors.

1.7 Parking System Module


It is an automatic and intelligent vehicle management, effectively and accurately monitors and
manages vehicles at all exits and entrances.

1.8 Patrol Module


The online patrol system in the access control devices can help enterprise management personnel
to effectively supervise and manage the patrol personnel, plans, and routes. In addition, periodic

ZKBioSecurity 3.1.5.0 or above P a g e |2


statistics and analysis can be performed on the patrol routes and results.

1.9 Video Module


Video provides video linkage function to manage the Video Server, view the Real-Rime Video, and
query the Video Record, popup the Real-Time Video when linkage events occur.

1.10 System Management Module


System Management is primarily used to assign system users and configure the roles of
corresponding modules, manage databases such as backup, initialization, and recovery, and set
system parameters and manage system operation logs.

ZKBioSecurity 3.1.5.0 or above P a g e |3


2. System Operations
2.1 Login to the System

After installing the software, double-click the ZKBioSecurity icon to enter the system. You may
also open the recommended browser and input the IP address and server port in the address bar.
The IP address is set as: http://127.0.0.1:8088 by default.
If the software is not installed in your server, you may input the IP address and server port in the
address bar.
The user name of the super user is [admin], and the password is [admin], then click [login]. After the
first login to the system, please reset the password in [Personnel Information]. Or click [Fingerprint]
and then scan the administrator fingerprint to enter the system.

Note:
 The user name of the super user is [admin], and the password is [admin]. After the first login
to the system, please reset the password in [Personnel Information].
 If you have selected the HTTPS port during software installation, input the server IP address
and port number (for example, https://127.0.0.1:8448) in the address bar and press Enter. The
following prompt may be displayed:

ZKBioSecurity 3.1.5.0 or above P a g e |4


Here, you need to add a site exception following the exception adding prompts after you press
Advanced. Different browsers may have different setting.

 If you have selected the HTTPS port during software installation, the following message may be
displayed on the login page: 

Click Connect. On the page that is displayed, download issonline.exe and corresponding certificates
before using functions such as fingerprint and external devices.

2.2 Personal Self-Login


Click [Personal Self-Login], next to User login. For using this function, the personnel must be
registered in the system. The login account and password are the personnel number and password
registered in the system. The default password is 123456. Through this the personnel can reserve
visitor for themselves. For more details about the Reservation of visitors, please refer to Reservation.

ZKBioSecurity 3.1.5.0 or above P a g e |5


2.3 Dashboard
After logging in, the home page is displayed as shown below. If you want to go to home page from

any interface, then you can click on the upper left corner of the interface to return to
the home page.

This panel allows you to view statistics of each module and monitor real-time system events. Click

to configure the quick connection function of each module.

ZKBioSecurity 3.1.5.0 or above P a g e |6


You can quickly access desired pages through above shown functions of the module.

Click to edit the function lists in the top right corner of every module.

2.4 Activating the System


Please refer to the corresponding license document.

2.5 Modifying Password

You can modify the login password in [Personal Information] :

ZKBioSecurity 3.1.5.0 or above P a g e |7


Check [Reset Password] box to modify the password.
Note: Both, super user and the new user are created by the super user (the default password for
the new users is 111111). The user name is not case-insensitive, but the password is case-sensitive.

2.6 Customer Service


Click the [Customer Service] button on the top right corner of the interface to raise a trouble
ticket and get help in response.

2.7 Exit the system

Click the [Logout] button on the upper right corner of the interface to exit the system.

ZKBioSecurity 3.1.5.0 or above P a g e |8


ZKBioSecurity 3.1.5.0 or above P a g e |9
3. Personnel Management
Before using the other functions, please configure the personnel system: Personnel and Card
Management.

3.1 Personnel
Personnel system includes these modules: Person, Department, Position, Dismission Personnel,
Custom Attributes, and Parameters.

3.1.1 Person

When using this management program, the user shall register personnel in the system, or import
personnel information from other software or documents into this system. For details, see Common
Operations.
Main functions of Personnel Management include Add, Edit, Delete, Export and Import personnel,
and Adjust Department.
 Add Personnel

1. Click [Personnel] > [Person] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 10


Fields are as follows:
Personnel ID: An ID may consist of up to 9 characters, within the range of 1 to 79999999. It can be
configured based on actual conditions. The Personnel No. contains only numbers by default but may
also include letters.
Notes:
 When configuring a personnel number, check whether the current device supports the
maximum length and whether letters can be used in personnel ID.
 To edit the settings of the maximum number of characters of each personnel number and
whether letters can also be used, please click Personnel > Parameters.
Department: Select from the pull-down menu and click [OK]. If the department was not set
previously, only one department named [Company Name] will appear.
First Name/Last Name: The maximum number of character is 50.
Gender: Set the gender of personnel.
Password: Set password for personnel accounts. It can only contain up to 6-digits. If a password
exceeds the specified length, the system will truncate it automatically. It cannot be the same with
others password and the duress password.
Certificate Type: There are four types of certificates: ID, Passport, Driver License and Others. Click

icon to recognize the Certificate automatically. Please refer 3.1.6 Parameters and 12.2.5 Client

Register to see how to register one.

ZKBioSecurity 3.1.5.0 or above P a g e | 11


Certificate Number: Click icon and the Certificate information will pop up automatically.

Social Security Number: Set personnel social security number. The max length is 20.
Mobile Phone: The max length is 20, and this is an optional field.

Reservation Code: The max length is 6; the initial password is 123456.

Position: It is the designation of the personnel. It can be referred as the level of personnel in
workmanship.

Birthday: Input employee’s actual birthday.


Card number: The max length is 10, and it should not be repeated.
Hire Date: It is the date on which the personnel are appointed. Click to select the date.
Personal Photo: The picture preview function is provided, supporting common picture formats,
such as jpg, jpeg, bmp, png, gif etc. The best size is 120×140 pixels.
 Browse: Click [Browse] to select a local photo to upload.
 Capture: Taking photo by camera is allowed when the server is connected with a camera.
Register Fingerprint / Finger Vein: Enroll the Personnel Fingerprint, Finger Vein or Duress
Fingerprint. To trigger the alarm and send the signal to the system, scan the Duress Fingerprint.

How to register fingerprint:

1) Move the cursor to the fingerprint icon position, a registration pop-up or drive download box will
appear, click [Register].

2) Select a fingerprint, press on the sensor by three times, then “Fingerprint registered Successfully”
will be prompted.

3) Click [OK] to complete registration.

ZKBioSecurity 3.1.5.0 or above P a g e | 12


Click a fingerprint to delete. If you need to register a duress fingerprint, check the Duress Fingerprint
box.

Notes:
 If fingerprints are duplicated, “Don’t repeat the fingerprint entry” will be prompted.
 If the fingerprint sensor driver is not installed, click “Install driver” and the system will prompt to
download and install driver.
 After installing the fingerprint sensor driver, if the fingerprint register button is grey in IE browser
while it is normal in other browsers (such as Firefox, Google), you can change the settings of IE
browser, as per the following:

1) In IE browser, click [Tools]  [Internet Options]  [Security]  [Credible Sites], add


http://localhost to the credible sites, then restart the IE browser.

2) In IE browser, click [Tools]  [Internet Options]  [Advanced]  [Reset] to pop up a dialog


of Reset Internet Explorer Settings, click [Reset] to confirm; then restart the IE browser (you
may try when Point 1 does not help).

3) If all the above settings do not work, please execute following operations (take IE11 browser
as an example): click [Tools]  [Internet Options] [Advanced] [Security], check the
option of [Allow software to run or install even if the signature is ...], and remove the tick
before [Check for server certificate revocation], then restart IE.

ZKBioSecurity 3.1.5.0 or above P a g e | 13


4) If the browser is below IE8, the fingerprint registration page will be different:

5) The system supports the access from the Live20R fingerprint device and the fake fingerprint
prevention function.

 
2. Set the Access Control parameters for the personnel. Click [Access Control]:

ZKBioSecurity 3.1.5.0 or above P a g e | 14


Fields are as follows:
Level Settings: Click [Add], then set passage rules of special positions in different times zone.

Superuser: In access controller operation, a super user is not restricted by the regulations on time
zones, anti-passback and interlock and has extremely high door-opening priority.
Device Operation Authority: Select administrator to get its levels.
Delay Passage: Extend the waiting time for the personnel through the access points. Suitable for
physically-challenged or people with other disabilities.
Disabled: Temporarily disable the personnel’s access level.
Set Valid Time: Set Temporary access level. Doors can be set to open only within certain time
periods. If it is not checked, the time to open the door is always active.
Note: The system will automatically search for the relevant numbers in the departure library
during verification.

ZKBioSecurity 3.1.5.0 or above P a g e | 15


The Personnel Information List, by default, is displayed as a table. If Graphic Display is selected,
photos and numbers will be shown. Put the cursor on a photo to view details about the personnel.
Notes:
 Not all devices support the “Disabled” function. When a user adds a device, the system will
notify the user whether the current device supports this function. If the user needs to use this
function, please upgrade the device.
 Not all the devices support the ”Set Valid Time” function of setting the hour, minute, and
second. Some devices only allow users to set the year, month, and day of the local time.
When a user adds a device, the system will notify the user whether the current device
support this function. If the user needs to use this function, please upgrade the device.
3. Set the Time Attendance parameters for the personnel. Click [Time Attendance]:

Fields are as follows:


Attendance Area: You can set the staff attendance area.
Attendance Calculation: Set if the attendance needs to be calculated or not. Select [Yes] for
calculating attendance. Select [No] for not calculating the attendance.
Device Operation Role: It will set the authority for operating the device and send it to the
corresponding device.
4. Set the Elevator Control parameters for the personnel. Click [Elevator Control]:

Fields are as follows:


Superuser: In elevator controller operation, a super user is not restricted by the regulations on time

ZKBioSecurity 3.1.5.0 or above P a g e | 16


zones, holidays and has extremely high door-opening priority.
Set Valid Time: Set Temporary elevator level. Floor buttons can be set to be pressed only within the
time periods. If it is not checked, the time to press the floor button is always active.
Note: The Elevator level must be set in advance.
5. Set the Elevator Control parameters for the personnel. Click [Elevator Control]:

Fields are as follows:


License Plate: The user needs to register the license plate.
Parking Space: Parking space corresponding to the vehicle.
Note: Each personnel may register a maximum of 6 license plates.
6. Click [Personnel Detail] to access the details and editing interface, and enter information.

Fields are as follows:


Email: Set the available email address of the personnel. The max length is 30. Punctuations, namely,
the “ - ”, ” _ ” and ” . ” are supported. If the Event Notification is checked, the Email is required.
Event Notification: After checking this menu, the system will send an email to the relevant person
once an access or an elevator event occurs. If there is no setting to email sending server, the Email
Parameter Settings window will pop up if this menu is checked. Please refer to E-mail Management
for the setting information.
7. After entering the information, click [OK] to save and exit, the person details will be displayed in
the added list.

ZKBioSecurity 3.1.5.0 or above P a g e | 17


 Edit Personnel

Click [Personnel] > [Person], then select a person, and click [Edit].
 Delete Personnel

Click [Personnel] > [Person], then select a person, and click [Delete] > [OK] to delete.
Note: All relevant information about the person will be deleted.
 Dimission

1. Click [Personnel] > [Person], then select a person, and click [Dimission].

2. Select the date, then select type and write reason and click [OK].

 Adjust Department

1. Click [Personnel] > [Person], then select a person, and click [Adjust Department]:

ZKBioSecurity 3.1.5.0 or above P a g e | 18


2. Select “New Department”.

3. Click “OK” to save and exit.


 Statistics

Click [Personnel] > [Person] > [Statistics]. View the number of personnel, the number of fingerprints,
face templates, finger vein enrolled, card numbers, gender and other statistical information.

 Export

Click [Personnel]> [Person]> [Export] to export personnel information, personnel biometric


templates, personnel import templates and personnel photo.

ZKBioSecurity 3.1.5.0 or above P a g e | 19


1) Export Personnel: Personnel’s basic information is all checked (selected); check custom attributes
as required.

2) Export the Biometric Template.

ZKBioSecurity 3.1.5.0 or above P a g e | 20


3) Download Personnel Import Template: Before exporting personnel template, you can configure
the corresponding fields (including custom attributes fields) to be exported, the required fields
(Personnel ID, Name, Department ID, Department Name) do not support configuration.

4) Export Personnel Photo.

ZKBioSecurity 3.1.5.0 or above P a g e | 21


 Import

Click [Personnel] > [Person] > [Import] to import personnel information and personnel biometric
templates. It only supports personnel information templates for importing.

1) Import Personnel: Select “Yes” for [Update the existed Personnel ID in the system], the original
data will be overwritten when the personnel ID is repeated; select “No”, the opposite.

2) Import Biometric Template.

ZKBioSecurity 3.1.5.0 or above P a g e | 22


3) Import Personnel Photo: The personnel photo need to be named by personnel ID, supporting
common picture formats, such as jpg, jpeg, png, gif, etc.

 Card Printing

Click [Personnel] > [Person], then select a person and click [Print Card].

ZKBioSecurity 3.1.5.0 or above P a g e | 23


Select a card template and a printer and click [Print Card].

1. To add a template, click [Add Template].

Input the [Template Name], select the template direction, then click [OK]. The top figure below is a
vertical template and the bottom one is a transverse template.

ZKBioSecurity 3.1.5.0 or above P a g e | 24


(1) Select fields.

Select corresponding fields. The fields will be displayed in the template. You can drag the fields to
change the field dimension.

ZKBioSecurity 3.1.5.0 or above P a g e | 25


(2) You can insert pictures, background images, texts and underlines into the template. Enter the
text to be inserted in [Text] to insert texts to the template.

Notes: 

 Click to delete the inserted fields.

ZKBioSecurity 3.1.5.0 or above P a g e | 26


 Double-click the inserted pictures, texts or underlines to delete them.

 Upload a background image of 635 x 1010 pixels for a vertical template and background
image of 1010 x 635 pixels for a transverse template.

2. To edit a template, click [Edit Template]. The procedures for editing a template are the same as
those for adding a template.

Note: By default, neither of the vertical template nor the transverse template can be edited. Only
user-defined templates can be edited.

3. To delete a template, click [Delete Template].

Click [OK] to delete the template.

Note:

By default, neither of the vertical template nor the transverse template can be deleted. Only
user-defined templates can be deleted.

3.1.2 Department

Before managing company personnel, it is required to set a departmental organization chart of the
company. Upon the first use of the system, by default it has a primary department named [General]
and numbered [1]. This department can be modified but can’t be deleted.
Main functions of Department Management include Add, Edit, Delete, Export and Import
Department.
 Add a Department

1. Click [Personnel] > [Personnel] > [Department] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 27


Fields are as followed:
Department Number.: Letters and numbers are available. It cannot be identical to the number of
another department. The number shall not exceed 30 digits.
Department Name: Any combination of a maximum of 100 characters. In case of different levels, the
department names can be repeated.

Sort: Number only. The valid range is 1-999999999. The smaller the number of department sort in a
same level, the higher ranks such department have. If this field is empty, it will be arranged in
accordance with the increasing order.
Parent department: Select a parent department from the pull-down list. Parent Department is an
important parameter to determine the company’s organizational chart. On the left of the interface,
the company’s organizational chart will be shown in the form of a department tree.

2. After filling the details, you can click [OK] to complete adding; click [Cancel] to cancel it, or click
[Save and new] to save and continue adding new department.
To add a department, you can also choose [Import] to import department information from other
software or other documents into this system. For details, see Common Operations.
 Edit a Department

Click [Personnel] > [Personnel] > [Department] > [Edit].


ZKBioSecurity 3.1.5.0 or above P a g e | 28
 Delete a Department

1. Click [Personnel] > [Personnel] > [Department] > [Delete]:

2. Click [OK] to delete.


Note: If the department has sub-departments or personnel, the department cannot be deleted.
 Export

a) Export Department includes Exporting Department and Downloading Department Import


Template.
b) Department: can be exported in EXCEL, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 29


c) Download Department Import Template: Excel template file can be exported, and you have to
use this template format to import department.

 Import

1) Click [Personnel] > [Department] > [Import], the import interface is as follows

2) Import department information: can import EXCEL, CSV format files.

3) Select the destination file, fill in the header start rows, click [Next Step], the interface are as follow:

ZKBioSecurity 3.1.5.0 or above P a g e | 30


4) After importing the file, the system will match the imported report field and the data segment field
automatically. If the matching is incorrect, you can modify it. Click [Next].

3.1.3 Position

To organize the personnel as per their competency and skills, you can set position as required. If you
set position, you can easily filter report only for a particular post.

1. Click [Personnel] > [Personnel] > [Position] > [New]:

Fields are as follows:


Position Number: Set the value of position number. It can be letters or numbers, or combination of
both. Special characters are not allowed. Length shall not exceed 30 digits

Position Name: Set a suitable name for the position. Any character, maximum combination of 100
characters. Position names should not be repeated.

ZKBioSecurity 3.1.5.0 or above P a g e | 31


Sort: Supports only numbers. The valid range is 1-999999999. The smaller the number of department
sort in a same level, the higher ranking a department has. If not filled in, it will be arranged in
accordance with the added order

Parent Position: By default, there are no position. It is an important parameter to organize the
personnel as per their skills and competency.

2. Fill the details as required and save.

3.1.4 Dimission Personnel

This parameter will display the personnel who are not working in company anymore. Once the
person is dimissoned, it will be listed here.

1. You can re-employ personnel by selecting the required employee and click [Reinstatement]
below operations tab.

ZKBioSecurity 3.1.5.0 or above P a g e | 32


2. Once the details are updated, click [OK] to save.

3.1.5 Temporary Personnel

This parameter will display the personnel who are uploaded by scanning the QR code of the
big-screen facial recognition time and attendance device (uFace WG100).

 Refresh

Click [Refresh] at the upper part of the list to load new temporary personnel.
 Review

Select a temporary personnel and click [Review]:

ZKBioSecurity 3.1.5.0 or above P a g e | 33


The person reviewed will be automatically added to the list of person.
 Delete

Delete the selected temporary personnel.

3.1.6 Custom Attributes

Some personal attributes can be customized or deleted to meet different customers' requirements.
When the system is used for the first time, the system will initialize some personal attributes by
default. Customized personal attributes can be set for different projects according to requirements.
 New a Custom Attribute

Click [Personnel] > [Personnel] > [Custom Attributes] > [New], then edit the parameters and click [OK]
to save and exit.

Fields are as follows:

Display Name: Must be filled and should not be repeated. Max length is 30.

Input Type: Select the display type from “Pull-down List”, ”Multiple Choice”, “Single Choice” and
“Text”.

ZKBioSecurity 3.1.5.0 or above P a g e | 34


Attribute Value: Suitable for lists displaying as ‘‘Pull-down List’’, ’’Multiple Choice’’ and ‘‘Single Choice’’
lists. Use a “;” to distinguish the multiple values. If the input type is “Text”, the attribute value is not
suitable.

Row/Colum: The column and row of a field are used together to control the display position of the
field. Numerals are supported. The column number cannot exceed 99, and the row number can only
be 1 or 2. The combination of the column and row must not be duplicated. As shown in the
following figure, Employee Type, is in the first column and first row, and Hire Type is in the first
column and second row.

 Editing a Custom Attribute

Click [Edit] to modify the corresponding attributes.


 Deleting a Custom Attribute

Click [Delete] to delete an unused attribute. If the attribute is in use, the system will pop up
confirmation before confirming to delete.

Note: The custom attribute will not be recovered once deleted.

3.1.7 Parameters

1. Click [Personnel] > [Personnel] > [Parameters]:

ZKBioSecurity 3.1.5.0 or above P a g e | 35


2. Set the maximum length for a Personnel ID. and whether it will support letters or not. If
Personnel ID Auto increment is selected as Yes, then while adding personnel one by one, the ID
in field automatically updates to the next new number.

3. Set the maximum length (binary number) of the card number that the current system will
support.

4. Set whether the personnel ID for the demission employee can be kept.

5. Set whether the temporary personnel uploaded and registered by scanning the QR code of the
big-screen facial recognition time and attendance device need to review;

6. Set the card format currently used in the system. The card format cannot be switched once it is
set up.

7. Set whether “Multiple Cards per Person” will be allowed or not.

8. Registration Client.

 If no driver has been installed, the [Download Driver] link is displayed. Click the link to download
and install the driver.

ZKBioSecurity 3.1.5.0 or above P a g e | 36


 Select the corresponding registration code and click [Register].

Note: Click [System] > [Authority Management] > [Client Register] to view the registration code.

9. Click [OK] to save the settings and exit.

 More Cards

After the “Multiple cards per person” function is enabled, you can set multiple cards on the Personnel
page.

Note: Not all devices support this function. For details, please consult the technical personnel.

ZKBioSecurity 3.1.5.0 or above P a g e | 37


3.2 Card Management
There are three modules in card management: Card, Wiegand Format and Issue Card Record.

3.2.1 Card

 Batch Issue Card

1. Click [Personnel] > [Card Manage] > [Batch Issue Card]:

2. Enter Start and End Personnel No. and click [Generate List] to generate personnel list and show
all personnel without cards within this number series.
Note: The Start and End Personnel No. only support numbers.
3. Select Card Enrollment Method: Register with a USB Reader or device.
If you want to enroll a card with a USB Reader, you may place the card over the "issue machine"
directly. The System will get the card number and issue it to the user in the list on the left.
For the use of device, you need to select the position of punching, click [Start to read], the
system will read the card number automatically, and issue it to the user in the list on the left one by
one. After that, click [Stop to read].
Note: During the “Batch Issue Card”, system will check whether the card issuer issues card or not, if
card has been issued before, the system will prompt “The Card Number has already been issued”.
4. Click [OK] to complete card issue and exit.

3.2.2 Wiegand Format

Wiegand Format is the card format that can be identified by the Wiegand reader. The software is

ZKBioSecurity 3.1.5.0 or above P a g e | 38


embedded with 9 Wiegand formats. You may set the Wiegand card format as needed.

This software supports two modes for adding Wiegand Format, if mode 1 does not meet your
setting requirement, you may switch it to mode 2. Take Wiegand Format 37 as an example:

Format Specifying:
“P” indicates Parity Position; “s” indicates Site Code; “c” indicates Cardholder ID; “m” indicates
Manufactory Code; “e” indicates Even Parity; “O” indicates Odd Parity; “b” indicates both odd check
and even check; “x” indicates parity bits no check.
The previous Wiegand Format 37: the first parity bits (p) check “eeeeeeeeeeeeeeeeee”; the second
parity bits check “ooooooooooooooooooo”. Card Check Format can only be set “p, x, m, c, s”; Parity
Check Format can only be set “ x, b, o, e”.
 Card Formats Testing

If the number on the card is different from the number that is displayed after swiping the card, you
can use this function to calibrate the Wiegand format. The page is displayed as follows:

ZKBioSecurity 3.1.5.0 or above P a g e | 39


Select a device that supports the card formats testing function and input the number and site code
(optional) found on your card.
1) Click [Read Card] and swipe the card on the device reader. The original card number read by the
device is displayed in the input box on the right.
2) Click [Recommend Card Format]. The Wiegand card format recommended for the input card
number is displayed below.
3) If [Auto calculate site code while the site code is left blank] is selected, the software will calculate
the site code based on the card format and card number.
4) Click [OK]. The page will skip to the Wiegand Format Adding page to save the recommended
Wiegand format.
Note: The card formats testing function is supported only by certain devices.

3.2.3 Issue Card Record

It records the life cycle of a card and display the operations performed on the card.

ZKBioSecurity 3.1.5.0 or above P a g e | 40


Note: The cards and card issuing records of an employee will be deleted altogether when the
employee’s account is deleted completely.

3.3 AD Management
For details, please refer to its user manual.

ZKBioSecurity 3.1.5.0 or above P a g e | 41


4. Access
The system needs to be connected to an access controller to provide access control functions. To use
these functions, the users must install devices and connect them to the network first, then set
corresponding parameters, so that they can manage devices, upload access control data, download
configuration information, output reports and achieve digital management of the enterprise.

4.1 Device
Add an access device, then set the communication parameters of the connected devices, including
system settings and device settings. When communication is successful, you can view here the
information of the connected devices, and perform remote monitoring, uploading and downloading
etc.

4.1.1 Device

 Add Device

There are two ways to add Access Devices.


1. Add Device by manually
A. Click [Access Device] > [Device] > [New] on the Action Menu, the following interface will be
shown:
TCP/ IP communication mode RS485 communication mode

ZKBioSecurity 3.1.5.0 or above P a g e | 42


Fields are as follows:
IP Address: Enter the IP Address of the access controller.
Communication port: The default value is 4370.
Serial Port No.: COM1~COM254.
RS485 Address: The machine number, ranging from 1 to 63. If Port No. is the same, it is not allowed
to set repeated RS485 addresses.
Baud Rate: Same as the baud rate of the device. The default is 38400.
RS485 Address Code Figure: Display the code figure of RS485 address.
Common options:
Device Name: Any character, up to a combination of 20 characters.
Communication Password: A maximum of 6 digits; both number and letters are available.
Notes:
 You do not need to input this field if it is a new factory device or just completed initialization.

 When communication password for the standalone device’s is set as “0”, it means no
password. However, in case for access control panel, it means the password is 0.

 You need to restart the device after setting the door sensor of the standalone device.

Icon Type: It will set the representation of the device. You can choose as per the kind of device; Door,
Parking barrier, Flap Barrier.

Control Panel Type: One-door access control panel, two-door access control panel, four-door access
control panel, Standalone Device.
Area: Select specific areas of devices. After setting areas, devices (doors) can be filtered by areas
upon Real-Time Monitoring.
Switch to Two-door Two-way: When the control panel type is set to the four-door access control
panel, the four-door access control panel can be switched to the two-door two-way access control
panel in the system.
Add to Level: Automatically add the device to the selected level. The device cannot be automatically
added to the selected level if the number of personnel exceeds 5000. You can add personnel after
the device is successfully added.
Clear Data in the Device when Adding: If this option is checked, the system will clear all data in the
device (except the event logs). If you add the device just for demonstration or testing, there is no
need to tick it.
B. After editing, click [OK], and the system will try to connect the current device.

ZKBioSecurity 3.1.5.0 or above P a g e | 43


If it is successfully connected, it will read the corresponding extended parameters of the device.
Extended Device Parameters: It includes serial number, device type, firmware version number,
auxiliary input quantity, auxiliary output quantity, door quantity, device fingerprint version, and
reader quantity.
Note: When deleting a new device, the software will clear all user information, time zones,
holidays, and access control levels settings (including access levels, anti-pass back, interlock settings,
linkage settings etc.) from the device, except the events records (unless the information in the device
is unusable, or it is recommended not to delete the device in used to avoid loss of information).
Access Controller Settings:

 TCP/ IP Communication Requirements

Supports enabling TCP/ IP communication, directly connect device to the PC or connect to the local
network, input the IP address and other information of the device.

 RS485 Communication Requirements

Supports enabling RS485 communication, connect device to PC by RS485, input the serial port
number, RS485 machine number, band rate and other information of the device.
2. Add Device by Searching Access Controllers
Search the access controllers in the Ethernet.
(1) Click [Access Device] > [Device] > [Search Device], to open the Search interface.
(2) Click [Search], and it will prompt [Searching……].
(3) After searching, the list and total number of access controllers will be displayed.

Note: UDP broadcast mode will be used to search access device. This mode cannot perform

ZKBioSecurity 3.1.5.0 or above P a g e | 44


cross-Router function. IP address can provide cross-net segment, but it must be in the same subnet,
and needs to be configured the gateway and IP address in the same net segment.
(4) Click on [Add] in the search list.
If the device is a pull device, you may input a device name, and click [OK] to complete device adding.

Clear Data in the device when Adding: Tick this option, after adding device, the system will clear all
data in the device (except the event logs).

If the device is a push firmware device, the following windows will pop-up after clicking [Add]. If IP
Address in [New Server Address] is selected, then configure IP address and port number. If Domain
Address in [New Server Address] option is selected, then configure domain address, port number
and DNS. Device will be added to the software automatically.

ZKBioSecurity 3.1.5.0 or above P a g e | 45


New Server Address: To add a device by IP Address or Domain Address, devices can be added to the
software by entering the domain address.
New Server Port: Set the access point of system.
DNS: Set a DNS address of the server.

Clear Data in the Device when Adding: If this option is selected, then after adding device, the
system will clear all data in the device (except the event logs). If you add the device merely for
demonstration or testing, there is no need to tick it.
Note: When using either of the above three device adding methods, if there exist residual data in
the original device, please sync original data to it after adding a new device to the software by
clicking [Device] > [Synchronize All Data to Devices], otherwise these original data may conflict with
normal usage.
(5) The default IP address of the access device may conflict with the IP of a device on the Local
network. You can modify its IP address: click [Modify IP Address] beside the [Add] and a dialog
box will pop up in the interface. Enter the new IP address and other parameters (Note: Configure
the gateway and IP address in the same net segment).
Note: Some PUSH devices support SSL. To use this function, select the HTTPS port during software
installation and ensure that the device firmware supports SSL.

4.1.2 Device Operation

For communication between the system and device; data uploading, configuration downloading,
device and system parameters shall be set. Users can edit access controllers within relevant levels in
the current system; users can only add or delete devices in Device Management if needed.

ZKBioSecurity 3.1.5.0 or above P a g e | 46


 Edit or Delete a Device

Edit: Click Device Name or click [Edit] to access the edit interface.
Delete: Select device, click [Delete], and click [OK] to delete the device.

For the details and settings of the above parameters, see Device. Items in grey are not editable. The
device Name should be unique and must not be identical to another device.
Access Control Panel Type cannot be modified. If the type is wrong, users need to manually delete
the device and add it again.
 Export

Device information can be exported in EXCEL, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 47


 Disable/Enable

Select device, click [Disable/ Enable] to stop/ start using the device. When communication between
the device and the system is interrupted or device fails, the device may automatically appear in
disabled status. After adjusting local network or device, click [Enable] to reconnect the device and
restore device communication.
 Synchronize All Data to Devices

Synchronize data of the system to the device. Select device, click [Synchronize All Data to Devices]
and click [OK] to complete synchronization.

Note: [Synchronize All Data to Devices] will delete all data in the device first (except transactions),

ZKBioSecurity 3.1.5.0 or above P a g e | 48


and thus download all settings again. Please keep the internet connection stable and avoid power
down situations. If the device is working normally, please use this function with caution. Execute it
in rare user situations to avoid impact on normal use of the device.
 Upgrade Firmware

Tick the device that needs to be upgraded, click [Upgrade firmware] to enter edit interface, then click
[Browse] to select firmware upgrade file (named emfw.cfg) provided by Access software, and click
[OK] to start upgrading.
Note: The user shall not upgrade firmware without authorization. Contact the distributor before
upgrading firmware or upgrade it following the instructions of the distributor. Unauthorized
upgrade may affect normal operations.
 Reboot Device

It will reboot the selected device.


 Get Device Option

It gets the common parameters of the device. For example, get the firmware version after the device
is updated.
 Get Personnel Information

Renew the current number of personnel, fingerprints, finger vein and face templates in the device.
The final value will be displayed in the device list.
 Get Transactions

Get transactions from the device into the system. Two options are provided for this operation: Get
New Transactions and Get All Transactions.
Get New Transactions: The system only gets new transactions since the last collected and recorded
transaction. Repeated transactions will not be rewritten.
Get All Transactions: The system will get transactions again. Repeated entries will not be shown
twice.
When the network status is healthy and the communication between the system and device is
normal, the system will acquire transactions of the device in real-time and save them into the system
database. However, when the network is interrupted or communication is interrupted for any
reasons, and the transactions of the device have not been uploaded into the system in real-time,
[Get Transactions] can be used to manually acquire transactions of the device. In addition, the
system, by default, will automatically acquire transactions of the device at 00:00 on each day.
Note: Access controller can store up to 100 thousand of transactions. When transactions exceed
this number, the device will automatically delete the oldest stored transactions (deletes 10 thousand
transactions by default).
 Synchronize Time

It will synchronize device time with server’s current time.


ZKBioSecurity 3.1.5.0 or above P a g e | 49
 Set Server

It will set parameters of the device connected to the server.


 Set Background Verification Parameters

1. Select the required online device; click [More] > [Set Bg verification parameters]:

Background verification: Enable or Disable Background verification function.


If the device is offline: If the controller is offline, the device has levels of Standard Access Level or
Access Denied.
2. After setting parameters, click [Start] button to issue command to the device setting.
Note: If you need advanced access control functions, please enable [Background verification], and
issue the background verification parameters to the device.
 Set Device Time Zone

If the device supports the time zone settings and is not in the same time zone with the server, you
need to set the time zone of the device. After setting the time zone, the device will automatically
synchronize the time according to the time zone and server time.
 Set Daylight Saving Time

According to the requirements of different regions, set Daylight Saving Time rules.
 Modify IP Address

ZKBioSecurity 3.1.5.0 or above P a g e | 50


Select a device and click [Modify IP address] to open the modification interface. It will obtain a
real-time network gateway and subnet mask from the device. (Failed to do so, you cannot modify
the IP address). Then enter a new IP address, gateway, and subnet mask. Click [OK] to save and quit.
This function is the similar as [Modify IP Address Function] in Device.
 Modify Communication Password

The system will ask for the old communication password before modifying it. After verification, input
the new password twice, and click [OK] to modify the communication password.
Note: Communication password shouldn’t contain spaces; it is recommended to use a
combination of numbers and letters. Communication password setting can improve the device’s
security. It is recommended to set communication password for each device.
 Modify RS485 Address

Only the devices that use RS485 communication and with no DIP Switch can modify RS485 address.
 Modify the fingerprint identification threshold (Ensure that the access controller supports
fingerprint function)

Users can modify the fingerprint identification thresholds in the devices; it ranges from 35 to 70 and
it is 55 by default. The system will read the thresholds from the device. Users can view the thresholds
devices list. More than one device can be changed by using Batch operation function.
 Switch network connection

This function is applicable to InBio5 series access control panels, which is used to switch among

ZKBioSecurity 3.1.5.0 or above P a g e | 51


different network connection modes of the control panel.
 View Rules of Devices

Shows the Access rules in the device.

 View Device Capacity

It checks the capacity of personnel’s biometric details in the device.

 Set the Registration device 

Set the registration device only when the standalone device’s data such as personnel can
automatically upload. 

ZKBioSecurity 3.1.5.0 or above P a g e | 52


 

4.1.3 Doors

1. Click [Access Device] > [Device] > [Door] to enter Door Management interface (click “Area Name”
in the left, system will automatically filter and display all access devices in this area).

 Door parameter modification:


Select the door to be modified, and click Door Name or [Edit] button below operations to open the
Edit interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 53


Fields are as follows:
Device Name: It can’t be edited.
Door Number: System will automatically name it according to doors quantity of the device. This
number will be consistent with the door number on the device.
Note: By default, the suffix number in the Door Name is consistent with the Door Number, but
1/2/3/4 in Anti-Passback and interlock refer to the Door Number, rather than the number following
the Door Name, and they are not necessarily related.
Door Name: The default is “device name _door number”. The field can be modified as needed. Up to
30 characters can be entered.
Active Time Zone: Active Time Zone must be input, so that the door can be opened and closed
normally. A Passage Mode Time Zone must be set within the Active Time Zone. By default, both are
null.
Note: For a door, in Normal Open state, a person who is allowed to be verified 5 times
consecutively (verification interval should be within 5 seconds) can release the current Normal Open
status and close the door. The next verification will be a normal verification. This function is only
effective at the Active Time Zone of specified doors. And within the same day, other Normal Open
intervals set for the door and First-Person Normally Open settings will not take effect anymore.
Lock Open Duration: It is the time period for which the door remains unlocked after punching. The
unit is second (range: 0~254 seconds), and the default value is 5 seconds.
Operate Interval: It is the Interval between two punches. The unit is second (range: 0~254 seconds),

ZKBioSecurity 3.1.5.0 or above P a g e | 54


and the default value is 2 seconds.
Anti-Passback Duration of Entrance: Only one entry is allowed with a reader in this duration. The
unit is minute (range: 0~120 minutes), and the default value is 0 minute.
Door Sensor Type: None (will not detect door sensor), Normal Open, Normal Close. The default
value is NO. If you have selected as Normal Open or Normal Close, you need to set Door Sensor
Delay and decide whether or not Close and Reverse-lock is required. When the door sensor type is
set as Normal Open or Normal Close, the default door sensor delay is 15 seconds, and the close and
reverse state is enabled.
Door Sensor Delay: The duration for delayed detection of the door sensor after the door is opened.
When the door is not in the Normally Open period, and the door is opened, the device will start the
counting. It will trigger an alarm when the delay duration is expired and stops the alarm when you
close the door. The default door sensor delay is 15s (range: 1~254 seconds). Door Sensor Delay
should be greater than the Lock Open Duration.
Close and Reverse State: It will set to either lock or not lock the door after door closing. Check it for
locking after door closing.
Verification Mode: Identification modes include Only Card, Card plus Password, Only Password, Card
plus Fingerprint, Card or Fingerprint. The default value is Card or Fingerprint. When both Card and
Password mode is selected, make sure the door is equipped with a reader that has keyboard.

Wiegand Format: Select the Wiegand card format that can be identified by the Wiegand reader of
the door. If the format of punched card is different with the setting format, the door cannot be
opened. The software is embedded with 9 formats, and the default is Wiegand card format, except
for the card format name containing a, b or c.

Request to Exit (REX Mode): Locking indicates that the door will be locked after the exit button is
pressed. Unlocking indicates that the door will be unlocked after the exit button is pressed. The
default value is unlocking.
Request to Exit Delay (REX Delay): It indicates the alarm delay time for door detection after the exit
button is locked. When the door is unlocked forcibly, the system will detect the door status after a
period of time. The default is 10s (range: 1~254 seconds). The exit button has to be locked before
setting this option.
REX Time Zone: The button is available only in the specified time segment.

Anti-Passback Duration of Entrance: Based on the lock opening duration, the door sensor delays
exit delay. The duration of the entry will be extended. To function this feature, you need to check
[Delay passage] option to extend relevant duration when adding or editing staff information. For
example, you may extend the duration of entrance for people with disabilities.
Open Door Delay: The time period to keep the door open after the verification completes (range:
1~60 seconds).
Multi-Person Operation Interval: The time interval between two verifications with cards or
fingerprints (range: 1~60 seconds).

ZKBioSecurity 3.1.5.0 or above P a g e | 55


Duress Password, Emergency Password: Duress means any threats, violence, constraints, or other
action used to coerce someone into doing something against their will. In these situations, input
Duress Password (with an authorize card) to open the door. When the door is opened with Duress
Password, the alarm is triggered. Upon emergency, user can use Emergency Password (named Super
Password) to open door. Emergency Password allows normal opening, and it is effective in any time
zone and any type of verification mode, usually used for the administrator.

 Duress Password Opening (used with an authorized card): Password should be a number not
exceeding 6 digits. When Only Card verification mode is used, you need to press [ESC] first, and
then press the password plus [OK] button, then finally punch legal card. The door opens and
triggers the alarm. When Card + Password verify mode is used, please punch legal card first,
then press the password plus [OK] button (same as normal opening in card plus password
verification mode), the door opens and triggers the alarm.

 Emergency Password Opening: Password must be 8 digits. The door can be opened only by
entering the password. Please press [ESC] every time before entering password, and then press
[OK] to execute.

When using Duress Password or Emergency Password, the interval for entering each number shall
not exceed 10 seconds, and both the passwords should not be the same.
Disable Alarm: Check the box to disable the alarm voice in real-time monitoring page.
The above Settings are Copied to: It has below two options.

 All doors of current device: Click to apply the above settings to all doors of the current
access device.

 All doors of all devices: Click to apply the above settings to all doors of all access devices
within the current user’s level.

2. After setting parameter(s), click [OK] to save and exit.

4.1.4 Reader

1. Click [Access Device] > [Reader] on the Action Menu, click on reader name or [Edit]:

ZKBioSecurity 3.1.5.0 or above P a g e | 56


Name: Name of the reader displayed on the list page.
Communication Type: Wiegand/RS485, Wiegand, RS485, and Disabled are available. When a
communication type is selected, the reader interface on the device will receive data (including card
and fingerprint data) for the specified type only.

Encrypt: If this option is selected, the device may only be used with encrypted readers, such as SF10
and FR1300.
Bind/Unbind Camera
Through this option, the reader can be connected to the cameras, and the system will make a video
linkage (pop-up videos, videos or screenshots) once there is a corresponding event occurs.

Click [Bind/Unbind Camera] to select channel(s):

ZKBioSecurity 3.1.5.0 or above P a g e | 57


Select and move the required reader towards right list and Click [OK] to finish.

Note: A reader can be used to bind more than one channel.

4.1.5 Auxiliary Input

It is mainly used to connect to the devices, such as the infrared sensors or smog sensors.
1. Click [Access Device] > [Auxiliary Input] on the Action Menu, to access below shown interface:
2. Click on Name or [Edit] to modify the parameters as shown below:

Fields are as follows:


Name: You can customize the name according to your preference.
Printed Name: It will be the printed name on the hardware, such IN5.
Active Time Zone: Auxiliary input is available only in the specified time segment.

Note: Only Name, Active Time Zone and Remarks can be modified.

3. Click [OK] to save the name and remark and exit.


 Bind/Unbind Camera
Through this option, the reader can be connected to the cameras, and the system will make a video
linkage (pop-up videos, videos or screenshots) once there is a corresponding event occurs. For this,
the interaction setting in Linkage or in Global Linkage should be done before. For details, please refer
to Reader: Bind/Unbind Camera.

Note: An auxiliary input point can bind more than one channel.

ZKBioSecurity 3.1.5.0 or above P a g e | 58


4.1.6 Auxiliary Output

It is mainly related to alarm and is used when linkage is working.


1. Click [Access Device] > [Auxiliary Output] on the Action Menu to access the following interface:

2. Click [Edit] to modify the parameters:

Fields are as follows:


Name: You can customize the name according to your preference.
Printed Name: The printing name in the hardware, for example OUT2.
Passage Mode Time Zone: The auxiliary output will be in normal open or normal close in the
selected time zone.
Note: Only Name, Passage Mode Time Zone and Remarks can be modified.

3. Click [OK] to save the name and remark and exit.

ZKBioSecurity 3.1.5.0 or above P a g e | 59


4.1.7 Event Type

It will display the event types of the access devices.


1. Click [Access Device] > [Event] to access the following page:

2. Click [Edit] or click the event type name to edit:

Fields are as follows:


Event Level: Normal, Exception, and Alarm are available.
Event Name: It can’t be modified.
Event Sound: You can set custom sound being played when the event occurs in real-time
monitoring.

ZKBioSecurity 3.1.5.0 or above P a g e | 60


Copy the above settings to all devices: This event will be applied to all current devices within the
purview of the same user event number.
Set Audio: Same as the event sound. Click [Set Audio]:

You can upload an audio from your local PC. The file must be in wav or mp3 format, and it must not
exceed 10MB.

For more details about Event Type, please refer to Access Event Type.

4.1.8 Daylight Saving Time

DST, also called the Daylight-Saving Time, is a system to adjusting the official prescribe local time to
save energy. The unified time adopted during the implementation of known as the "DST". Usually,
the clocks are adjusted forward one hour in the summer to make people sleep early and get up early.
It can also help to save energy. In autumn, clocks are adjusted backwards. The regulations are
different in different countries. At present, nearly 70 countries adopt DST.

To meet the DST requirement, a special function can be customized. You may adjust the clock one
hour forward at XX (hour) XX (day) XX (month) and one hour backward at XX (hour) XX (day) XX
(month) if necessary.

 Add DST

1. Click [Access Device] > [Daylight Saving Time] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 61


Set as "Month-Weeks-week hour: minute" format. The start time and end time is needed. For
example, the start time can be set as “second Monday in March, 02:00”. The system will be advanced
one hour at the start time. The system will go back to the original time at the end time.

 Use a DST

The user can enable the DST setting on a device: In the DST interface, select a DST setting, and click
[DST Setting], select the device to apply the DST setting to and click [OK] to confirm.

Notes:

 If a DST setting is in use, it cannot be deleted. Stop the DST before deleting.

ZKBioSecurity 3.1.5.0 or above P a g e | 62


 If a DST setting is in use, the latest modification will be sent to the device. Disconnection of
the relevant device will lead to transmission failure, and it will resume at the next connection.

 In the Door Management module of the access control system, you can enable or disable
DST function. If you enable DST setting, the system will be advanced one hour at the start
time. The system will go back to the original time at the end time. If you did not set a DST in
the device, the system will prompt “The Daylight Saving Time hasn’t been set in this device”
when you disable the function.

4.1.9 Device Monitoring

By default, it monitors all devices within the current user’s level. You may click [Access Device] >
[Device Monitoring] to view a list of operation information of devices: Device Name, Serial No., Area,
Operation Status, Current status, Commands List, and Related Operation.

 Export

Device commands can be exported in EXCEL, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 63


You may clear the command as needed. Click [Clear Command] in operations column:

Click [OK] to clear.


Notes:
 After the implementation of Clear Command, you can perform the Synchronize All Data to
Devices operation on the device list to re-synchronize data in the software to the device, but
this operation cannot be performed when the user capacity and fingerprint capacity are fully
consumed on the device. Once the capacity is insufficient, you can replace the current device
with a higher-capacity one or delete the rights of some personnel to access this device, and
then perform the Synchronize All Data to Devices operation.
 Operate State is the content of communications equipment of current device, mainly used
for debugging.
 The number of commands to be performed is greater than 0, indicating that the data is not
yet synchronized to the device, so wait for the synchronization to complete.

4.1.10 Real-Time Monitoring

Click [Access Device] > [Real-Time Monitoring].


It will monitor the status and real-time events of doors under the access control panels in the system

ZKBioSecurity 3.1.5.0 or above P a g e | 64


in real-time, including normal events and abnormal events (including alarm events).
The Real-Time Monitoring interface is shown as follows:

Different icons represent status as followed:

Icons Status Icons Status

Device banned Door Offline

Door sensor unset, Relay closed Door sensor unset, Relay


/ /Without relay status / opened/Without relay status

Online status Door closed, Relay Online status Door closed, Relay
/ closed/Without relay status / opened/Without relay status

Online status Door opened, Relay Online status Door opened, Relay
/ closed/Without relay status / opened/Without relay status

Door opened alarming, Relay closed Door opened alarming, Relay opened

Door opening timeout, Relay closed Door opening timeout, Relay


/ /Without relay status, Door Sensor / opened/Without relay status
Opened

Door opening timeout, Relay closed/ Door opening timeout, Relay opened/
Door Sensor Closed Door Sensor Closed

ZKBioSecurity 3.1.5.0 or above P a g e | 65


Door closed alarming, Relay Door closed alarming, Relay
/ closed/Without relay status / opened/Without relay status

Door sensor unset, Door alarming, Relay Door sensor unset, Door alarming,
closed Relay opened

Door opening timeout, Without relay


Door locking
  status/Door Sensor Closed   

Note: Without relay status, indicates that the current firmware does not support “detect relay
status” function.

1. Door

 Monitoring All

By default, the home page displays all doors of the panels within the user's level. User may monitor
door(s) by setting the Area, Access Control or Door.
Remote Opening/Closing: It can control one door or all doors.
To control a single door, right click over it, and click [Remote Opening/ Closing] in the pop-up dialog
box. To control all doors, directly click [Remote Opening/ Closing] behind Current All.
In remote opening, user can define the door opening duration (The default is 15s). You can select
[Enable Intraday Passage Mode Time Zone] to enable the intraday door passage mode time zones, or
set the door to Normal Open, then the door will not be limited to any time zones (open for 24
hours).
To close a door, select [Disable Intraday Passage Mode Time Zone] first, to avoid enabling other
normal open time zones to open the door, and then select [Remote Closing].
Note: If [Remote Opening /Closing] fails, check whether the devices are disconnected or not. If
disconnected, check the network.
Cancel the alarm: Once an alarming door is displayed on the interface, the alarm sound will be
played. Alarm cancellation can be done for single door and all doors. To control a single door, move
the cursor over the door icon, a menu will pop-up, then click [Remote Opening/ Closing] in the
menu. To control all doors, directly click [Remote Opening/ Closing] behind Current All.
Note: If [Cancel the alarm] fails, check if any devices are disconnected. If found disconnected,
check the network.
Remote Normally Open: It will set the device as normal open by remote.
Activate Lockdown: It will remotely set the door status to locked status. After this, the door wouldn’t
receive any operations, such as card reading and remote operations. This function is supported only
by certain devices.

Deactivate Lockdown: It will unlock a locked door. This function is supported only by certain

ZKBioSecurity 3.1.5.0 or above P a g e | 66


devices.
Personnel photo display: If a Real-Time Monitoring event contains personnel activity, the monitor
will display the person photo (if no photo is registered, the monitor will display default photo). The
event name, time and date are displayed.
Play Audio: If this option is selected, it plays an audio after an alarming event occurs.

 Quick Management of Doors

If you move the cursor to a door’s icon; you can perform the above operations in a quick way. In
addition, you can query the latest events from the door.

Query the latest events from the door: Click to quickly view the latest events happened on the
door.
Issue card to person: If you swap an unregistered card, a record with a card number will pop-up in
real-time monitoring interface. Right click that card number, and a menu will pop-out. Click “Issue
card to person”, to assign that card to one person.

 Event monitoring

The system will automatically acquire records of devices being monitored (by default, display 200
records), including normal and abnormal access control events (including alarm events). Normal
events will appear in green; alarm events will appear in red; other abnormal events will appear in
orange.

2. Auxiliary Input
It monitors current auxiliary input events in real-time.

ZKBioSecurity 3.1.5.0 or above P a g e | 67


3. Auxiliary Output
Here you can perform Remote open, Remote Close, Remote Normally Open.

4. Elevator
About the real-time monitoring of elevators, please refer to Real-Time Monitoring.

4.1.11 Alarm Monitoring

It monitors alarm events of doors. If a door sends an alarm and is not attended or confirmed, the
page will keep on displaying the alarm events.

Note: If the firmware version of the device supports, the Event Description will pop-up, or else
only “Alarm” will be displayed in Event Description without any details.
Cancel alarm: Select the door in alarm status, and click [Cancel alarm], then the system will send an
email to alarm monitoring recipient’s mailbox (The mailbox must be set in the Parameters)
Note: When a door has multiple alarm states, it will display just one alarm type description in the
descending severity order, the order are as follows: tamper-resistant alarm  duress alarm (password +

ZKBioSecurity 3.1.5.0 or above P a g e | 68


fingerprint)  duress password or fingerprint alarm  unexpected opening alarm  opening timeout
alarm  device disconnects alarm.

4.1.12 Map

Click [Access Device] > [Map] > [New] to add a map.

After adding, users can add door on the map, perform zoom-in, zoom-out, etc. If users relocated or
modified the map, click [Save Positions] to save. The user can view the new setting at next visit.

Add / Delete Map: Users can add or delete a map as needed.


Edit Map: Users can edit map name, change map or the area it belongs to.
ZKBioSecurity 3.1.5.0 or above P a g e | 69
Adjust map (includes door): Users can add a door on the map or delete an existing one (right click
the door icon, and select [Delete Door]), or adjust the map or position(s) of the door or camera icons
(by dragging the door or camera icons), adjust the size of the map (click [Zoom in] or [Zoom out] or
click [Full Screen]).
Door operation: If you move the cursor to a door, the system will automatically filter and displays
the operation according to the door status. Users can do remotely open / close doors, cancel alarms,
etc.
Levels control:
(1) Users need to select the relevant area for the map when adding levels. The area will be relevant
to the user access levels, users can only view or manage the map within levels. If the relevant
area of a map is modified, all doors on the map will be cleared. Users need to add the doors
manually again.
(2) When an administrator is adding a new user, he can set the user operation rights in role setting,
such as Save positions, Add Door, Add Camera, etc.
Notes:
 In map modification, users can choose to modify the map name but not the path. Users only
need to check the box to activate the modification option.
 The system supports adding multi doors at the same time. After adding the doors, users need
to set the door position on the map and click [Save].
 When modifying door icon, especially when users zoomed out the map, the margin for top
and left shall not be smaller than 5 pixels, or system will prompt error.
 Users are recommended to add a map size under 1120 * 380 pixels. If several clients access
the same server, the display effect will be different according to resolutions of screen and the
settings of browsers.

4.2 Access Control Management

4.2.1 Time Zones

It sets usage time of a door; the reader is usable during valid time periods of certain doors and
unusable during other time periods. Time Zone can also be used to set Normal Open time periods or
set access levels so that specified users can only access specified doors during specified time periods
(including access levels and First-Person Normally Open).
The system controls access according to Time Zones (up to 255 time zones). The format of each
interval for a time zone: HH: MM-HH: MM. Initially, by default, the system has an access control time
zone named [24 hours Accessible]. This time period cannot be modified and deleted. The user can
add new Access Control Time Zones that can be modified or deleted.

ZKBioSecurity 3.1.5.0 or above P a g e | 70


1. Add Access Control Time Zone
a) Click [Access Control] > [Time zones] > [New] to enter the time zone setting interface:

The parameters are as follows:


Time Zone Name: Any character, up to a combination of 30 characters.
Remarks: Detailed description of the current time zone, including explanation of current time zone
and primary applications. Users can input up to 50 characters in this field.
Interval and Start/ End Time: One Access Control Time Zone includes 3 intervals for each day in a
week, and 3 intervals for each of the three Holidays. Set the Start and End Time of each interval.

ZKBioSecurity 3.1.5.0 or above P a g e | 71


Setting: If the interval is Normal Open, just enter 00:00-23:59 as interval 1, and 00:00-00:00 as interval
2/3. If the interval is Normal Close: all inputs will be 00:00-00:00. If users use only one interval, they
just need to fill in interval 1, and interval 2/3 will be the default value. Similarly, when users only use
the first two intervals, the third interval will be the default value. When using two or three intervals,
users need to ensure that the two or three intervals do not overlap, and the time shall not cross the
days. Or the system will prompt error.
Holiday Type: Three holiday types are unrelated to the day of a week. If a date is set to a holiday type, the
three intervals of the holiday type will be used for access purpose. The holiday type is optional. If the user
does not enter one, the system will use the default value.
Copy on Monday: You can quickly copy the settings of Monday to other weekdays.
b) After setting, click [OK] to save, and it will display in the list.
2. Maintenance of Access Control Time Zones
Edit: Click the [Edit] button under Operation to enter the edit interface. After editing, click [OK] to
save.
Delete: Click the [Delete] button under Related Operation, then click [OK] to delete, or click [Cancel]
to cancel the operation. A time zone in use cannot be deleted. An alternative way is to tick the check
boxes before one or more time zones in the list, and click the [Delete] button over the list, then click
[OK] to delete, and click [Cancel] to cancel the operation.

4.2.2 Holidays

Access Control Time of a holiday may differ from that of a weekday. The system provides access
control time setting for holidays. Access Control Holiday Management includes Add, Modify and
Delete.

ZKBioSecurity 3.1.5.0 or above P a g e | 72


 Add
(1) Click [Access Control] > [Holidays] > [New] to enter edit interface:

Fields are as follows:


Holiday Name: Any character, up to a combination of 30 characters.
Holiday Type: Holiday Type 1/2/3, namely, a current holiday record belongs to the three holiday
types and each holiday type includes up to 32 holidays.
Start/ End Date: The date format: 2010-1-1. Start Date cannot be later than End Date, otherwise the
system will prompt an error message. The year of Start Date cannot be earlier than the current year,
and the holiday cannot be set across two different years.
Recurring: It refers a holiday whether to require modification in different years. The default is No. For
example, the Near Year’s Day is on January 1 each year, and can be set as Yes. The Mother's Day is on
the second Sunday of each May; this date is not fixed and should be set as No.
For example, the date of Near Year’s Day is set as January 1, 2010, and the holiday type is 1, then on
January 1, Access Time Control will not follow the time of Friday, but the Access Control Time of
Holiday Type 1.
(2) After editing, click [OK] button to save, and it will display in the holiday list.

 Modify
Click Holiday Name or [Edit] button under Operations to enter the edit interface. After modification,
click [OK] to save and quit.
 Delete
In the access control holiday list, click [Delete] button under Operations. Click [OK] to delete, click
[Cancel] to cancel the operation. An Access Control Holiday in use cannot be deleted.

4.2.3 Access Levels

Access levels indicate that one or several selected doors can be opened by verification of a

ZKBioSecurity 3.1.5.0 or above P a g e | 73


combination of different person within certain time zone. The combination of different person set in
Personnel Access Level option.

 Add
1. Click [Access Control] > [Access Levels] > [New] to enter the Add Levels editing interface:

2. Set each parameter: Level Name (unrepeatable), Time Zone.


3. Click [OK], the system prompts “Immediately add doors to the current Access Control Level”, then
click [OK] to add doors, then click [Cancel] to return the access levels list. The added access level
is displayed in the list.

Note: Different doors of different panels can be selected and added to an access level.

ZKBioSecurity 3.1.5.0 or above P a g e | 74


4.2.4 Set Access By Levels

Add/Delete Personnel for Selected Levels:

(1) Click [Access Control] > [Access Levels] > [Set Access By Levels] to enter the edit interface, then
click an Access level in the list on the left, personnel having right of opening doors in this access
level will be displayed in list on the right.

(2) In the left list, click [Add Personnel] under Operations to pop up the Add Personnel box; select
personnel (multiple) and click to move to the selected list on the right, then click [OK] to
save and exit.

(3) Click the level to view the personnel in the list on the right. Select personnel and click [Delete
Personnel] above the list on the right, then Click [OK] to delete.

4.2.5 Set Access By Person

Add selected personnel to selected access levels or delete selected personnel from the access levels.
Add/Delete levels for Selected Personnel:
(1) Click [Access Control] > [Access Levels] > [Set Access By Person], click Employee to view the
levels in the list on the right.
(2) Click [Add to Levels] under Related Operations to pop up the Add to Levels box, select Level
(multiple) and click to move it to the selected list on the right; then click [OK] to save.
(3) Select Level (multiple) in the right list and click [Delete from levels] above the list, then click [OK]
to delete the selected levels.
Setting Access Control for Selected Personnel:
A. Select a person in the list on the left and click [Access Control Setting].

ZKBioSecurity 3.1.5.0 or above P a g e | 75


B. Set access control parameters and then click [OK] to save the settings.

4.2.6 Set Access By Department

Add the selected department to the selected access levels or delete the selected department from
the access levels. The access of the staff in the department will be changed.

4.2.7 Interlock

Interlock can be set for two or more locks belonging to one access controller. When one door is
opened, the others will be closed, or you cannot open the door.

Before setting the interlock, please ensure that the access controller is connected with door sensor,
which has been set as NC or NO state.
 Add Interlock

1. Click [Access Control] > [Interlock] > [New] to enter the edit interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 76


2. Select Device Name. When users are adding devices, interlocked devices cannot be seen in the
dropdown list. After deleting established interlock information, the corresponding device will
return to the dropdown list. Interlock setting will vary with the number of doors controlled by
selected devices:

 A one-door control panel has no interlock settings.

 A two-door control panel: 1-2 two-door interlock settings.

 A four-door control panel: 1-2 two-door interlock; 3-4 two-door interlock; 1-2-3 three-door
interlock; 1-2-3-4 four-door interlock.

3. Select Interlock Rule, tick an item, then click [OK] to complete. The new added interlock settings
will be shown in the list.

Note: During editing, the device cannot be modified, but the interlock settings can be modified. If
the interlock settings are not required for the device any more, the interlock setting record can be
deleted. If users delete a device record, its interlock setting record, if any, will be deleted.

4.2.8 Linkage

Linkage setting means when an event is triggered at an input point of the access control system, a
linkage action will occur at the specified output point to control events such as verification, opening,
alarm and abnormal of system, and list them in the corresponding monitoring view.

Add Linkage setting:

ZKBioSecurity 3.1.5.0 or above P a g e | 77


1. Click [Access Control] > [Linkage] > [New]

2. Enter the linkage name, select a linkage device, linkage trigger conditions, input point, output
point, then set linkage action, video linkage and other parameters.

3. After selecting devices, corresponding linkage settings will be displayed. The System will first
judge whether the device is successfully connected and has read extended parameters. If there is
no available extended parameters, the system cannot set any linkage. If there is an available
extended parameter(s), the system will show linkage settings according to the door quantity,
auxiliary input and output quantity of currently selected device:

Note: Linkage Trigger Conditions contain Door Event and Auxiliary Input Event. And “Fail to
connect server”, “Recover connection”, “Device connection off” will be filtered from Door Event.

ZKBioSecurity 3.1.5.0 or above P a g e | 78


4. Select the Input Point and Output Point, Linkage Action, Video Linkage and Email Address.

The fields are as follows:

Linkage Name: Set a linkage name.

Linkage Trigger Condition: Linkage Trigger Condition is the event type of selected device. Except
Linkage Event Triggered, Enable/Disable Auxiliary Output, and Device Start. All events could be
trigger condition.

Input Point: Any, Door 1, Door 2, Door 3, Door 4, Auxiliary Input 1, Auxiliary Input 2, Auxiliary Input 3,
Auxiliary Input 4, Auxiliary Input 9, Auxiliary Input 10, Auxiliary Input 11, Auxiliary Input 12 (the
specific input point please refers to specific device parameters).

Output Point: Lock 1, Lock 2, Lock 3, Lock 4, Auxiliary Output 1, Auxiliary Output 2, Auxiliary Output 3,
Auxiliary Output 4, Auxiliary Output 6, Auxiliary Output 8, Auxiliary Output 9, and Auxiliary Output 10
(the specific output point please refers to specific device parameters).

Action Type: Close, Open, Normal Open, Lock, Unlock. The default is Close. To open, delay time or
Normal Open shall be set.

ZKBioSecurity 3.1.5.0 or above P a g e | 79


Video Linkage:

 Pop up video: Whether to set the pop-up preview page in real-time monitoring, and set the
pop-long.

 Video: Enable or disable background video recording and set the duration of background
video recording.

 Capture: Enable or disable background snapshots.

Delay: Ranges from 1~254 second (This item is valid when Action type is Open).

5. After editing, click [OK] to save and quit, then the added linkage setting will be shown in the list.

For example, if users select Normal Punching Open Door as trigger condition, then the input point is
Door 1, output point is Lock 1, action type is Open, delay is 60 second. When Normal Punching Open
Door occurs at Door 1, the linkage action of Open will occur at Lock 1, and the door will be open for
60 second.

Note: During editing, you cannot modify the device, but modify the linkage setting name and
configuration. When delete a device, its linkage setting record, if any, will be deleted.

If the device and trigger condition are the same, and system has linkage setting record where the
input point is a specific door or auxiliary input, it will not allow users to add (or edit) a linkage setting
record where the input point is any.

On the contrary, if the device and trigger condition are the same, and the system has linkage setting
record where the input point is ‘Any’, it will not permit user to add (or edit) a linkage setting record
where the input point is a specific door or auxiliary input.

In addition, same linkage setting at input point and output point is not allowed. The same device
permits consecutive logical linkage settings. The system allows to set several trigger conditions for a
linkage setting at a time.

ZKBioSecurity 3.1.5.0 or above P a g e | 80


4.2.9 Anti-Passback

Currently anti-passback settings support in and out anti-passback. In some special occasions, it is
required that the cardholders who entered from a room by card swiping at a door device must
swipe the cards over a device at the same door when leaving to keep the entry and exit records
strictly consistent. The user can use this function just by enabling it in the settings. This function is
normally used in prisons, the army, national defense, scientific research, bank vaults, etc.

Add Anti-Passback Settings:

1. Click [Access Control] > [Anti-Passback] > [New] to show the edit interface:

2. Select devices. When users are adding Anti-Passback Rules, devices with anti-passback settings
cannot be seen in the dropdown list. When deleting established anti-passback information, the
corresponding device will appear in the dropdown list again. The settings vary with the number
of doors controlled by the device.

 Anti-passback settings of a one-door control panel: Anti-passback between door readers.

 Anti-passback settings of a two-door control panel: Anti-passback between readers of door 1;


anti-passback between readers of door 2; anti-passback between door 1 and door 2.

 Anti-passback settings of a four-door control panel: Anti-passback of door 1 and door 2;


anti-passback of door 3 and door 4; anti-passback of door 1/2 and door ¾; anti-passback of
door 1 and door 2/3; anti-passback of door 1 and door 2/3/4; Anti-passback between readers
of door 1/2/ 3/ 4.

Note: The door reader mentioned above includes Wiegand reader that connected with access
controller and InBio reader. The single and two door controller with Wiegand reader includes out
and in reader. There is only “In reader” for four door control panel. The reader number of 1, 2 (that is

ZKBioSecurity 3.1.5.0 or above P a g e | 81


RS485 address or device number, the same below) is for door 1, the reader number of 3, 4 is for door
2, etc. No need to consider if it is a Wiegand reader or InBio reader when you are setting the
anti-passback between doors or between readers, just make sure the in or out reader is set
according to the actual requirements. For the reader number, odd number is for in reader, and even
number is for out reader.

3. Select Anti-Passback Rule, and tick one item, click [OK] to complete, then the added
anti-passback settings will be shown in the list.

Note: When editing, you cannot modify the device, but can modify anti-passback settings. If
anti-passback setting is not required for the device any more, the anti-passback setting record can
be deleted. When you delete a device, its anti-passback setting record, if any, will be deleted.

4.2.10 First-Person Normally Open

First-Person Normally Open: During a specified interval, after the first verification by the person
having First-Person Normally Open level, the door will be Normal Open, and will automatically
restore closing after the valid interval has expired.

Users can set First-Person Normally Open for a specific door (the settings include door, door opening
time zone and personnel with First-Person Normally Open level). A door can set First-Person
Normally Open for multiple time zones. The interface of each door will show the number of existing
First-Person Normally Open.

When adding or editing First-Person Normally Open settings, you may only select door and time
zones. After successful adding, add personnel that can open the door. You can browse and delete
the personnel on the right of the interface.

Operation steps are as follows:

1. Click [Access Control] > [First-Person Normally Open] > [New], select Door Name and Passage
Mode Time, and click [OK] to save the settings.

ZKBioSecurity 3.1.5.0 or above P a g e | 82


2. Click [Add Personnel] under Related operation to add personnel having First-Person Normally
Open level (these personnel must have access control level), then click [OK] to save.

4.2.11 Multi-Person Group

The door will open only after the consecutive verification of multiple people. Any person verifying
outside of this combination (even if the person belongs to other valid combination) will interrupt the
procedure and you need to wait 10 seconds to restart verification. It will not open by verification by
only one of the combination.

(1) Click [Access Control] > [Multi-Person Group] > [New] to access the following edit interface:

Group name: Any combination of up to 30 characters that cannot be identical to an existing group

ZKBioSecurity 3.1.5.0 or above P a g e | 83


name.

After editing, click [OK] to save and return. The added Multi-Person Personnel Group will appear in
the list.

(2) Click [Add personnel] under Related Operations to add personnel to the group.

(3) After selecting and adding personnel, click [OK] to save and return.

Note: A person can only be grouped into one group.

4.2.12 Multi-Person Opening Door

Set levels for personnel in Multi-Person Personnel Group.

It is a combination of the personnel in one or more Multi-Person Personnel Groups. When setting the
number of people in each group, you can configure one group (such as combined door opening by
two people in one group) or multiple groups (such as combined door opening by four people,
including 2 people in group 1 and 2 people in group 2), and at least one group shall consist of number
of door opening people instead of 0, and the total number shall not be greater than 5. In addition, if
the number of people entered is greater than that in the current group, Multi-Person Opening Door
will be disabled.

Multi-Person Opening Door Settings:

(1) Click [Access Control]  [Multi-Person Opening Door]  [New]:

(2) The maximum number of multi-person opening door people for combined door opening is 5.
That in the brackets is the current actual number of people in a group. Select the number of
people for combined door opening in a group, and click [OK] to complete.

ZKBioSecurity 3.1.5.0 or above P a g e | 84


Note: The default Credit Card Interval is 10 seconds, it means that the interval of two personnel’s
verification must not exceed 10 seconds. You can modify the interval if the device supports.

4.2.13 Verification Mode Group

Verification Mode: You can set verification modes for doors and personnel separately in a specified
time segment.
 Add
1. Click [Access Control] > [Verification Mode] > [New] to go to the page for adding a verification
mode rule.

2. Set the following parameters: Select a rule name (not repeatable), the time segment, and
verification mode for a door or person in each time segment.

3. Click [OK] to finish the setting.

4. On the list page, you can add or delete doors in the verification mode rule.

Note: If a rule includes the verification mode for personnel, you cannot select doors with the
RS485 readers when adding doors. You can modify only the configuration on the reader setting
page before adding doors.

Verification Mode Group: Set appropriate personnel for configured verification mode rule.

4.2.14 Parameters

Click [Access Control] > [Parameters] to enter the parameter setting interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 85


Type of Getting Transactions

 Periodically

Start from the setting and efficient time, the system attempts to download new transactions every
time interval.

 Set the Time for Obtaining New Transactions

The selected Time is up, the system will attempt to download new transactions automatically.

The Real Time Monitoring Page Pop-up Staff Photo Size: When an access control event occurs, the
personnel photo will pop up. The size of pop photos shall be between 80 to 500 pixels.

Alarm Monitoring Recipient Mailbox: The system will send email to alarm monitoring recipient’s
mailbox if there is any event.

4.3 Advanced Functions


Advanced Access control is optional function. If needed, please contact business representative or
pre-sales engineer, you can use these functions after obtaining license and activating.

Note: Except Global Linkage, to use other advanced functions you need to enable Background
Verification. For detail, please see Device Operation.

4.3.1 Zone

It mainly uses partition Zones in advanced access control. When using such advanced functions as
Global Zone APB, you must define Access Zones.

ZKBioSecurity 3.1.5.0 or above P a g e | 86


 Add

1. Click [Advanced Functions] > [Zone] > [New] to enter the Add Zone interface:

2. Set Zone Code, Name, Parent Zone and Remark as required.

3. Click [OK] to save and quit. The added Zone will appear in the list.

What rules inside:

ZKBioSecurity 3.1.5.0 or above P a g e | 87


4.3.2 Reader Define

Reader Define indicates that Reader control from one access zone to another one, it is based on
access zone. If advanced functions are needed, you shall set the Reader Define.

 Add

1. Click [Advanced Functions] > [Reader Define] > [New] to enter the add interface:

2. Set Reader Name, Goes From and Goes To as required.

3. Click [OK] to save and quit. The added Reader Define will appear in the list.

 Batch New

1. Click [Advanced Functions] > [Reader Define] > [Batch New] to enter the batch add interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 88


2. Click [Add], select Reader(s) and move towards right and click [OK].

3. Set Goes from and Goes to as required and press[OK].

4.3.3 Who is Inside

After entering the zone, you can view all personnel status in the zone by zone tree.

ZKBioSecurity 3.1.5.0 or above P a g e | 89


 Delete Personnel

Deleting personnel in the selected area will clear the global anti-passback status of the personnel.

 Export

Export selected personnel information in the area; you can export Excel, PDF, CSV format.

4.3.4 Global Anti-Passback

Global Zone APB can set Anti-Passback across devices; you can use this function after setting Global
Anti-passback. You must set Access Zone and Reader Define before using, and also the device that has set
Anti-Passback shall issue background verification parameters.
ZKBioSecurity 3.1.5.0 or above P a g e | 90
 Add

1. Click [Advanced Functions] > [Global Anti-passback] > [New] to enter the add interface:

2. Set Rule Name (Unrepeatable), Zone, Anti-passback Type, Lockout Duration, Reset Anti-passback
Status and When to Reset the Anti-passback as required.

Zone: Select an option from the dropdown list, Corresponding doors will display in the text box of ”
The following doors control access in and out of the zone”. At the same time, the doors obey the rule
of one door cannot set as the boundary of two independent Anti-Passback.

Anti-passback Type: Logical Anti-passback, Timed Anti-passback or Timed Logic Anti-passback.

 Logical Anti-passback: The door will not open if the entry and exit records is not in consistent
with Anti-passback zone.

 Timed Anti-passback: In specified time period, user can enter Anti-passback zone only
once. After the Time period has expired, user state will be cleared, and allow user to enter
this zone again.

 Timed Logic Anti-passback: In Specified time period, Users who enter Anti-passback zone
must obey the rule of Logical Anti-passback. If users exceed timed period, system will time
again.

Lockout Duration: Only select Timed Anti-passback and Timed Logic Anti-passback in Anti-passback
Type. Lockout Duration can be set.

Reset Anti-passback Status: Tick it to clear Anti-passback status of personnel in the system, and
recover initial state. Only tick this option. When to Reset the Anti-passback can be select. After the
reset time of the anti-passback has expired, system will clear all the Anti-passback status of personnel
in zone.

ZKBioSecurity 3.1.5.0 or above P a g e | 91


When to Reset the Anti-passback: Select time to reset Anti-passback.

Apply to: All Personnel, Just Selected Personnel and Exclude Selected Personnel three types.

 Apply to All Personnel: Can only edit and does not support select personnel.

 Apply to Just Selected Personnel: The anti- passback is only effective for these selected
personnel.

 Apply to Exclude Selected Personnel: The anti- passback only effective for these exclude
selected personnel.

3. Click [OK] to save and quit. The added Global Zone APB will display in the list.

4.3.5 Global Linkage

The global linkage function allows you to configure data across devices. Only push devices support this
function.

 Add

1. Click [Advanced Functions] > [Global Linkage] > [New]:

Apply to all personnel: If this option is selected, this linkage setting is effective for all personnel.

Active Time: Set the active time of the linkage setting.

2. Choose Global Linkage trigger conditions, the input point (System will filter devices according to
the choice in first step) and the output point, Set up linkage action. For more details about these
parameters, please refer to Linkage Setting.

Note: You can select multiple Door Events, but “Fail to connect server”, “Recover connection” and

ZKBioSecurity 3.1.5.0 or above P a g e | 92


“Device connection off” will be filtered automatically from Door Event.

3. Click [OK] to save and quit. The added Global Linkage will display in the list.

4.3.6 Global Interlock Group

The global interlock group groups the doors in the global interlock, but to use the global interlock
function, the device must be enabled with background authentication.

1. Click [Advanced Functions] > [Global Interlock Group]> [New]:

Group Name:

(1) Any combination of up to 30 characters that cannot be identical to an existing group name.

(2) After editing, click [OK] to save. After confirming that add the door immediately, the information
of added door will appear in the list.

(3) Click [Add Door] under Related Operations to add door to the group.

(4) After selecting and adding personnel, click [OK] to save and return.

Group Interlock: If the option is selected, set global interlock rule for the interlocking group.

4.3.7 Global Interlock

The global interlock function allows you to configure data across devices. Only push devices support
this function.

ZKBioSecurity 3.1.5.0 or above P a g e | 93


Multi-Person Opening Door Setting:

1. Click [Advanced Functions] > [Global Interlock]> [New]:

Name:

(1) Any combination of up to 30 characters that cannot be identical to an existing name.

(2) After editing, click [OK] to save. After confirming that add the group immediately, the
information of add group will appear in the list.

(3) Click [Add Group] under Related Operations to add door to the group.

(4) After selecting and adding group, click [OK] to save and return.

Group Interlock: If the option is selected, set global interlock rule for the interlocking group.
Notes:   

 In the same interlock, all the doors in the group cannot be duplicated.
 If the interlock group exists in the interlock function, it cannot be deleted directly.

4.3.8 Person Availability

It is mainly used to limit valid date/ after the first use of valid days/ use number of times of personnel
in advanced access control area.

ZKBioSecurity 3.1.5.0 or above P a g e | 94


 Set Zone Properties

ZKBioSecurity 3.1.5.0 or above P a g e | 95


1. Click [Advanced Functions] > [Person Availability] > [Set Zone Properties] > [New], the following
interface will be shown:

Use: It is divided into Valid Date, After the first use of valid days and Use number of times,
corresponding to Date, Days and Times.

2. Click [Advanced Functions] > [Person Availability] > [Set Zone Properties] > [Add Personnel],
apply the zone properties to the specified personnel.

ZKBioSecurity 3.1.5.0 or above P a g e | 96


 New

Click [Advanced Functions] > [Person Availability] > [New], the following interface will be shown:

ZKBioSecurity 3.1.5.0 or above P a g e | 97


Select the Zone and Zone Properties to control the person availability.

 Delete

Click [Advanced Functions] > [Person Availability], select an Availability Name, click [Delete] > [OK] to
delete.

4.3.9 LED Data

Click [Advanced Functions] > [LED Data], the following interface will be shown:

 Add

ZKBioSecurity 3.1.5.0 or above P a g e | 98


Name: LED data name.

Data Type:

Text: Send self-defined texts to blocks.

Zone data: Total number of personnel in the zone to be sent and statistical number of
personnel in the departments in the zone.

Notes:
 The access control zone is that in the advanced access control.

 If the content to be sent is department, please select the department for statistics
collection.

Changed data: Real-time information about personnel going in and out displays in the selected
LED block. The content to be sent can be selected.

 Edit
Click Data Name or [Edit] button under Operations to enter the edit interface. After modification,
click [OK] to save and quit.
 Delete
In the LED Data list, click [Delete] button under Operations. Click [OK] to delete, click [Cancel] to
cancel the operation.

4.4 Access Reports


Includes “All transactions”, “Events from Today”, “All Exception Events” and so on. You can export
after query.

You can generate statistics of relevant device data from reports, including card verification
information, door operation information, and normal punching information, etc.

About the Normal and abnormal event please refer to Real-Time Monitoring for details.

Verify mode: Only Card, Only Fingerprint, Only Password, Card plus Password, Card plus Fingerprint,
Card or Fingerprint and etc.

Note: Only event records generated when the user uses emergency password to open doors will
include only password verification mode.

4.4.1 All Transactions

Because the data size of access control event records is large, you can view access control events as
specified condition when querying. By default, the system displays latest three months transactions.
Click [Reports] > [All Transactions] to view all transactions:
ZKBioSecurity 3.1.5.0 or above P a g e | 99
Media File: You can view or download the photos and videos created in the video system.

Clear All Data: Click [Clear All Data] to pop up prompt and click [OK] to clear all transactions.

Export: You can export all transactions in Excel, PDF, CSV format.

4.4.2 Events from Today

Check out the system record today.

Click [Reports] > [Events from Today] to view today’s records.

ZKBioSecurity 3.1.5.0 or above P a g e | 100


You can export all events from today in Excel, PDF, CSV format.

4.4.3 Last Known Position

Check out the final position of personnel who has access privileges to access. It is convenient to
locate a person.

Click [Reports] > [Last Know Position] to check out.

ZKBioSecurity 3.1.5.0 or above P a g e | 101


Locate the location of personnel: Personnel with electronic map authority, click on the
corresponding [Personnel ID], you can locate the specific location of the personnel in the electronic
map by the way of flashing the door.

You can export all personnel final position data in Excel, PDF, CSV format.

4.4.4 All Exception Events

Click [Reports] > [All Exception Events] to view exception events in specified condition. The options
are same as those of [All Transactions].

ZKBioSecurity 3.1.5.0 or above P a g e | 102


Clear All Data: Click [Clear All Data] to pop up prompt, and then click [OK] to clear all exception
events.

Export: You can export all exception events in Excel, PDF, CSV format.

4.4.5 Access Rights By Door

View related access levels by door. Click [Reports] > [Access Rights By Door], the data list in the left
side shows all doors in the system, select a door, the personnel having access levels to the door will
be displayed on the right data list.

ZKBioSecurity 3.1.5.0 or above P a g e | 103


You can export all the personnel having access levels to the door data in Excel, PDF, CSV format.

4.4.6 Access Rights By Personnel

View related access levels by door or personnel.

Click [Reports] > [Access Rights By Personnel], the data list in the left side show all doors in the
system, select personnel, the personnel having access levels to the door will display on the right data
list.

ZKBioSecurity 3.1.5.0 or above P a g e | 104


You can export all the door information in Excel, PDF, CSV format.

4.5 Video Integration


For details about this function, please refer to its user manual. 

ZKBioSecurity 3.1.5.0 or above P a g e | 105


5. Attendance Management
To help companies perform information-based attendance management, this software implements
automatic collection, statistics, and query of employee attendance data. This improves the
management of human resource and facilitates the check-in of employees. This software enables the
management personnel to collect statistics and check the employee attendance and enables the
management department to query and appraise the attendance of all departments, thus allowing
enterprises to accurately acquire the employee attendance data.

5.1 Device
This function includes adding device, adding area and assigning it to the personnel.
Set the communication parameters of the device. The system can communicate with the device
properly only when communication parameters are configured correctly, including the parameter
settings in the system and the device. After successful communication, you can view the information
on the connected device and can perform remote monitoring of the device/upload and download.

ZKBioSecurity 3.1.5.0 or above P a g e | 106


5.1.1 Area

Area is a concept of space that facilitates management of devices in a specific area.


In this system, area setting is a process of dividing devices by zone. A prominent feature of “Area” is
to allow the system to automatically manage the employee information on devices. According to
requirements, areas can be allocated to devices (one device can belong to one area only), and
employees can be allocated to one or more areas.

• New
(1) Click [Device] > [Area] > [New] to display the new area page.

ZKBioSecurity 3.1.5.0 or above P a g e | 107


(2) After the information is complete, click [OK] to finish new addition, click [Cancel] to cancel new
addition, click [Save and New] to save new and continue to add.

Fields are as follows:


Area Number: Only support letters and numbers, should not be repeated with other area numbers,
the length of not more than 30.
Area Name: Any character, up to 30 characters. (Should not contain quotation marks).
Parent Area: The system default region as the default parent region, drop-down check box to select
another parent region, click [OK].
Note: Any character, up to 50 characters combination.

• Edit
Click [Device] > [Area], click [Edit] under the corresponding device to edit the device information.

• Delete
(1) Click [Device] > [Area], select the delete you want to delete, click [Delete].
(2) Click [OK] to confirm deletion, click [Cancel] to cancel deletion.

Note: If there is sub-area or personnel and device under the area, the area cannot be deleted. Also,
the default area cannot be deleted.

ZKBioSecurity 3.1.5.0 or above P a g e | 108


5.1.2 Device

• New
(1) In the function menu, click [Device] > [Device] > [New], the following page is displayed:

(2) After the information is complete, click [OK] to finish new addition, click [Cancel] to cancel new
addition.
Fields are as follows:
Device Name: Time and attendance device name, any character up to 20.
Device Serial Number: Attendance equipment serial number.
IP Address: The IP address of the attendance device.
Communication port: Attendance equipment port default 4370.
Attendance Area: The equipment for regional division, to achieve regional data management.
Time Zone: Time and attendance at different time zones.
Enrollment Device: If not selected, the user data uploaded by the device will not be processed (the
attendance record of the device will not be checked). If checked, the user data uploaded by the
device will be processed.
Data Update Flag: Software-based, allowing the device to upload what types of data.

ZKBioSecurity 3.1.5.0 or above P a g e | 109


Data Sending Flag: The main function supported by the device, the software determines which data
to send to the device.
Refresh Duration (minute): How often the device will make a command request.
Timed Sending Time: The device at a certain point in time for data transmission, can be set to 10,
separated by semicolons.
The maximum number of commands to communicate with the server: The maximum one-time
pull command, the maximum value for processing.
Inquiry record time: Query the record interval time of the device.

1. Refresh

Click Refresh to get latest Device List Status Information.

2. Delete

Select device and click [Delete] to remove device and its information.

3. Enable

After the device is enabled, the upload and download of data are enabled normally. (When the
device is enabled, users can choose whether it is a registration device or not).

ZKBioSecurity 3.1.5.0 or above P a g e | 110


4. Disable

After the device is disabled, the device is not allowed to upload and send data.

5. Synchronize software data to the device

Select the device to be synchronized and send the corresponding device area data in the software
to the device.

6. Attendance Data Checking

Select the device to proofread data, select the proofing date, the software issues a command to
proofread the software and device attendance data.

7. Get the Specified personnel data

Select the device from the list and click Get the Specified personnel data. Below prompt will
appear.

Enter the desired person numbers separated by comma and click [OK].

ZKBioSecurity 3.1.5.0 or above P a g e | 111


8. Upload Data again

Select the device in which you want to upload data. Click to enter the check box to upload the data
type: attendance record / personnel information / attendance photo, click the confirmation to get
such information again from the device.

9. Clear Device Commands

Select the device to be cleared. It clears the operation command issued by the software in the
setting.

10. Public Message

You can set public message in the device so that the device can display short messages on the page
(Not all the devices support this function).

11. Clear the attendance photos

Select the device. This function will clear all the attendance photo records from the device.

12. Clear the attendance transactions

Select the device. This function will clear all the attendance data records from the device.

13. Reboot Device

Select the device you want to restart; the software sends a reboot command and restarts the device.

14. Get Device Option

Select the device of which you want to get information, click Get software to send command, get
the device related parameters, such as: serial number, IP address, device model, firmware version
number, etc.

• Edit
Click the corresponding operation under the "Edit" function in the device list.

ZKBioSecurity 3.1.5.0 or above P a g e | 112


• View Command
After clicking [View Command], the page will navigate automatically to device commands page in
system management module to show command queries.

ZKBioSecurity 3.1.5.0 or above P a g e | 113


5.1.3 Personnel Area Setting

Specifies area for Personnel.

1. Refresh

Click [Refresh] to view the latest personnel information for a particular area.

2. Area Personnel Setting

ZKBioSecurity 3.1.5.0 or above P a g e | 114


After selecting the area, click on the area personnel settings, select the staff, whom you want to
assign in a particular attendance area, move them on to the right list and click [OK].

3. Delete Personnel

This function helps to delete personnel from assigned area(s).

4. Private Message

We can set message for an employee, which will be displayed to employee on the device at a
defined time. (Useful for the supported devices)

ZKBioSecurity 3.1.5.0 or above P a g e | 115


5. Resynchronize to device

Once we have assigned area(s) to the personnel, we need to send all the data to the device of that
area(s), so that personnel attendance matches will the information.

5.1.4 Attendance point

You can set attendance points at the access doors. It will help to segregate the doors of a specific
area. For example, if you want to add an entrance door in an attendance point, then create a point
named Entry and select the specific area and add door(s) of that area.

ZKBioSecurity 3.1.5.0 or above P a g e | 116


5.1.5 Advertisement

 Refresh

Click [Refresh] to load new advertisement.

 New

Click [Device] > [Advertisement] > [New] to display the new advertisement page.

After the information is complete, click [OK] to finish new addition, click [Cancel] to cancel new
addition, click [Save and New] to save new and continue to add.

Fields are as follows:


File Type: Picture or video.

Media Resource Type: Select local resources or external resources.

ZKBioSecurity 3.1.5.0 or above P a g e | 117


Local Resources: Click [Browse] to upload the local file.

External Resources: Input the external resources link.

Name: Any character, up to 40 characters. (Should not contain quotation marks).

The added content is used for setting device advertisement in 5.1.6 Advertising Settings.

 Delete

Delete the selected advertisement.

5.1.6 Advertisement Settings

 Add Advertisement

ZKBioSecurity 3.1.5.0 or above P a g e | 118


Click [Add Advertisement] to add the advertisement to the device. The content list is added in 5.1.5
Advertisement.

 Delete

Delete the added advertisement of the device.

5.2 Basic Information

5.2.1 Rule

Since the attendance system is not the same in all companies, you need to manually set the
attendance parameters to ensure the accuracy of the final attendance calculation. The attendance
rule setting is a major way to demonstrate a company’s attendance system.

ZKBioSecurity 3.1.5.0 or above P a g e | 119


(1) Basic Rule Setting

Check-in Rule:
Earliest Principle: By default, it takes the first check-in in the effective range.
Closest Principle: It will take the closet check-in in the effective card-taking range of the working
hours in the punch card records.
Check-out Rule:
Late Principle: By default, it takes the last punch card record within the range of valid attendance
range;
Closest Principle: It takes the punch card record closest to the closing time within the range of valid
attendance).
The minimum time period should be greater than (minimum 10 minutes): 120 (default); Range:
10-999; Required.
The maximum time period should be less than (maximum 1440 minutes): 600 (default); Range:
10-1440; Required.

ZKBioSecurity 3.1.5.0 or above P a g e | 120


Late & Early Leave Counted as Absent: No (default), Yes refers to that if there is late or early leave,
then the time period is recorded as absence.
Attendance calculation result when the shift cross-day:

The first day: The effective working hours of the second day is counted to the first day;

The second day: The effective working hours of the first day is counted to the second day.

Overtime Statistics: Yes (default), No; the first overtime switch for statistics, if set to No, overtime will
not be calculated.
Search Shift Record: The attendance calculation is done based on this priority order
Intelligent Matching Shift Rule: Longest Working duration, Least abnormal (default). The longest
working duration will calculate each shift respectively to obtain the most effective longest time shift.
The Least abnormal will consider the shift which has minimum number of the exceptions (such as
late, leave early, etc.).

(2) Calculate Settings

Hour Conversion Rule: Take the result calculated by the formula as the standard;
The calculation results are taken as the criterion, and then the decimal place of the calculation result
is retained in combination with the exact digits of the decimal point.
Residue range: The result of the calculation is processed according to rules, and then the decimal
places of the calculation result are retained in combination with the precise digits of the decimal
point. As set in above figure, if the result is 55 min, then it will take as 1 hour, and if the result is 25
min, then it will take as half an hour.
Day Conversion Rule: The settings are same as Hour conversion rule.
Absent days conversion rule: If you want to make this calculation effective in attendance calculation
then select Days Conversion Rule.
Decimal point accurate to digits: Default is 1, available choices are 1, 2 & 0.

ZKBioSecurity 3.1.5.0 or above P a g e | 121


(3) Other settings

Sets the representation of the attendance results in the report: Set the required symbol for the
following data; Expected/Actual, Late, Early, Absent, No Check-in, No Check-out, Leave, Overtime,
Adjust Rest, Append Attendance, Trip, Out. Repeated symbols are allowed.

5.2.2 Holiday

• Adding

(1) In the function menu, click [Basic Information][Holiday][New], the following page is
displayed:

(2) After the information is entered, click [OK] to finish new addition, click [Cancel] to cancel new
addition, click [Save and Continue] to save and continue adding.

Field Description:
Number: Length 5, required;
Name: Character length 10; required;
Start time: Holiday start date, the format is date and time;
End time: Holiday end date, the format is date and time;
Remark: Character length 50;

• Delete
ZKBioSecurity 3.1.5.0 or above P a g e | 122
Select the Holiday which need to be deleted and click [Delete].

• Edit

Select holiday which need to be edited and click [Edit] beside holiday information.

5.2.3 Leave Type

• Adding

(1) In the function menu, click [Basic Information][Leave Type][New], the following page is
displayed:

(2) After the information is entered, click [OK] to finish new addition, click [Cancel] to cancel new
addition, click [Save and Continue] to save and continue adding.
(3) The default system has 8 kinds of leave: Casual leave, Marriage leave, Maternity leave, Sick
leave, Annual leave, Bereavement leave, Breastfeeding leave, custom. We can edit these leaves
but cannot delete it.

ZKBioSecurity 3.1.5.0 or above P a g e | 123


• Delete

Select the leave type and click [Delete] to delete.

• Edit

Select the leave type and click [Edit] to edit.

Field Description:
Number: Required, maximum character length is 3;
Name: Required, maximum character length is 10;
ZKBioSecurity 3.1.5.0 or above P a g e | 124
Symbol: Required, maximum character length is 4, displayed in associated report.

5.2.4 Timed Calculation

This function will calculate the attendance at a predefined time and frequency.
(1) In the function menu, click [Basic Information][Timed Calculation][New], the following
page is displayed:

(2) Select the frequency for the calculation. Either Day or Month. If you have selected “By day”,
then you can set a maximum of 6 interval in a day at which the calculation will start. If you have
selected as “By month”, then you have 3 options to choose from; first is “last day of the month”,
second is first day of the month and the third is any specific date.
(3) Click [OK] to complete the new, click [Cancel] to cancel the new.

• Delete

Select the Timed Calculation which needs to be deleted and click [Delete].

5.2.5 Automatic Report

Through this function, system can generate a pre-defined report, pre-set at a specific time and can
send it to the receiver mail id.
(1) In the function menu, click [Basic Information][Automatic Report][New], the following
page is displayed:

ZKBioSecurity 3.1.5.0 or above P a g e | 125


(2) In the Report Setting section;
Report Type: Select the desired choice from “Transactions” or “Daily Attendance”. The report
will be according to the selected type. Transactions will give the details related to the device
with Attendance area and time of the personnel. Daily attendance will give the attendance
details of the personnel.
File Name: Consists of 3 parts: custom file name + year, month, day, hour, minute and second,
such as (Department of the original records of the test section 201706271143);
A. The first field is for the custom file name;
B. The second field contain two option for the format of the date: yyyyMMdd and
yyyy-MM-dd;
C. The third field contain the hour, minute and second format: Currently it supports
HHmmss
Field: Displays the field name and field code of the current report type.
File Type: Currently it supports TXT.
Content Format: It will define the format of the content in the exported report. For example:
{deptName} 00 {personPin} 01 {personName} 02 {attDatetime} 03.
(3) In the Mail Delivery Time Setting; set frequency for the mail delivery. The frequency has two
options; By day and By month. If you have selected “By day”, then you can set a maximum of 6
interval in a day (only once per hour) at which the mail delivery will start.
a. It can only be set in increasing order of time;
b. The minute set in the first-time interval will be same for all other five intervals.

ZKBioSecurity 3.1.5.0 or above P a g e | 126


If you have selected as “By month”, then you have 3 options to choose from; first is “last day of
the month”, second is first day of the month and the third is any specific date.
(4) Mail setting: Set the details of receiver mail;
 Receiver settings: Set the receiver as per below options;
o Set by Personnel: Enter the E-mail address in text box, and if more than one
email is there, then put “:” to separate the e-mails.
o Set by Department: Select a department from the department hierarchy;
o Set by Area: Select an attendance area from the area hierarchy;
 Title setting: It refers to subject of the mail. The maximum length is 50 characters;
 Body settings: Write the text accordingly. The maximum length is 255 characters;
(5) Make sure the sender mail settings are already defined.
(6) Once all the details are filled, click [OK] to finish.

5.3 Shift

5.3.1 Time Zone

This function is used to set the time zone that will be used in the attendance calculation and
configuring the information of each parameter with the minimum unit set. For example, allow late /
early leave time, whether it is necessary to Check-in / Check-out, set the time range of Check-in /
Check-out, overtime setting and so on.
Before setting the shift, you should set all possible time segments, that is, time zone setting. Set the
shift before scheduling, setting the attendance rules in the settings will be significant.
Click [Attendance]  [Shift]  [Time Zone] to enter the time zone page:

• Adding Time Zone

Click on [New] to add a new time zone.

ZKBioSecurity 3.1.5.0 or above P a g e | 127


(1) Normal Time Zone

Set the value of each mandatory field as per the field explanation below:
All fields marked with * are mandatory.
Time Period Type: There are two types of timetable; Normal and Flexible, flexible timetable is
explained in point 2. The system default timetable type is Normal.
Number: Any combination of numbers or letters. The number should not be identical with another
zone number. The length is 5 characters.
Name: Should not contain special symbols, the name of the period should not be identical with
other zone name, the length of 10 characters.
Check-in / Check-out start time, Check-in / Check-out end time: The format is "hour: minute", set
the check-in / check-out as required. The records outside this range will be considered as invalid
records. The Check-in / Check-out start time and Check-in/ Check-out end time should not be same.
The system default check-in start time is 08:00, check-in end time is 10:00;
The system default check-out start time is 17:00, the check-out end time is 19:00.
Check-in / Check-out: The format is "hour: minutes". Check-in time should be after check-in start
time and Check-out time should be after check-out end time. The system default check-in time is
09:00, Check-out time is 18:00.

 Note: If the Check-out time is less than the Check-in time, it means it is a two-day shift span.
Currently the system only supports creating Time Zones across one day only.
Allow Late (minutes) and Allow Early Leave(minutes): The allowed late time is the maximum time
allowed after check-in, leave early is the maximum time allowed before check-out. The check-in and
check-out should be within the effective range to be valid. The system default Allow late and Leave

ZKBioSecurity 3.1.5.0 or above P a g e | 128


early minutes is 0.

 For example: If the number of minutes allowed to be late is set as 5, and the working time as
9:00, Suppose A Check-in at 9:03 and B Check-in at 9:06, then A is not late, because his check-in time
is within limit, B is late because he is late 1 minute more than the set limit. The logic of early leave is
the same.
Must Check-in and Check-out: Set whether to set check-in and check-out as compulsory while
commuting to work or not within the selected time range. If set as "Yes", then check-in / check-out is
required; otherwise for “No”, it is not required. The system default setting is "Yes".
Calculated as Working days: If the value is set here, the program will count the working days
according to the set value statistics, otherwise, it will count according to the setting in the
attendance rules. The system default working days number is "1".
Deducted Time (Minutes): This function is used to set the total break time between Check-in and
Check-out. It is set according to the company lunch time and the evening break in nine to six shifts.
The default interval between the deductions is 60 minutes.
Work Time (minutes): This will be the total effective time of this shift. It is automatically set by the
system as per the Check-in/out details. The formula for calculation is Total minutes between
Check-in and Check-out subtracted by Deducted time(minutes). It also supports manual input, that
is, custom work time can be set. For example, suppose the Check-in is at 09:00 and Check-out is set
as 18:00, and the deducted time is set as 60 minutes. Now the total time in minutes between
Check-in and Check-out is 480 minutes, now to get the Work time we need to subtract deducted
minutes from this time, so the value will be like (480-60 = 420) minutes.
Delay Time calculated as overtime: For calculating the overtime we need to set the time from
which the overtime should start. If it is selected as "Yes", we need to define "Calculated as Overtime
From”. Overtime calculation formula: overtime = Check-out time - Calculated as Overtime From. The
system default overtime start hours is as "18:00"; If the “Delay Time calculated as overtime” is set to
"No" then the time after the check-out time will not be calculated as overtime. The system default is
No.
Calculated as overtime: If it is selected as “Yes”, then the time after the check-out will be calculated
as overtime, otherwise, it is normal working time. The system default is No.

(2) Flexible time period


Flexible time period means a time period in which you can punch any number of times within the
defined Check-in and Check-out time range. The system takes the effective length of time period
between the first check-in and the last Check-out as the total working time in the flexible time
period. The flexible time period does not calculate overtime.

ZKBioSecurity 3.1.5.0 or above P a g e | 129


According to the figure above, the specific settings for each field in the flexible time period are as
follows:
Number: Any combination of numbers or letters. The number should not be identical with another
Timetable. The length is 5 characters.
Name: It should not contain special symbols and should not be identical with another timetable
name. The maximum length is 10 characters.
Check-in start time, Check-out end time: Set the Check-in Check-out time range for this timetable.
The format is "Hour: Minute". The Check-in / Check-out records outside this range will be invalid.
The system default check-in start time is 08:00, the check-out end time is 19:00.

Note:
 The total time defined by the flexible time period should not exceed 24 hours.
 When the Check-out end time is after the Check-in start time, the total duration of the
flexible time period is defined as: Check out end time - Check in start Time.
 When the Check-out end time is before the Check-in start time, the total duration of the
flexible time period is defined as: Check-out end time + 24- Check-in start time.
 The Check-out end time should not be same as Check-in start time.
After the information is entered, click [OK] button to save and return to the time period page. In the
time period list, the newly added time period will be displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 130


Note: The time interval between the working hours and off-hours should not exceed the
maximum/minimum time length set by the system. For details, refer to the settings in 5.2.1. Rule.

• Editing Time period

(1) As shown above, click [Edit] under "Operation" to enter the time period editing page.
(2) Modify the relevant settings as needed, the operation is the same with the new time period.
After the modification is completed, click the [OK] button to save.

ZKBioSecurity 3.1.5.0 or above P a g e | 131


• Deleting timetable period

(1) Select time period(s), click the [Delete] button under the Operation tab to enter the
confirmation page for deleting the time period.
(2) Click [OK] to delete the period and return to the period page.

 Note: If the time period is part of a shift, then it cannot be deleted directly; first you need to
delete all the shifts that uses this time period.

• Export

(1) Click the [Export] button as shown in above figure to enter the configuration interface of the
export time period, as shown in the following figure:

ZKBioSecurity 3.1.5.0 or above P a g e | 132


(2) Available file types are Excel, PDF, and CSV. The export operation is similar to the export of
personnel information.

• Search Time period

As shown in the figure above, at the top of the time period list information interface, search by "Time
zone number", "Time zone name" and "Time zone type" is supported.

5.3.2 Shift

Shift is made up of one or more timetable period(s) in accordance with a certain order and cycle of
sequence. It is set as default shift for staffs. To get staff attendance, first of all we must set the shift.
Click [Attendance]  [Shift] [Shift] to enter the main menu of shift as shown below. The search

ZKBioSecurity 3.1.5.0 or above P a g e | 133


function can be convenient for shift inquiry. The list shows all shifts of the current system. The time
period details list shows the details of the time period of the shift in the form of a chart.

If you click the [New] button, the above interface appears, the shift setting is divided into three parts,
the specific settings as follows:

1. Shift definition:
• Schedule type:
Shift type: There are two types, "Regular shift" and "Flexible shift". The system default is "Regular
shift".
 Regular shifts: One or more normal timetable periods can be selected to form a regular shift
according to the rule. Regular shifts are often used in more regular work places such as
offices, governments and banks.
 Flexible Shift: Only one flexible time period can be used to combine flexible shifts. Flexible
shifts are commonly used by dockers and for hourly workers.
Color: Currently this field is not effective.
Number: Supports any combination of numbers or letters, and should not be identical with another
shift number, the maximum length is 5 characters.
Name: Any character, shift name shouldn’t be identical with another shift, the maximum length is 10
characters.
Unit: The unit of setting cycle, there are three options; Day, Week and Month, the default being the
"day".
Cycle: Defines the number of shift cycles, the shift cycle = the number of cycles * units. If the unit is
"day", the range is 1-99; if the unit is "week", the range is 1-15; if the unit is "month", the range is 1-12.

ZKBioSecurity 3.1.5.0 or above P a g e | 134


Start Date: Defines the start date of the shift, the date before the start date is not affected by the
shift. The system default start date is the current system date.
• Schedule name:

Attendance Mode: It defines the method of attendance calculation for this shift. Below are the 4
ways:
 Punch Card According to Normal Shift: This is the system default. The check-in should be as
per the shift timings.
 Punch once at any time in a day: In this option, the staff only needs to punch a card at any
time of the day.
 Only calculate the Punch Card time: It will take two valid punch card time intervals as an
effective working time.
 Free Punch: In this option, staff do not need to Check-in or Check-out.

Cycle shift in one month: If you have selected ‘‘Yes’’, then after the cycle is finished, it will restart
again. This field is displayed only when you select Unit of cycle as "Days", it will not be displayed in
‘‘Week" and "Month".
Overtime Mode: This function decides the calculation of Overtime. Drop-down menus are:
 Computer Automatically Calculation: The computer automatically calculates whether the
delay time will be calculated as overtime or not.
 Overtime must apply: If this option is selected, then the overtime will not be calculated
automatically. It will take the overtime sheet as final. If the check-out time is less than the end
time of overtime, it will not count overtime hours.
 Must Work overtime or Absence: If this option is selected, then the overtime will not be
calculated automatically. It will take the overtime sheet as final. If the check-out time is less
than the end time of overtime, it will not count overtime hours and will record as absence.
 Shorter duration between Auto-Calculation and Overtime Receipt: When overtime sheet
and automatic calculate overtime both are enabled, system will take the period which has
least overtime.
 Not calculated as overtime: Overtime applied for overtime will not be calculated as overtime
hours.

ZKBioSecurity 3.1.5.0 or above P a g e | 135


Overtime Type: Through this option we can set how the overtime after the worktime is considered.
Drop-down menus are:
 Normal Day: If selected, the entire time period of overtime hours will be marked as normal
overtime.
 Rest Day: If selected, the entire time period of overtime hours is recorded as rest day
overtime.
 Holidays: If selected, the entire time period of overtime hours is marked as overtime work
holidays.

2. Shift time period definition


After all the fields of the shift definition are entered, you can define the shift time. All the timetable
created earlier will be displayed in the list. You can choose one or more timetable period only when
the time for both are not overlapping.

Note: Regular shifts can only use the Regular time period, flexible shifts can only use flexible time
period.

3. Shift cycle definition


Once the shift and time periods are defined. the shift cycle and time period can be defined. This part
is mainly to define the rules of the shift. If you do not schedule any time period on one day, you do
not need to go to work that day.
After the setting is completed, click the [OK] button to save and return to the shift page. The newly
added shift information will be displayed in the shift list.

Note: Here are a few simple shift settings interfaces.

(1) Regular shift with Day as unit:

ZKBioSecurity 3.1.5.0 or above P a g e | 136


(2) Regular Shift with Week as Unit:

Note: The shift only provides users with a cycle rule for the selected period of time within the set

ZKBioSecurity 3.1.5.0 or above P a g e | 137


period. The unselected dates will be off-day. When a user schedules shift for an employee, he will
simply select the start and end dates and the number of cycle, without having to confirm work-day
and off-day. After the frequency is selected, the system determines which day to go to work
according to the period set by the selected frequency.

• Adding timetable
Select a shift and click [Edit] to enter the editing interface, set the area in the shift time and shift
period and time period, and increase the shift time period and the period, click [OK] to save and exit.
Then add a time period in the shift.

Note: This function can be used when the attendance time period is not consistent throughout
the week or if there are multiple time periods for a shift.
For example: Suppose in a company, every Monday, Wednesday and Friday has (attendance) period
of 9: 00-16: 00, and every Tuesday, Thursday has (attendance) period of 10: 00-19: 00.
1. To set this shift we need to first create two timetable periods as shown below:

ZKBioSecurity 3.1.5.0 or above P a g e | 138


2. Create a timetable of 10:00 to 19:00 like the above displayed.

3. Now go to shift interface as shown below:

ZKBioSecurity 3.1.5.0 or above P a g e | 139


4. After you click [Edit], below shift page will appear:

5. Since the company's shift schedule is weekly and has the same working conditions every week,
the setting unit is "Week" and the number of cycle is "1".

ZKBioSecurity 3.1.5.0 or above P a g e | 140


6. Since the working days for 09:00 to 16:00 are Monday, Wednesday, and Friday, so select it at the
right side in the "Timetable Details" box.
7. For Tuesday and Thursday, do same step like above, first tick and click on the timetable and then
select Tuesday and Thursday as shown below:

ZKBioSecurity 3.1.5.0 or above P a g e | 141


8. After the setting is completed, click the [OK] button to save and return to the shift page. The
new shift information will be displayed in the shift list. Click the row where the shift is located to
view the details of the shift time period at the right side of the interface, as shown in the
following figure:

As shown in the figure above, the shift on Monday, Wednesday and Friday (attendance) is at 9: 00-16:
00 and on Tuesday and Thursday (attendance) is 10: 00-19: 00.

• Clear Timetable
In the shift list, click the [Clear Timetable] button in the [Operation] column of the shift. This
operation only corresponds to a single shift, batch operation is not available. A confirmation page

ZKBioSecurity 3.1.5.0 or above P a g e | 142


will pop up, click the [OK] button to confirm deletion of all the timetable of the selected shift.

• Delete the shift


In the shift list, click the [Delete] button in the [Operation] column where the shift is located. This
operation only corresponds to a single shift, batch operation is not available), click [Delete] to enter
the deletion confirmation page, click [OK] to delete the selected shift and exit.
Or first select the shift to be deleted (that is, the checkbox in front of the row where the selected shift
is located), click the [Delete] button at the top of the interface to enter the deletion confirmation
interface, and click [OK] to complete the batch deletion operation.

Note: If this shift is scheduled, it cannot be deleted. You need to delete all scheduled shifts that is
connected this shift before you can delete the shift.

• Export
This function will export all the details of the shift in excel, pdf and csv file format.

5.4 Schedule
After setting the time attendance and shift cycle, you can schedule it. Schedule management
includes: Group, Group Schedule, Department Schedule, Personnel Schedule and Temporary
Schedule.

ZKBioSecurity 3.1.5.0 or above P a g e | 143


Note: Schedule management is divided into 4 groups, departments, personnel and temporary
scheduling. So, when the shift is scheduled to repeat, then at this time there will be a priority judging.
This priority setting you can find under the "Basic Information"  "Rule" page. The default is
"Department-Group", which is the highest priority shift.

In the same type of scheduling for a person, the software processing logic is as follows: Follow-up of
the new shift will overwrite the previous shift. Suppose, you have been added to shift A from June 1
to June 10. Now you have been added in a new shift B from June 5 to June 10, so from June 5 to
June 10 you have to work as per Shift B's schedule.

5.4.1 Group

Before group scheduling, you need to group people with the same attendance rules. Groups mainly
include "Query", "New", "Delete", "Add Personnel", "Edit", "Delete Personnel" and other functions.
Click [Attendance]  [Shift Management]  [Group] to enter the main interface of the group. The
search function can conveniently search the group if you have many groups in your system. The list
shows all the group present in the current system. The list of people is shown in the Browse Group
Personnel on the right side of the interface.

ZKBioSecurity 3.1.5.0 or above P a g e | 144


• Adding a group
Click on the main group interface [New] button, new group interface will pop up:

Number: Any combination of numbers or letters, group number that should not be identical with
another group number, maximum length of 5 characters.
Name: Does not support special characters, group name should not be identical with another group
name. The maximum length is 10 characters.
Remarks: Write any note for this group, if it has some characteristic information; the maximum
length is 50 characters.

• Edit groups

ZKBioSecurity 3.1.5.0 or above P a g e | 145


(1) As shown above, select a group and click the [Edit] button in the [Operation] column of the
group to enter the editing group interface.
(2) After modifying the fields that need to be modified, click the [OK] button and return to the
group page.

• Delete Group

(1) Select one or more groups and click the [Delete] button on the upper left of the group list to
enter the confirmation page for deleting the group.
(2) Click [OK] to delete the group and return to the group page.
Note: If there is a person in the group or in group scheduling, it cannot be deleted. First, you need
to delete all the people in the group and schedule to delete the group.

• Adding Personnel

(1) Select a group and click the [Add Personnel] button in the [Operation] column of the group to
enter the personnel adding interface as shown above.

ZKBioSecurity 3.1.5.0 or above P a g e | 146


(2) Select the relevant personnel from the list at left side and move it towards right list. Click the
[OK] button to complete the addition of personnel operations.

Note:
 Those who have been assigned to this group will be listed at the right side of the group
interface.
 People who have been added to other groups will be deleted from the original group after
they are added to the group.
 To search conditional query, filter through "Department" and get the list of candidates.

• Delete people

(1) As shown in the above figure, select a group and select the person to be deleted in the browse
group on the right. Click the [Delete Personnel] button to enter the interface of confirm
deletion.
(2) Click the [OK] button to delete the personnel.

5.4.2 Group Schedule

This function is used to schedule group to the personnel in shift(s). The new group scheduling
interface is shown as below:

ZKBioSecurity 3.1.5.0 or above P a g e | 147


For Group scheduling you need to select the group, set start date / end date, shift type, select the
shift.
Define the start and end date for the group schedule. From the start date the schedule will come
into effect.
Shift type: There are two kinds, Normal Schedule and Smart Schedule.
Through Normal Schedule you can only choose a single shift. If you select more than one shift, the
below prompt will appear:

ZKBioSecurity 3.1.5.0 or above P a g e | 148


Through Smart Schedule you can choose more than one shift. After you select smart schedule, the
software will automatically determine the most suitable frequency according to the punch card
records in attendance calculation.
Choose the shift from the list for this group and click [OK].

5.4.3 Department Schedule

The department scheduling operation is same as the group scheduling. The difference is only in the
object of choice. Here we need to select department from the list at the upper left side of the
interface.

5.4.4 Personnel Scheduling

Personnel scheduling operations is completely same as group scheduling, but when scheduling
personnel, the object of choice is personnel at the top left corner of the interface.

ZKBioSecurity 3.1.5.0 or above P a g e | 149


5.4.5 Temporary Schedule

Temporary scheduling operation is same as the personnel scheduling. Because of some sudden
changes in work shift for a temporary period, some personnel may be required to work in different
shift for a temporary period. This function is used at this time to allot temporary schedule to the
personnel. Temporary shift schedule has the highest priority in all shift schedules.

ZKBioSecurity 3.1.5.0 or above P a g e | 150


5.5 Exception

5.5.1 Appended Receipt

Appended receipt is used to enter records for the personnel in case the person is out on business
trip, missing check-in/out, etc., Manual attendance record in the attendance report is called
Appended Receipt. Generally, it is entered by the management staff according to attendance result
and company's attendance rules after the attendance cycle ends. This version does not support the
approval of exception, entered manually in system. Data entered into the system will have an impact
on the attendance calculation results.

• New

(1) Click [Exception]  [Appended Receipt]  [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 151


Fields are as follows:
Punch Time: Set the date and time of punch.
Personnel: Select the required personnel for appended receipt, multiple choices are available.
Remark: Enter the reason for appended receipt, the max length is 50.

(2) After filling the information, click [OK] to save and exit, the appended receipt will be displayed
in the added list.

• Delete

(1) Click [Exception] > [Appended Receipt] > [Delete]:

(2) Click [OK] to delete.

• Export

You can export selected appended receipt data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 152


5.5.2 Leave

Personnel may need leave at different circumstances. They can apply and the leave will be displayed
here:

• New

(1) Click [Exception] > [Leave] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 153


Fields are as follows:
Leave Type: Set the type of the leave.
Start Time: Start time of the leave.
End Time: End time of the leave.
Remark: Enter the reason for leave, the max length is 50.
Leave Requisition Photo: Upload photo of supporting document for the leave request.
Personnel: Select the required personnel, multiple choice is available.
(2) After filling the information, click [OK] to save and exit, the leave information will be displayed
in the added list. Click [Leave Requisition Photo] at the end of each line to view the leave
requisition photo.

ZKBioSecurity 3.1.5.0 or above P a g e | 154


• Delete

(1) Click [Exception] > [Leave] > [Delete]:

(2) Click [OK] to delete.

• Export

You can export selected leave data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 155


5.5.3 Business Trip

• New

(1) Click [Exception] > [Business Trip] > [New]:

Fields are as follows:


Personnel: Select personnel need business, it can be multiple choices.
Start Time: Start time of the business trip.
End Time: End time of the business trip.
Remark: Enter the description of business trip, the max length is 50.
(2) After filling the information, click [OK] to save and exit, the business trip information will be
displayed in the added list.
ZKBioSecurity 3.1.5.0 or above P a g e | 156
• Delete

(1) Click [Exception]  [Business Trip]  [Delete]:

(2) Click [OK] to delete.

• Export

You can export selected business trip data in Excel, PDF, CSV file format.

5.5.4 Go Out

• New

(1) Click [Exception] > [Go Out] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 157


Fields are as follows:
Personnel: Select the required personnel, multiple choices are allowed.
Start Time: Start time of going out.
End Time: End time of going out.
Remark: Enter the description of going out, the max length is 50.
(2) After filling the information, click [OK] to save and exit, the go out information will be displayed
in the added list.

• Delete

(1) Click [Exception] > [Go Out] > [Delete]:

(2) Click [OK] to delete.

• Export

You can export selected go out data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 158


5.5.5 Overtime

• New

(1) Click [Exception] > [Overtime] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 159


Fields are as follows:
Personnel: Select required personnel for overtime, multiple choices are available.
OT Type: Normal OT, Weekend OT and Holiday OT three types.
Start Time: Start time of overtime.
End Time: End time of overtime.
Remark: Enter the description of overtime, the max length is 50.
(2) After filling the information, click [OK] to save and exit, the overtime information will be
displayed in the added list.

• Delete

(1) Click [Exception]  [Overtime]  [Delete]:

(2) Click [OK] to delete.

• Export

You can export selected overtime data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 160


5.5.6 Adjust and Append

• New

(1) Click [Exception] > [Adjust and Append] > [New]:

Fields are as follows:


Personnel: Select the required personnel, multiple choices are available.
Adjust Type: Select from Adjust Rest and Append Attendance. Adjust Rest is when you are on a shift
but you want to rest; Append attendance is the opposite

ZKBioSecurity 3.1.5.0 or above P a g e | 161


Adjust Date: The date and time of adjustment.
Append Attendance Shift: When the adjust type is Append Attendance, it is necessary to select the
corresponding shift.
Remark: Enter the reason of adjust and append, the max length is 50.
(2) After filling the information, click [OK] to save and exit, the adjust and append information will
be displayed in the added list.

• Delete

(1) Click [Exception] > [Adjust and Append] > [Delete]:


(2) Click [OK] to delete.

• Export

You can export selected adjust and append data in Excel, PDF, CSV file format.

5.5.7 Adjust Shift

• New

(1) Click [Exception] > [Adjust Shift] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 162


(2) Adjust Type is divided into three shifts:
A. Adjust the personnel shift in the same day: It will adjust one personnel’s shift in the same
day.

B. Adjust the personnel shift in other days: It will adjust one personnel’s shift in different days.

C. Two-people exchange: It will exchange shifts of two person in different days.

A. Adjust the personnel shift in the same day:

Personnel ID: The max length is 32. (Fill the correct ID. After you enter the ID and click on the next
field, the Name and Department are automatically filled.)
First Name: Obtained automatically based on Personnel ID.
Department Name: Obtained automatically based on Personnel ID.
Adjust Date: The date and time of adjustment.
Remark: Enter the description of adjust shift, the max length is 50.
(3) After filling in the information, click [OK] to save and exit, the adjust shift information will be
displayed in the added list.

B. Adjust the personnel shift in other days:

ZKBioSecurity 3.1.5.0 or above P a g e | 163


Personnel ID: The max length is 32. (Fill the correct ID, after you enter the ID and click on the next
field, the Name and Department are automatically filled.)
First Name: Obtained automatically based on Personnel ID.
Department Name: Obtained automatically based on Personnel ID.
Adjust Date: The date and time of adjustment.
Adjust Date: The date and time of adjustment.
Remark: Enter the description for the shift, the max length is 50.
After filling the information, click [OK] to save and exit, the adjust shift information will be displayed
in the added list.

C. Two people exchange:

Personnel ID: The max length is 32. (Fill the correct ID, after you enter the ID and click on the next
field, the Name and Department are automatically filled.)
First Name: Obtained automatically based on Personnel ID.
Department Name: Obtained automatically based on Personnel ID.
Adjust Personnel ID: ID number of the adjust personnel. The max length is 32. (Fill the correct ID,

ZKBioSecurity 3.1.5.0 or above P a g e | 164


after you enter the ID and click on the next field, the Name and Department are automatically filled.)
Adjust Personnel Name: Obtained automatically based on Personnel ID.
Adjust Department Name: Obtained automatically based on Personnel ID.

• Export

You can export selected adjust shift data in Excel, PDF, CSV file format.

5.6 Flow Management


The flow management is used to set the attendance approval sequence. To support the attendance
approval function, you must first set up the flow management. After setting up the node settings
and flow settings, you can achieve employee self-help.

5.6.1 Node Setting

Before the approval function is implemented, the approval node must be set. The system has a
default node number 1 and the node name is [Direct Leader]. The default node cannot be deleted or
edited.

ZKBioSecurity 3.1.5.0 or above P a g e | 165


• Add

Click [Flow Management] [Node Settings] [New] to enter the node's new interface:

Fields are as follows:


Node Type: It is of two types; Designated Person and Assign position.
Node Number: It is recommended to start with N, such as N01, can be letters and numbers.
Node Name: It is recommended to start with a post or name and end with a node, such as a
manager node.
Personnel: Select required person.
Select Position: It will appear if you have selected Node type as Assign Position. This option is the
content of [Position] set in the personnel module.
Department Name: It will be automatically selected once you set personnel.

• Delete

Click the Delete button under ‘‘Operations’’ in the node list or check one or more nodes and click the
Delete button above the list.
You cannot delete a node that is in use.

• Export

System supports exporting Node. You can export data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 166


5.6.2 Flow Setting

Flow setting is to establish the approval process, select the desired node to set the approval process.

• Add

Click [Flow Management]> [Flow Settings]> [New] to enter the process setting interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 167


The fields are described as follows:
Number: It is recommended to start with F, such as F01. It supports entering letters and numbers.
Name: At the beginning of the proposal type, end with the process, such as the leave process.
Flow Type: It has all the exception types. Appended Receipt, Leave, Business Trip, Go Out, Overtime,
Adjust and Append, and Adjust Shift.
Flow rules: Appear only if the process type is Leave, Business Trip, or Go out.
Options are <=1days, >1 & <=3 days, > 3 & <= 7 days, > 7 days.

• Delete

Click the [Delete] button under the operation column in the process list, or check one or more
processes, click the [Delete] button above the list, [OK]

• Export

System supports exporting flow list. You can export data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 168


5.6.3 My Application

The ‘‘My application’’ interface displays all abnormal application reports submitted by the user and
supports inquiries. All applications have a status: End, Initiating and application, Process, Rejected.

• View details

Click [Process Management]> [My Application]> [View Details] to enter the application details

ZKBioSecurity 3.1.5.0 or above P a g e | 169


interface. This interface shows the approval status of all approvers:

A. End

When the abnormal data is added by the administrator, the approval flow is not entered, and the
default state is the end of the process. The approval information in the details is no longer displayed.

B. Initiating an application

When the status is initiating an application, it means that no approver has performed the approval
yet, and all approvers who need to complete the flow will be displayed.

C. Rejected

As long as the approver chooses not to pass the flow, the flow interruption will not continue and the
status will be rejected.

ZKBioSecurity 3.1.5.0 or above P a g e | 170


D. Pending

When there is a node status of ‘‘Pending Approval” in the flow, the process status is the flow.

• Export

It supports exporting data. You can export data in Excel, PDF, CSV file format.

5.6.4 My Approval

The ‘‘My ‘Approval’’ interface shows the approval report that need to be operated. It supports queries

ZKBioSecurity 3.1.5.0 or above P a g e | 171


and requires approval when the user is set up as an approval node. The operation can be either
passed or rejected.

• Operation

Click either ‘Passed’, or ‘Rejected under the operation bar as required If you pass, then the node
approval will go to the next approver (if any) in the flow.

• View details

Click on the "Exception Type" of each approval record to see or modify the details.

ZKBioSecurity 3.1.5.0 or above P a g e | 172


When the exception type is [leave], you can view the photo of the leave.

• Export

You can export data in Excel, PDF, CSV file format.

ZKBioSecurity 3.1.5.0 or above P a g e | 173


5.7 Calculate Report

5.7.1 Manual Calculate

Attendance calculation can be done by selecting the department on the left department hierarchy
or by selecting the right person. If both are selected, they are overwritten. After selecting the
personnel click attendance calculation, a confirmation box will pop-up.

ZKBioSecurity 3.1.5.0 or above P a g e | 174


5.7.2 Transaction

Attendance records of all employees will be displayed on this interface, including the attendance
record of uploaded attendance transactions. The record of the normal punch on the device will be
uploaded to the software as the original record. When a particular data is selected, the details will be
displayed on the right side of the page.

• Import Attendance record

The attendance time records can be imported into attendance records through this function. Select
the start time and end time to import, check the attendance point list and click OK.

ZKBioSecurity 3.1.5.0 or above P a g e | 175


Attendance point list: Only the device which is set in Attendance Point under [Basic information]
[Attendance point], will be listed here.

• Export

It will export the attendance record data. Currently it can be exported either in three types of file
EXCEL / PDF / CSV. You can also choose the amount of data to be exported or select the maximum
amount which supports up to 40,000 records.

ZKBioSecurity 3.1.5.0 or above P a g e | 176


5.7.3 Daily Attendance

The table shows personnel’s daily attendance status, punch time, the early leaving time, the latest
time, the detailed punch time during the selected period.

ZKBioSecurity 3.1.5.0 or above P a g e | 177


• Export

It will export the daily attendance record data. Currently it can be exported either in three types of file
EXCEL / PDF / CSV. You can also choose the amount of data to be exported or select the maximum
amount which supports up to 40,000 records.

ZKBioSecurity 3.1.5.0 or above P a g e | 178


5.7.4 Leave Summary

The report summarizes the valid time for all valid leave records, leave type, within the selected date
range. Select the time range from which you want to view the leave record.

ZKBioSecurity 3.1.5.0 or above P a g e | 179


Click on the leave type number as shown above, a pop-up window shows the person within the
search time frame, leave details of the type, including personnel number, name of person, type of
leave, leave start time, leave end time.

• Export

It will export the leave summary data. Currently it can be exported either in three types of file EXCEL /
PDF / CSV. You can also choose the amount of data to be exported or select the maximum amount
which supports up to 40,000 records.

ZKBioSecurity 3.1.5.0 or above P a g e | 180


5.7.5 Daily Report

This function is used to get the daily report within the specified range of date and time attendance
details of personnel, including attendance, late arrival, early leaving, overtime and so on.

ZKBioSecurity 3.1.5.0 or above P a g e | 181


• Export

It will export the Daily report data. Currently it can be exported either in three types of file EXCEL /
PDF / CSV. You can also choose the amount of data to be exported or select the maximum amount
which supports up to 40,000 records.

5.7.6 Monthly Detail Report

This function will automatically give the report for a selected month on a daily basis. The report
includes attendance status and characters, and summarizes the actual attendance time, absence,
leave, business trips and outings in the month.

ZKBioSecurity 3.1.5.0 or above P a g e | 182


The attendance status is displayed as per following priority at the bottom of the interface:

• Export

It will export the Monthly Detail Report data. Currently it can be exported either in three types of file
EXCEL / PDF / CSV. You can also choose the amount of data to be exported or select the maximum
amount which supports up to 40,000 records.

5.7.7 Monthly Statistical Report

This function will give details for a selected month. The details include personnel attendance

ZKBioSecurity 3.1.5.0 or above P a g e | 183


summary status and detailed information, including attendance, late, leaving early, etc.

• Export

It will export the Monthly Statistical Report data. Currently it can be exported either in three types of
file EXCEL / PDF / CSV. You can also choose the amount of data to be exported or select the
maximum amount which supports up to 40,000 records.

5.7.8 Departmental Report

Select the date to get the detail record of all departments. Details include, details of all personnel in
the department, attendance, late, leaving early, d so on.

ZKBioSecurity 3.1.5.0 or above P a g e | 184


• Export

It will export the Departmental Report data. Currently it can be exported either in three types of file
EXCEL / PDF / CSV. You can also choose the amount of data to be exported or select the maximum
amount which supports up to 40,000 records.

5.7.9 Annual Report

This function will give details for a selected Year. The details include personnel attendance summary
status and detailed information, including attendance, late, leaving early, etc.

ZKBioSecurity 3.1.5.0 or above P a g e | 185


• Export

It will export the Annual Report data. Currently it can be exported either in three types of file EXCEL /
PDF / CSV. You can also choose the amount of data to be exported or select the maximum amount
which supports up to 40,000 records.

5.8 Homepage Panel

5.8.1 Workaholic

It will display the personnel with the highest actual working hour for the last week or month.

ZKBioSecurity 3.1.5.0 or above P a g e | 186


5.8.2 Today's Attendance Segmented Statistics

Statistics is based on this formula; (The number of punch in each time period) / (the total number of
punch from 0:00 - current time) ×100%.
The time period is divided into [00: 00 ~ 08: 00, 08: 00 ~ 12: 00, 12: 00 ~ 14 : 00, 14:00 - 18:00, 18:00 ~
23:59].

5.8.3 Today's attendance

It displays the status of today's attendance in a pie chart style


Actual Personnel number are the personnel who has checked in.
Not Arrived are the personnel who has not checked in.
The total number of personnel is Actual Personnel number plus Not arrived.

ZKBioSecurity 3.1.5.0 or above P a g e | 187


5.8.4 Abnormal Statistics (this month)

Abnormal Statistics (this month) includes statistics from 1st of present month to the current date. It
will display six unusual circumstances Late, Early, Leave, Trip, Out, and Absent.

ZKBioSecurity 3.1.5.0 or above P a g e | 188


6. Elevator
The following is the manual of online elevator control. If you are using offline elevator control, please
refer to Offline Elevator Control Manual.
The Elevator Control System is mainly used to set device parameters (such as the swiping interval for
taking elevators and elevator key drive duration), manage personnel's rights to floors and elevator
control time, and supervise elevator control events. You can set registered users' rights to floors. Only
authorized users can reach certain floors within a period of time after being authenticated.

6.1 Elevator Device

6.1.1 Device

There are two ways to add Elevator Devices.

 Add Device manually

(1) Click [Elevator Device] > [Device] > [New] on the Action Menu, the following interface will be
shown:
TCP/ IP communication mode RS485 communication mode

IP Address: Enter the IP Address of the elevator device.


Communication port: The default is 4370.
Serial Port No.: COM1~COM254.
RS485 Address: The machine number, range 1-255. When Serial Port No. is same, it is not allowed to

ZKBioSecurity 3.1.5.0 or above P a g e | 189


set repeated RS485 addresses.
Baud Rate: Same as the baud rate of the device. The default is 38400.
RS485 Address Code Figure: Display the code figure of RS485 address.
Common options:
Device Name: Any character, up to a combination of 20 characters.
Communication Password: The max length is 6 with numbers or letters. The initialized device’s
communication password is blank.
Note: You do not need to input this field if it is a new factory device or just after the initialization.
Number of expansion board: The expansion board number of elevator device controlling.
Each expansion board relay number: Each expansion board has 16 relays.
Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon
Real-Time Monitoring.
Clear Data in the Device when Adding: Tick this option, after adding device, the system will clear all
data in the device (except the event logs). If you add the device just for demonstration or testing,
there is no need to tick it.
Extended Device Parameters: includes serial number, device type, firmware version number,
auxiliary input quantity, auxiliary output quantity, door quantity, device fingerprint version, and
reader quantity etc.
(2) After editing, click [OK], and the system will start to connect the current device.
If successfully connected, it will read the corresponding extended parameters of the device and save.
Note: When deleting a new device, the software will clear all user information, time zones,
holidays, and elevator access levels settings from the device, except the events record (unless the
information in the device is unusable, or it is recommended not to delete the device in used to avoid
loss of information).
Elevator Controller Settings:

 TCP/ IP Communication Requirements

Support and enable TCP/ IP communication, directly connect device to the PC or connect to the
local network, query IP address and other information of the device;

 RS485 Communication Requirements

Support and enable RS485 communication, connect device to PC by RS485, query the serial port
number, RS485 machine number, baud rate and other information of the device.
2. Add Device by Searching Elevator Controllers
Search the elevator device in the Ethernet.
(1) Click [Elevator Device] > [Device] > [Search Device], to show the Search interface.

ZKBioSecurity 3.1.5.0 or above P a g e | 190


(2) Click [Search], and it will prompt [searching……].
(3) After searching, the list and total number of elevator devices will be displayed.

Note: Here we use UDP broadcast mode to search elevator devices, this mode cannot perform
cross-Router function. IP address can be cross-net segment, but must belong to the same subnet,
and needs to be configured the gateway and IP address in the same net segment.
(4) Click [Add Device] behind the device, and a dialog box will pop up. Enter self-defined device
name, and click [OK] to complete device adding.
(5) The default IP address of the elevator device may conflict with the IP of a device on the Local
network. You can modify its IP address: Click [Modify IP Address] behind the device and a dialog box
will open. Enter the new IP address and other parameters (Note: Configure the gateway and IP
address in the same net segment).
Note: The system cannot add Elevator Devices automatically.

6.1.2 Reader

Each elevator device has a reader, the reader information can be set.
Click [Elevator Device] > [Reader], select a reader name in the reader list:

ZKBioSecurity 3.1.5.0 or above P a g e | 191


Fields are as follows:
Device Name: It is not editable.
Name: The default format is “Device Name - Reader”, it is editable within 30 characters.
Operate Interval: The interval between two verifications. The default value is 2 seconds, the range is
0~254 seconds.
Verification Mode: The default setting is “Card or Fingerprint”. The Wiegand reader supports ”Only
Card”, “Only Password”, “Card or Password”, “Card and Password”, “Card or Fingerprint”. The RS485
reader supports “Card or Fingerprint”. Make sure the reader has a keyboard when the verification
mode is “Card and Password”.

The above Settings are Copied to:

All Readers of All Devices: Apply the above settings to all readers within the current user’s level.

Click [OK] to save and exit.

6.1.3 Floor

Click [Elevator Device] > [Floor], select a floor name in the list to click [Edit]:

ZKBioSecurity 3.1.5.0 or above P a g e | 192


Fields are as follows:
Device Name: It is not editable.
Floor Number: The system automatically numbered according to the number of relays.
Floor Name: The default setting is “Device Name- Floor Number”; it is editable within 30 characters.
Floor Active Time Zone, Floor Passage Mode Time Zone: The default setting is Null. The Floor
Active Time Zones that are initialized or newly added by users will be displayed here so that users
can select a period. When editing a floor, the Floor Active Time Zone must be specified. The key for
closing the related floor can be released continuously only after the effective periods of this floor are
specified. Floor Passage Mode Time Zone takes effect only within the floor effective period. It is
recommended that the floor continuous release period be included in the floor effective period.

Button Open Duration: It is used to control the time period to press floor button after verification.
The default value is 5 seconds; the range is 0~254 seconds.

The above Settings are Copied to: Including below two options.

 All Floors of Current Device: To apply the above settings to all floors of the current elevator
device.

 All floors of all Devices: To apply the above settings to all floors within the current user’s level.

6.1.4 Auxiliary Input

It is mainly used to connect to devices, such as the infrared sensor or smog sensor.
1. Click [Elevator Device] > [Auxiliary Input] on the Action Menu, enter into the following page:
2. Click [Edit] to modify the parameters:

ZKBioSecurity 3.1.5.0 or above P a g e | 193


Fields are as follows:
Name: You can customize the name according to your preference.
Printed Name: The printing name in the hardware, for example IN9。
3. Click [Edit] to modify the name and remark. Others are not allowed to edit here.

6.1.5 Event Type

Display the event types of the elevator devices. Click [Elevator Device] > [Event], the following page
is displayed:

ZKBioSecurity 3.1.5.0 or above P a g e | 194


More details about Event Type, please refer to Elevator Event Type.

6.1.6 Device Monitoring

By default, it monitors all devices within the current user’s level, click [Elevator Device] > [Device
Monitoring], and lists the operation information of devices: Device Name, Serial No., Area, Operation
Status, current status, commands List, and Related Operation.

You can clear command as required. Click [Clear Command] behind the corresponding device:

ZKBioSecurity 3.1.5.0 or above P a g e | 195


Click [OK] to clear.
Notes:
(1) After the Clear Command is executed, you can perform the Synchronize All Data to Devices
operation on the device list to re-synchronize data in the software to the device, but this operation
cannot be performed when the user capacity and fingerprint capacity are fully consumed on the
device. Once the capacity is insufficient, you can replace the current device with a large-capacity one,
or delete the right of some personnel to access this device, and then perform the Synchronize All
Data to Devices operation.
(2) Operate State is the content of communications equipment of current device, mainly used for
debugging.
(3) The number of commands to be performed is greater than 0, indicating that data is not
synchronized to the device, just wait.

6.1.7 Real-Time Monitoring

Click [Elevator Device] > [Real-Time Monitoring], real-time monitor the status and real-time events of
elevator controllers in the system, including normal events and abnormal events (including alarm
events). Real-Time Monitoring interface is shown as follows:

1. Event Monitoring
System automatically acquires monitored device event records (by default, display 200 records),
including normal and abnormal elevator control events (including alarm events). Normal events
appear in green, alarm events appear in red, other abnormal events appear in orange.
Monitor Area: All floors with elevator controller in the system is monitored by default, you can target
to monitor one or more floors by Area, Status, Device Name and Serial NO.

ZKBioSecurity 3.1.5.0 or above P a g e | 196


Show Photos: If Real-Time Monitoring is involved in a person, the monitor displays the personal
photo (if no photo is registered, display default photo). The event name, time and name are
displayed.
2. Remotely Release Button
Click [Remotely Release Button]:

Input the user password (the system logging password), click [Next Step]:

ZKBioSecurity 3.1.5.0 or above P a g e | 197


Select the floor, and click [Next Step]:

Fields are as follows:

Remote Release: It determines whether the corresponding key to the selected floor can be pressed.
You can customize the key release duration (15s by default), or select Enable Intraday Passage Mode
Time Zone. You can also directly set the current status of the floor to continuously release. In this
case, the floor is not subject to restrictions of any periods, including Floor Active Time Zone, Floor
Passage Mode Time Zone, and Button Open Duration. That is, the floor will be continuously released
in 24 hours every day.

Enable Intraday Passage Mode Time Zone: To close a floor, you must first set Disable Intraday
Passage Mode Time Zone to prevent the case that the floor is opened because other continuous
open periods take effect. Then, you need to set to close the Remote Lock Button.

Sustained Release Button: The floor that is set to the continuously release state is not subject to
restrictions of any periods, that is, the floor will be continuously released in 24 hours every day. To
close the floor, you must select Disable Intraday Passage Mode Time Zone.

Note: If a failure message is always returned for the remote release key, check whether there are
too many currently disconnected devices on the device list. If yes, check the network connection.

Select the options, click [Complete] to finish enabling the button.

2. Remotely Lock Button


Click [Remotely Lock Button]:

ZKBioSecurity 3.1.5.0 or above P a g e | 198


Input the user password (the system logging password), click [Next Step]:

Select the floor, and click [Next Step]:

ZKBioSecurity 3.1.5.0 or above P a g e | 199


Fields are as follows:

Remote Locking: Lock the remotely released button.

Note: If a failure message is always returned for the remote lock key, check whether there are too
many currently disconnected devices on the device list. If yes, check the network connection.

Select the options, click [Complete] to finish enabling the button.

6.2 Elevator Rules


It can control buttons of a common elevator and implement unified management on people going
in or on access and exits of each floor through the elevator controller on the computer management
network. You can set the rights of registered personnel for operating floor buttons on the elevator.

6.2.1 Time Zones

1. Add Elevator Control Time Zone


(1) Click [Elevator] > [Time Zones] > [New] to enter the time zone setting interface:

ZKBioSecurity 3.1.5.0 or above P a g e | 200


The parameters are as follows:
Time Zone Name: Any character, up to a combination of 30 characters.
Remarks: Detailed description of the current time zone, including explanation of current time zone
and primary applications. The field is up to 50 characters.
Interval and Start/ End Time: One Elevator Control Time Zone includes 3 intervals for each day in a
week, and 3 intervals for each of the three Holidays. Set the Start and End Time of each interval.
Setting: If the interval is Normal Open, just enter 00:00-23:59 as the interval 1, and 00:00-00:00 as the
interval 2/3. If the interval is Normal Close: All are 00:00-00:00. If only using one interval, user just
needs to fill out the interval 1, and the interval 2/3 will use the default value. Similarly, when only
using the first two intervals, the third interval will use the default value. When using two or three
intervals, user needs to ensure two or three intervals have no time intersection, and the time shall
cross over to 2nd day, or the system will prompt error.
Holiday Type: Three holiday types are unrelated to the day of a week. If a date is set to a holiday type, the
three intervals of the holiday type will be used for access. The holiday type is optional. If the user does not
enter one, system will use the default value.
Copy on Monday: You can quickly copy the settings of Monday from Tuesday to Sunday.
(2) After setting, click [OK] to save, and it will display in the list.
2. Maintenance of Elevator Time Zones
Edit: Click the [Edit] button under operation to enter the edit interface. After editing, click [OK] to
save.
Delete: Click the [Delete] button under Related Operation, then click [OK] to delete, or click [Cancel]

ZKBioSecurity 3.1.5.0 or above P a g e | 201


to cancel the operation. A time zone in use cannot be deleted. Or tick the check boxes before one or
more time zones in the list, and click the [Delete] button over the list, then click [OK] to delete, click
[Cancel] to cancel the operation.

6.2.2 Holidays

Elevator Control Time of a holiday may differ from that of a weekday. The system provides elevator
control time setting for holidays. Elevator Holiday Management includes Add, Modify and Delete.
 Add
(1) Click [Elevator] > [Holidays] > [New] to enter edit interface:

Fields are as follows:


Holiday Name: Any character, up to a combination of 30 characters.
Holiday Type: Holiday Type 1/2/3, namely, a current holiday record belongs to the three holiday
types and each holiday type includes up to 32 holidays.
Start/ End Date: The date format: 2010-1-1. Start Date cannot be later than End Date otherwise
system error will occur. The year of Start Date cannot be earlier than the current year, and the holiday
cannot span years.
Recurring: It means that a holiday whether to require modification in different years. The default is
No. For example, the Near Year’s Day is on January 1 each year, and can be set as Yes. The Mother's
Day is on the second Sunday of each May; this date is not fixed and should be set as No.
For example, the date of Near Year’s Day is set as January 1, 2010, and the holiday type is 1, then on
January 1, Access Time Control will not follow the time of Friday, but the Access Control Time of
Holiday Type 1.

(2) After editing, click [OK] button to save, and it will display in holiday list.

 Modify
Click Holiday Name or [Edit] button under Operations to enter the edit interface. After modification,
click [OK] to save and quit.

ZKBioSecurity 3.1.5.0 or above P a g e | 202


 Delete
In the access control holiday list, click [Delete] button under Operations. Click [OK] to delete, click
[Cancel] to cancel the operation. An Elevator Holiday in use cannot be deleted.

6.2.3 Elevator Levels

Elevator levels indicate that one or several selected doors can be opened by verification of a
combination of multi person within certain time zone. The combination of multi-person set in
Personnel Access Level option.
 Add
1. Click [Elevator] > [Access Levels] > [New] to enter the Add Levels editing interface:

2. Set each parameter: Level Name (unrepeatable), Time Zone and Area.
3. Click [OK], the system prompts ”Add floors to the current elevator control level immediately”, click
[OK] to add floors, click [Cancel] to return the elevator levels list. The added level is displayed in the
list.

ZKBioSecurity 3.1.5.0 or above P a g e | 203


Note: Different floors of different elevator controllers can be selected and added to an elevator
level.

6.2.4 Set Access By Levels

Add/Delete Personnel for Selected Levels:

1. Click [Elevator] > [Set By Levels] to enter the edit interface, Click an Elevator level in left list,
personnel having right of opening door in this access level will display on right list.

2. In the left list, click [Add Personnel] under Operations to pop-up the Add Personnel box; select

personnel (multiple) and click to move it to the right selected list, then click [OK] to save
and complete.

3. Click the level to view the personnel in the right list. Select personnel and click [Delete Personnel]
above the right list, then Click [OK] to delete.

6.2.5 Set Access By Person

Add selected personnel to selected elevator levels, or delete selected personnel from the elevator
levels.
Add/Delete levels for Selected Personnel:
(1) Click [Elevator] > [Elevator Levels] > [Set By Person], click employee to view the levels in the right
list.
(2) Click [Add to Levels] under Operations to pop-up the Add to Levels box, select Level (multiple)

and click to move it to the right selected list; click [OK] to save and complete.

ZKBioSecurity 3.1.5.0 or above P a g e | 204


(3) Select Level (multiple) in the right list, and click [Delete from levels] above the list, then click [OK]
to delete the selected levels.
Setting levels for Selected Personnel:
(1) Select a person in the list on the left and click [Elevator Control Setting]. The following page is
displayed:

(2) Set access control parameters and click [OK] to save the setting.

6.2.6 Set Access By Department

Add selected department to selected elevator levels, or delete selected department from the
elevator levels. The access of the staff in the department will be changed.

6.2.7 Global Linkage

The global linkage function enables you to configure data across devices. Only push devices support this
function.

 Add

1. Click [Elevator] > [Elevator] > [Global Linkage] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 205


The fields are as follows:

Linkage Name: Set a linkage name.

Linkage Trigger Condition: Linkage Trigger Condition is the event type of selected device. Except
Linkage Event Triggered, Cancel Alarm, Enable/Disable Auxiliary Output, and Device Start, all events
could be trigger condition.

Input Point: Any, Door 1, Door 2, Door 3, Door 4, Auxiliary Input 1, Auxiliary Input 2, Auxiliary Input 3,
Auxiliary Input 4, Auxiliary Input 9, Auxiliary Input 10, Auxiliary Input 11, Auxiliary Input 12 (the
specific input point please refers to specific device parameters).

Output Point: Lock 1, Lock 2, Lock 3, Lock 4, Auxiliary Output 1, Auxiliary Output 2, Auxiliary Output 3,
Auxiliary Output 4, Auxiliary Output 6, Auxiliary Output 8, Auxiliary Output 9, and Auxiliary Output 10
(the specific output point please refers to specific device parameters).

Linkage Action: Close, Open, Normal Open. The default is closed. To open, delay time shall be set, or
select Normal Close.

Video Linkage:

 Pop up video: Whether to set the pop-up preview page in real-time monitoring, and set the
pop-long.

ZKBioSecurity 3.1.5.0 or above P a g e | 206


 Video: Enable or disable background video recording, and set the duration of background video
recording.

 Capture: Enable or disable background snapshot.

Delay: Ranges from 1~254s (This item is valid when Action type is Open).

2. Click [OK] to save and quit. The added Global Linkage will display in the list.

Note: It is not allowed to set the same linkage setting at input point and output point. The same
device permits consecutive logical linkage settings. The system allows you to set several trigger
conditions for a linkage setting one time.

6.2.8 Parameters

Click [Elevator] > [Elevator] > [Parameters]:

Type of Getting Transactions

 Periodically

Start from the setting and efficient time, the system attempts to download new transactions every
time interval.

 Set the Time For Obtaining New Transactions

The selected Time is up, the system will attempt to download new transactions automatically.

The Real Time Monitoring Page Pop-up Staff Photo Size: When an access control event occurs, the
personnel photo will pop up, set the size of the pop-up photos, the range is 80-500px.

6.3 Elevator Reports


Includes “All transactions” and “All Exception Events”. You can export after querying.

ZKBioSecurity 3.1.5.0 or above P a g e | 207


6.3.1 All Transactions

Because the data size of elevator access control event records is large, you can view elevator access
control events as specified condition when querying. By default, the system displays the latest three
months transactions.

Click [Reports] > [All Transactions] to view all transactions:

Clear All Data: Click [Clear All Data] to pop up prompt and click [OK] to clear all transactions.

Export: You can export all transactions in Excel, PDF, CSV format.

6.3.2 All Exception Events

Click [Reports] > [All Exception Events] to view exception events in specified condition. The options
are same as those of [All Transactions].

ZKBioSecurity 3.1.5.0 or above P a g e | 208


Clear All Data: Click [Clear All Data] to pop up prompt, click [OK] to clear all exception events.

Export: You can export all exception events in Excel, PDF, CSV format.

6.3.3 Access Rights By Floor

View related access levels by door. Click [Reports] > [Access Rights By Floor], the data list in the left
side shows all floors in the system, select a floor, the personnel having access levels to the floor will
display on the right data list.

You can export all the personnel having access levels to the floor data in Excel, PDF, CSV format.

ZKBioSecurity 3.1.5.0 or above P a g e | 209


6.3.4 Access Rights By Personnel

Click [Reports] > [Access Rights By Personnel], the data list in the left side show all doors in the
system, select personnel, the personnel having access levels to the door will display on the right data
list.

You can export all the floor information in Excel, PDF, CSV format.

ZKBioSecurity 3.1.5.0 or above P a g e | 210


ZKBioSecurity 3.1.5.0 or above P a g e | 211
7. Hotel Management System
It provides hotel service management functions covering check-in, overstay, check-out, rate
settlement, and lock setup and management.

 Operation Guide

It helps you quickly understand how to quickly navigate to specific function pages and configure
and use the hotel management software.

7.1 Hotel Settings


You can set the basic information about a hotel, including its name, address, phone number, fax
number, zip code, website address, and email address. You can also set the function parameters
regarding the check-in time, check-out time, check-out reminder, and access/elevator control
permissions.

Choose [Room Management] > [Hotel Info Settings]. The page shown in the following figure
appears.

The fields are described as follows:

Default Check-In Time: You can set this time yourself. If a guest checks in before this time, the
check-out date is the current day if the guest stays for one day. Otherwise, the check-out date is the

ZKBioSecurity 3.1.5.0 or above P a g e | 212


next day.
Default Check-Out Time: It specifies the end time of a day use room.
Overstay Check-Out Time 1/2: You can set this time yourself. If a guest checks out at a time
between Overstay Check-Out Time 1 and Overstay Check-Out Time 2, the guest must pay an
overstay charge. If a guest checks out at a time after Overstay Check-Out Time 2, the guest must
pay for an extra day.
Reservation Date Range: It is the period for which the advance booking can be started.
Default Staying Days: It specifies the default number of days a guest stays. Generally, a guest stays
for 1 day.
Default Staying Hours: It specifies the user-defined minimum number of hours a guest may stay. If a
guest stays for a period less than this limit, the guest is charged the rate corresponding to this limit.
Elevator/Access Control: After selecting this check box, you can select an access/elevator control
level on the card issuing UI, so that an issued card can be used not only as a hotel card, but also used
to access the devices corresponding to the selected level. (Note: This check box is available on the
Hotel Settings page only after you use the access control module and/or elevator control module
and obtain and activate a license.)
Tax/Tax Rate: You can mention the tax name and the percentage below.
Other Charges/Rate: It specifies any other kind of taxes, depending on the region.
Cleaning Time Limit: It specifies the time available for cleaning a room after a guest checks out.
Checkout Remind: It specifies whether to display a reminder one hour before checkout.
Currency Type: It specifies the currency.

Note: The hotel management system can be used to define buildings, floors, and rooms as well as
handle check-in requests only after you set these parameters.

7.2 Room Management

7.2.1 Room Types

You can design information about various types of room, such as the number of beds and number
of guest allowed. You can lock and unlock vacant rooms.

Choose [Room Management] > [Room Type] > [New]. The page shown in the following figure
appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 213


Note: When you add a room type, the system checks whether hotel setting is configured. If no,
you are redirected to the settings page. All room types must be unique.

7.2.2 Building

You can define buildings of a hotel. When the rooms in a building are not booked or guests have not
checked into the rooms, you can lock or unlock the building.

Choose [Room Management] > [Building] > [New]. The page shown in the following figure appears.

Note: When you add a building, the system checks for hotel settings and room types in order. If
they have not been configured, configure the settings and types first. All building names must be
unique.

7.2.3 Floor

You can define floors of a hotel. When the rooms on a floor are not booked or guests have not
checked into the rooms, you can lock or unlock the floor.

ZKBioSecurity 3.1.5.0 or above P a g e | 214


Choose [Room Management] > [Floor] > [New]. The page shown in the following figure appears.

Note: When you add a floor, the system checks for hotel settings, room types, and buildings in
order. If they have not been configured, configure the settings, types, and buildings first. All floor
names must be unique.

7.2.4 Room

 Adding guest rooms

Choose [Room Management] > [Room] > [New]. The page shown in the following figure appears.

Select the desired Building, Floor and Room type.

Start Room Number: It specifies the start number of rooms.

Room Count: It specifies the number of rooms to add. The value 1 indicates only one room is added.
A value greater than 1 indicates that a batch of rooms is added.

Remark: It describes about the room.

ZKBioSecurity 3.1.5.0 or above P a g e | 215


Note: All room names must be unique.

 Editing guest room

1) Editing one guest room

Select one guest room and edit the guest room. Duplication of guest room names are not allowed.
Guest rooms that have been checked in or booked cannot be edited. See the following figure.

2) Editing guest rooms in batches

Select the check boxes of multiple guest rooms and edit them in batches. Duplication of guest room
names is not allowed.

Only the rooms of the same type and belonging to the same building and same floor can be edited
in batches. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 216


 Deleting guest rooms

Select one or more guest rooms and delete them.


Only the guest rooms that have not been checked in or booked can be deleted.

 Exporting guest room information

Refer to Common Operations in Appendix.

7.2.5 Room Areas

You can define a room area, issue a card for the room area, and associate the locks of the rooms in
the area with the area, so that a hotel manager can use the card to manage all the guest rooms in
the area.

Choose [Room Management] > [Room Area] > [New]. The page shown in the following figure
appears.

Note:

Duplication of room area names is not allowed.

Click [Add Room] and then you can add rooms to the area. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 217


7.2.6 Booking Methods

You can define methods for booking hotel rooms. During system installation, the basic booking
methods are initialized by default and cannot be edited or deleted.

Choose [Room Management] > [Booking Method] > [New]. The page shown in the following figure
appears.

Note: Duplication of booking method names is not allowed. Unused booking methods can be
deleted.

7.2.7 Access/Elevator Control Levels

You can assign access/elevator control levels to cards issued using the hotel module. This allows a
user to use the same card for the hotel module and the access/elevator control module. That is, a
card for the hotel module can also be used to access all the devices covered by the specified
access/elevator control level.
ZKBioSecurity 3.1.5.0 or above P a g e | 218
Note: This function and the Edit Personnel For Levels page are available only after you use the
access control module and/or the elevator control module and obtain and activate a license.

Choose [Room Management] > [Edit Personnel For Levels]. The page shown in the following figure
appears.

You can add and delete access/elevator control levels, synchronize levels, browse personnel of levels,
and delete personnel of levels. To delete personnel of a level, you need to deregister their cards
instead of directly deleting them on this page, unless their cards are lost or another emergency
occurs.

 Adding a level

Click [Add Access Level(s)]. The page shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 219


Select the access control level to be added and click [OK]. Add access control level Floor 1 of
Building A to the hotel management level list. See the preceding figure. If you select this access
control level in the Access/Elevator Control field when issuing a card, the card can get
authenticated by all the access control devices on floor 1 of building A and unlock hotel rooms.

Click [Add Elevator Level(s)]. The page shown in the following figure appears.

Select the elevator control level to be added and click [OK]. Add elevator control level Floor 6 of
Elevator 1 to the hotel management level list. See the preceding figure. If you select this elevator
control level in the Access/Elevator Control field when issuing a card, the card can get you to floor 6
by elevator 1 and unlock hotel rooms.

ZKBioSecurity 3.1.5.0 or above P a g e | 220


 Deleting/synchronizing levels

On the Edit Personnel For Levels page, select a level, click [More], and choose to delete or
synchronize the selected level.

 Browsing/deleting personnel corresponding to levels

When you select a level on the Edit Personnel For Levels page, information about the personnel
corresponding to the level is displayed on the right. You can select the personnel to be deleted by
clicking [More], and delete the selected personnel. After being deleted, the personnel cannot access
the devices covered by the level.

7.3 Card Service Center


You can create different types of card for setting and managing room locks based on daily hotel
business management requirements. Holders of the cards are employees of the hotel. You need to
add the holders using the HR module and specify their departments using the hotel module, so that
you can select the holders when issuing management cards.

ZKBioSecurity 3.1.5.0 or above P a g e | 221


7.3.1 Setting Cards

You can set the basic information, including authorization, time, room number, and area information
about locks of the hotel.

1. Authorization card

You can authorize cards for hotel locks by binding cards with related hotel information to ensure
card security. After authorization, the locks can be unlocked only by the authorized cards. They will
emit alarms if other cards are used to unlock them.

ZKBioSecurity 3.1.5.0 or above P a g e | 222


Field description:

First Name: You can enter one or more characters contained in the surname or ID of a card holder to
fuzzily find the card holder. A card holder must be a person who has been added using the HR
module.

Card Valid Time: It specifies the expiration time of the card. Select a time as required. The default
time is one day later than the current system time.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, The card not only can unlock the specific room, but also can access the
corresponding devices to the elevator / access control level.

Notes:

 The Elevator/Access Control field is available only after the Room management field on the
Hotel Settings page is selected. It is used to deliver the card ID to access/elevator control devices.
For details about hotel settings, see section Hotel Settings.

 For the access control devices and all elevator control devices that do not allow one person to
hold multiple cards, bind only one card with one person. That is, you can select only one card for
one Elevator/Access Control option when issuing cards to card holders. As shown in the
preceding figure, if Elevator/Access Control is set to Floor 1 of Building A (all the access control
devices on floor 1 of building A do not allow one person to hold multiple cards) when an
authorization card is issued to a card holder, only the first card can be assigned the permission to
access floor 1 of building A. You cannot set Elevator/Access Control to Floor 1 of Building A
when issuing any other card to the card holder.

 If an access control device allows one card holder to hold multiple cards, you can assign one
access/elevator control level to multiple cards for the same card holder. You can select that level
again when issuing any other types of card or continuous cards to the card holder.

 The preceding three points regarding access/elevator control are applicable to all the cards of
the hotel module described in this document.

 The models and firmware version numbers of the access control devices that allow one person
to hold multiple cards include:

InBio Pro Series: AC Ver 5.7.7.3030 Mar 23 2017 and above version.

Unlocked Alarm: After selecting this check box, you can specify the number of times to emit an
alarm.

After the configuration, put a card to be written in the card writing area of the card writer and click

ZKBioSecurity 3.1.5.0 or above P a g e | 223


[Write Card].

 Adding hotel personnel

Choose [Personnel] > [Person] > [New]. The page shown in the following figure appears.

Enter personnel information, select a hotel department, and click [OK]. You can select added
personnel in the card issuing module.

2. Clock card

A clock card can be used to unlock rooms within its validity period. After configuration, synchronize
the time of room locks with the time of the computer system. Otherwise, an alarm of card expiration
may be triggered when you punch the card.

ZKBioSecurity 3.1.5.0 or above P a g e | 224


Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can unlock the specified room, but also can access the
corresponding devices to the elevator / access control level.

After the configuration, put a card to be written in the card writing area of the card writer and click
[Write Card].

3. Room name card

A room name card is used to unlock rooms with specified room names. You can select multiple
rooms to issue room name cards in batches.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After

ZKBioSecurity 3.1.5.0 or above P a g e | 225


the parameter is specified, the card not can unlock the specified room, but also can access the
corresponding devices to the elevator / access control level.

4. Room area card

A room area card is used to unlock rooms in a specified area. If a room is within the specified area,
the card can unlock the room.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can access the specified room, but also can access the
corresponding devices to the elevator / access control level.

Note: A maximum of 6 areas can be selected for one room area card.

7.3.2 Employee Card

You can create various access/elevator control cards, such as master cards and emergency cards for
hotel personnel to manage hotel services.

1. Master card

A master card can be used to unlock all the rooms of the hotel within its validity period. By default, it
is in Always Open mode.

ZKBioSecurity 3.1.5.0 or above P a g e | 226


Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can unlock the specified room, but also can access the
corresponding devices to the elevator / access control level.

If you select Always Open Mode, the unlocked rooms are kept unlocked.

Set Card Valid Time and Enable Time as well. The card can unlock rooms only within the specified
periods.

After the configuration, put a card to be written in the card writing area of the card writer and click
[Write Card].

2. Emergency card

A master card can be used to unlock all the rooms of the hotel within its validity period. By default,
Disable Indoor Locked is selected. You can specify whether to enable the Always Open mode.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can unlock the specified room, but also can access the
corresponding devices to the elevator / access control level.

ZKBioSecurity 3.1.5.0 or above P a g e | 227


If you select Always Open Mode, the unlocked rooms are kept unlocked.

To disable Always Open Mode, you need to use a card that can unlock rooms, such as a building
card or floor card.

Disable Indoor Locked is selected, which means that the card can open rooms even though the
rooms are locked from inside.

3. Building card

A building card can be used to unlock rooms in a specified building in common unlocking mode
within its validity period.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card can not only unlock the specified room, but also access the
devices corresponding to the elevator/access control level.

4. Floor card

A floor card can be used to unlock rooms on a specified floor in common unlocking mode within its
validity period.

ZKBioSecurity 3.1.5.0 or above P a g e | 228


Elevator/Access Control: Click the drop-down list box to select an elevator/access control level.
After the parameter is specified, the card not only can unlock the specified room, but also can access
the corresponding devices to the elevator / access control level.

5. Area card

A floor card can be used to unlock rooms in a specified area in common unlocking mode within its
validity period.

Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can unlock the specified room, but also can access the
corresponding devices to the elevator / access control level.

7.3.3 Maintenance Card

A maintenance card can be used to maintain and manage room locks of the hotel.

1. Report loss card

A report loss card is a card that is invalidated and obsolete (usually due to loss or damage of the card)
during its validity period.

ZKBioSecurity 3.1.5.0 or above P a g e | 229


Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card not only can unlock the specific room, but can also access the
corresponding devices to the elevator / access control level.

2. Record card

A record card can be used to read unlocking records from locks within its validity period. Only S70
Mifare cards can be used as record cards.

3. Lockout card

A lockout card is a special card used to lock and protect a scene in a room in case of an emergency.
Once lockout is implemented, the room can no longer be unlocked by all the cards that can
originally unlock it before the cards are re-authorized.

ZKBioSecurity 3.1.5.0 or above P a g e | 230


Elevator/Access Control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the card can not only unlock the specified room, but also access the
devices corresponding to the elevator/access control level.

7.4 Hotel Management

7.4.1 Reception

The function allows users to handle room services and check the hotel room occupancy, such as the
total number of rooms, number of available rooms, and number of available rooms of a specific
room type.

See the figure below.

ZKBioSecurity 3.1.5.0 or above P a g e | 231


Description of room icons

Individual Group
Vacant Extended
check-in check-in

Out of Under To be

service maintenance cleaned

1. Individual management

 Individual check-in

1) Double-click or right-click a vacant icon and choose [Individual Management] > [Individual
Check-In].

A page as shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 232


Reservation query: Enter the mobile phone number used for reservation to query the reservation
information.

Stay days: Enter the number of days that the guest wishes to stay.

Discount: Discount on the room cost. Just enter the discount percentage and the system will
automatically detect the discount from the final amount.

Amount Payable: Amount to be paid at the time of check-in, including the room cost and the
deposit.

2) After the information in the Individual Check-In page is filled in, the Registration or Issuing
page appears.

Elevator/access control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the room card can open not only the specified room, but also the devices
corresponding to the elevator/access control level.

Note: Issue at least one card for each room. The card must be issued for the registered guest.
When issuing the first guest card, the Only registered, no card option is not available. After the first
guest card is issued, you can select Only registered, no card as required. The option indicates that
the guest is registered only and does not hold a guest card.

 Individual overstay

1) Right-click a checked-in room icon and choose [Individual Management] > [Individual Overstay].

ZKBioSecurity 3.1.5.0 or above P a g e | 233


The page shown in the following figure appears.

Notes:

a. If the number of overstay days conflicts with the room reservation, extension is not allowed.
b. Choose the guest that needs extension for service processing.
c. The discount rate cannot be modified for overstay.
d. Overstay amount shows the amount to be paid for overstay.

2) After the information in the Individual Overstay page is filled in, the Registration or Issuing
page appears, as shown below.

ZKBioSecurity 3.1.5.0 or above P a g e | 234


Notes:

a. Re-issue the guest card for the overstay guest. The card must be the exact guest card issued
during check-in; otherwise, card issuance fails.

b. You can click Write Card to automatically write cards for overstay in circulation until all overstay
cards are written in an interval of 3 seconds.

 Individual room change

1) Right-click a room checked-in icon and choose [Individual Management] > [Individual Room
Change]. The page as shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 235


Guest Count: Number of guests that require room change.
Notes:

a. You can check the room information by reading the card.

b. The maximum number of guests of the selected guest room must not be smaller than the
maximum number of guests of the original guest room.

c. Guests without a card are not allowed to change the room alone.

d. If the original guest room is left with a guest without a card during room change, the system asks
whether to change the room for the guest without a card as well. If you choose No, the room
change service fails to proceed.

e. If the new guest room is reserved, the conflict information is displayed. You can choose whether
to proceed the service.

f. The discount can be set for room change.

g. If the deposit required for the new guest room is greater than that of the original guest room, the
guest needs to make up the deposit. If the deposit required for the new guest room is smaller
than that of the original guest room. All the deposits are returned at check-out.

h. If the rate of the new guest room is greater than that of the original guest room, the guest needs
to make up the room cost. If the rate of the new guest room is smaller than that of the original

ZKBioSecurity 3.1.5.0 or above P a g e | 236


guest room, the overpaid amount is returned at check-out.

2) After the information is filled in for room change, click [OK], and the Registration or Issuing
page appears, as shown below.

Elevator/access control: Click the drop-down list box to select an elevator/access control level. After
the parameter is specified, the room card can open not only the specified room, but also the devices
corresponding to the elevator/access control level.

Note: You can click [Write Card] to automatically write cards for all room changes in circulation
until all room change cards are written.

 Individual check-out

Right-click a checked-in room icon and choose [Individual Management] > [Individual Check-Out].
The page shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 237


Cancel Card: Check whether the card to be cancelled is the guest card matches the current guest
room, cancel the card if it matches the guest room, and display the notification if it does not match.

Note: When cards are cancelled one by one, the number of guests checked in is reduced. When
there is no card holder, the Cancel Card button is unavailable.

Click [OK], and the Check out settlement page appears, as shown below.

2. Team Management

 Group check-in

1) Right-click a checked-in room icon and choose [Team Management] > [Group Check-In]. The

ZKBioSecurity 3.1.5.0 or above P a g e | 238


page as shown in the following figure appears.

Reservation query: Enter the mobile phone number used for reservation and click to query for
all guest rooms reserved with the mobile phone number.

Page description:

1. Allows you to enter the group check-in information.

2. Shows the reservation information of the current room. If the room has been reserved, the
reservation information is displayed in the list in Area II. If the reservation conflicts with the
check-in time, check-in cannot be processed.

ZKBioSecurity 3.1.5.0 or above P a g e | 239


3. Displays the list of available guest rooms (and you can double-click a room to add it to 4).

4. Displays the reservation and the guest rooms selected in 3.

5. Shows the deposit amount and room cost for the group check-in.

Notes:

 If the stay period overlaps with the reservation period, the Check-In button is unavailable
and check-in is not allowed.

 If the number of check-in guests is greater than maximum number of guests for all guest
rooms in total, the Check-In button is unavailable and check-in is not allowed.

2) Click [Check-In], and the Write Card page for group check-in appears, as shown below.

ZKBioSecurity 3.1.5.0 or above P a g e | 240


Guest Count: Number of guests checked in for the room. The number must not exceed the
maximum number of guests allowed for the room.

Only registered, no card: If this option is selected, only the guest information is registered and no
card is issued for the guest.

Elevator/Access Control: If the access control or elevator control module exists, and the
Elevator/Access Control checkbox is selected in Hotel Settings, the option will be available and you
can assign access control or elevator control level to a card. For details about hotel settings, see
section Hotel Settings.

Note: You can click or to go to the previous or next room.

 Group Overstay

1) Right-click a checked-in room icon and choose [Team Management] > [Group Overstay]. The
page shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 241


Page description:

1. Information about the rooms checked in by the group and the guest information.

2. List of reserved guest rooms.

3. Check-in information of the group.

Notes:

 The overstay period cannot overlap with the reservation period; otherwise, the Extension
button is unavailable.
 By default, the stay period is extended for the whole group.
 The overstay period is one day in the minimum. For a special condition, the overstay days can
be set to 0.

ZKBioSecurity 3.1.5.0 or above P a g e | 242


2) Click [Extension], and the Write Card page for group overstay appears as shown below.

Notes:

Re-write all cards issued to the group members for overstay.

When you click [Write Card], all cards are written for the rooms one by one in a cycle at an interval of
3 seconds.

The card issued during guest check-in is required for re-writing. In case any card is damaged or lost,
report of loss, and make-up must be carried out for the card before reissuance.

You can click or to switch to the previous or next room.

 Group check-out

Right-click a checked-in room icon and choose [Team Management] > [Group Check-Out]. The page
shown in the following figure appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 243


Notes:

 You can choose to check out only some of the rooms for the group. By default, all rooms are
checked out for one group.
 The cards of the selected room are cancelled.
 You can check out a room before cancelling its cards (and cancel the cards after they are
collected).
Click [Check Out], the Check out settlement page appears as shown below.

ZKBioSecurity 3.1.5.0 or above P a g e | 244


3. Reading a card

You can view the issuance information of all module cards in the hotel, except for the record cards.
The content is displayed based on the card type (for example, guest cards and authorization cards).
When a record card is read, only the card type is provided.

4. Canceling a card

You can clear all the card (IC) information. For a guest card, the system checks whether the card is
the last card of the room checked in by the guest. If it is, the card cannot be cancelled (as the system
does not support free-of-card check-in). For other types of cards, no verification is performed.

5. Report of lost card

You can set a damaged or lost card to an invalid state. For details, see Report card loss in section
Maintenance Card.

6. Re-issuing a card

You can re-issue a card for a registered guest or a guest that reports card loss and an additional card
for a checked-in room. If the number of guests checked in a room reaches the maximum, no
additional card is allowed.

Choose [Hotel Management] > [Reception Center] > [Reissue Card]. Select a room for card
re-issuance or locate the room by querying the certificate information (by clicking ) on the
Reissue Card page, as shown below.

ZKBioSecurity 3.1.5.0 or above P a g e | 245


Page description:

1. Displays the guest information and check-in information of the room.

2. Enables input of guest information for the card to be issued.

7.4.2 Reservation

You can check the check-in and reservation status of all rooms in a specified period and process
room reservation.

Choose [Hotel Management] > [Reservation Center]. The page shown in the following figure
appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 246


Page description:

1. (Available dates): By default, a 15-day period (starting from the current system date) is displayed.
You can change the displayed period with the Reservation Date Range parameter on the Hotel
Information page. For details, see section Hotel Settings.

The room reservation time ranges from 12:00 on the reservation start date to 12:00 on the
reservation due date. You can change the time point with the Default Check-Out Time parameter
on the Hotel Information page. For details, see section Hotel Settings.

2. (Available rooms): All rooms in the hotel are displayed. You can specify the start and end time
and room type to query for a required room.

Room status indicates that the room can be reserved for the time period.

Room status indicates that the room is occupied in the time period and cannot be reserved.

Room status indicates that the room has been reserved for the time period.

Note: If a room is used by guests, and will be checked out in the reservation period, the room will
be displayed among the available rooms, but cannot be reserved before it is checked out.

3. Guest information of the reservation.

4. Information about the rooms selected for reservation.

ZKBioSecurity 3.1.5.0 or above P a g e | 247


 Reservation process

Step 1: Click the room and date for reservation. The selected date of a room turns into red as .
You can click the room and date again to cancel the selection. You can select multiple rooms of the
same date, multiple dates (continuous only) of one room, or multiple dates (continuous only) of
multiple rooms.

After selection, the information about the selected rooms are listed in 4 in the right part of the
Reservation Center page.

Step 2: Fill in the guest information, including the name, mobile phone, certificate number, and the
booking method (telephone or reception desk).

Step 3: Click [Save].

7.4.3 Book Management

You can query, edit, delete, and handle check-in for a reservation.

 Searching for reservation

Choose [Hotel Management] > [Book Management]. The page shown in the following figure
appears.

You can also enter the guest name and mobile phone number to query for a required reservation.

ZKBioSecurity 3.1.5.0 or above P a g e | 248


 Editing/deleting a reservation

Select the guest name of a reservation, click [Edit] under Operations.

The below reservation page will be displayed. You can change a room or modify the guest
information for the reservation. Modify the details accordingly and click [Save].

ZKBioSecurity 3.1.5.0 or above P a g e | 249


Delete:
Select the guest name of a reservation, click [Delete] under Operations or the delete button on the
top of the list to delete the reservation.

 Managing check-in

Select the guest name of a reservation, click [Check-In] under Operations. The Individual Check-In
page appears.

ZKBioSecurity 3.1.5.0 or above P a g e | 250


The system automatically loads the reservation information of the room. Modify and complete the
guest information and click [Check-In]. The Registration or Issuing page appears as shown below.

Place the guest card on the card writer and click [Write Card] and Complete to complete check-in.

ZKBioSecurity 3.1.5.0 or above P a g e | 251


Notes:

 You cannot process check-in for an expired reservation. Check-in can only be processed on
site. For details, see Individual check-in in section Reception Center.

 The guest can check in before the reserved time.

7.5 Report Management

7.5.1 Guest Check-In Report

To view the guest check-in details report, enter the search conditions and view the records. You can
export the records into an Excel, PDF, or CSV file. See the following figure.

You can export the records into an Excel, PDF, or CSV file. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 252


7.5.2 Room Check-In Report

To check the room occupancy information (including the room name, type, check-in type, check-in
time, and check-out time), enter the search conditions and view the records. You can export the
records into an Excel, PDF, or CSV file. See the following figure.

You can export the records into an Excel, PDF, or CSV file. See the following figure.

7.5.3 Room Charge Report

To check the room expenses record, enter the search conditions (including time, guest name, room
name, and room type) and view the records. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 253


7.5.4 Issue card Report

You can also view all card writing records or search required card writing records with multiple
search conditions. Enter the search conditions (including time, card type, card No., issuing date, and
expiration date) and check the associated card writing records.

ZKBioSecurity 3.1.5.0 or above P a g e | 254


You can export the records into an Excel, PDF, or CSV file. See the following figure.

7.5.5 Unlock Record Report

You can read a record card to check the lock opening record. Place the record card on a card writer
and click [Read Lock Opening Record] to obtain all lock opening records of the record card. You can
enter search conditions (including the building/floor/room name, start time, and end time) and view
the associated records. You can export the records into an Excel, PDF, or CSV file.

ZKBioSecurity 3.1.5.0 or above P a g e | 255


You can export the records into an Excel, PDF, or CSV file. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 256


8. Visitor System
After clicking [Visitor], the following window will pop up. Click [OK] to register the clients accessing
the server to the Entry Place lists. For more details of registration of an entry place, please refer to
Entry Place.

8.1 Registration

8.1.1 Entry Registration

 Entry Registration

1. Click [Registration] > [Entry Registration], the system will detect the hardware environment
based on the parameters of [Parameters] in [Basic Management] before entering the
registration page:

After the detection is completed, click, click [Close] to continue registering, shown as the left figure
below. If the detection failed, click [Close] and the system will prompt to download driver, click
[Close] to close the registration window, shown as the right figure below.

ZKBioSecurity 3.1.5.0 or above P a g e | 257


Notes:

 In the [Parameters] of [Basic Management], if you checked the” Type of Photo Printed on the
Receipt Catch Photo”, “Fingerprint Registration is Required” and “Use High-Speed Portable
HD Doc Scanner”, the related controls or drives will be detected. More details about
[Parameters], please refer to Parameters.

 If it is detected that no driver has been installed or an older version of driver has been
installed, the system will be prompted to download the latest drivers.

2. The registration page is shown as below:

ZKBioSecurity 3.1.5.0 or above P a g e | 258


Fields are as follows:
Host/Visited: Select the visited personnel.
Visit Department: Select the department the visitor will visit.
Visit Reason: Select the visit reason. You can also input a new reason, and the reason will be added
in the Visit Reason list in the [ Visit Reason] of [Basic Management].

Certificate Type: Passport, Driving License, ID Card and Others are available to choose. If ID Scan OCR

function is activated, visitor information will display automatically after clicking icon.

Entrance: Select the entry place for the visitor. You can add an entry place in the [ Entry Place] of
[Basic Management].

Certificate No.: The numbers and letters are legal; the max length is 20.

Capture: The captured photo and certificate photo can be taken separately or at the same time
(which can be set in Parameter Settings). If there is a camera (High-Speed Portable HD Doc Scanner)
connected with the server, you can click [Capture] to take the visitors’ photo. The browser may block
the camera to access, please click in the IP address bar to select the camera and change setting
to allow access to this page.

Notes:

 For different browsers, the contents of tips are different, the actual browser display prevail,
just choose the shared camera, and allows the system to access the camera.

 If the entry place supports network camera, scanner, high camera, it will not pop up this tip.

 You can select card number, fingerprint, password or code scanning for registration (set in
the parameter setting).

 Exit Registration

There are 2 ways:

1. Click [Exit Registration] below Operations as a visitor is ready to leave.

ZKBioSecurity 3.1.5.0 or above P a g e | 259


Select the Exit Place and click [OK].

2. You can also click [Exit Registration] in the menu bar when there is too much information in the

list: :

Input the ID Number to get the other information of this visitor quickly. Select the Exit Place and click

ZKBioSecurity 3.1.5.0 or above P a g e | 260


[OK].

8.1.2 Visitor

You can delete, disable or enable a visitor.

 Deleting a Visitor

Click [Registration] > [Visitor], select a visitor, click [Delete].

 Disabling a Visitor

Click [Registration] > [Visitor], select a visitor, click [Disable].

Click [OK] to block the visitor. The below Disable indicates the visitor is blocked.

 Enabling a Visitor

Click [Registration] > [Visitor], select a blocked visitor, click [Enable].

8.2 Reservation
1. Click [Reservation] > [Reservation] > [New]:

Host/Visited: Select the visited personnel. Click the input box to filter the query according to the

ZKBioSecurity 3.1.5.0 or above P a g e | 261


input characters, or click the query button to pop up the list of the visited personnel to select the
visited personnel.
2. Complete the reservation information, click [OK].

The personnel can reserve visitor for themselves by “Personal Self-Login”. The method is the same as
the above descriptions. For details about logging in to the personal-self system, please refer to
Personal Self-Login.

8.3 Basic Management

8.3.1 Parameters

Click [Basic Management] > [Parameters]:

ZKBioSecurity 3.1.5.0 or above P a g e | 262


Common Parameter Option

 Carrying Goods Capture: Enable it to take the photo to the goods carried by the visitor.

 Exit Registration: Enable or disable the auto sign-off function. Auto sign-out means a visitor
leaves by directly punching a card or using his/her fingerprint at the preset auto sign-out place,
without performing the Exit Registration operation in the software. Setting automatic sign-out
place means specifying some readers as the auto sign-out place. Click [Set Automatic Sign Out
Place].

Click [OK] to finish.

Sign Out Expired Visitors: Expired visitors who have not been manually signed out will be
automatically signed out after a specified interval.

Visitor Detail Information Today Remind Time: Set the remind time of unsigned-out visitor lists
every day.

 Permission

Whether to Issue Card: Whether to issue card for the visitor.

Fingerprint Registration is Required: Whether to register the fingerprint for the visitor.

Password is required: If selected, it will make password mandatory.

Scan Code is Required: If selected, it will code scan mandatory

 Select the Required Field: You can set whether the Host(Personnel) and visited departments
would be required in the registration page and the reservation page.

 Visitor Vehicle Authorization Mode: You can set this option as per the reliability of the vehicle. If
you want to make all vehicle details to be noted, then select Temporary Vehicle. If only one or
some vehicle enters on a regular basis, then you can keep them in whitelist.

ZKBioSecurity 3.1.5.0 or above P a g e | 263


 Normal Parameter Option

Capture: Whether to capture the portrait and certificate photo together.

Camera Mode: It can set the authorization for the camera. If Safe Mode is selected, you have to allow
access to camera every time you open registration page. If Fast Mode is selected, then only once the
access need to be given.

Floating Window: If selected, you will get a floating window as shown below on the Visitor module
page. You can move it anywhere over the interface as per your convenience. You can perform either
Entry or Exit registration from any interface.

 Registration Client:

1) If there is no driver installed in the system, the [Download Driver] link is displayed. Click the link to
download and install the driver.

2) Enter the corresponding registration code and click [Register].

Note: Click [System] > [Authority Management] > [Client Register] to view the registration code.

 The Visitor List the Recipient Mailbox: Configure the recipient's mailbox and the time for
system to send the list of visitors today.

Use the button to add more than one recipient.

ZKBioSecurity 3.1.5.0 or above P a g e | 264


8.3.2 Device Debugging

Entry Place: Displays the information of the current entry place, such as the name of the entry place,
IP, Mode of picture/document collection.
ZKBioSecurity 3.1.5.0 or above P a g e | 265
Print: It shows the Printer-driver installation information.

Device: Display device driver installation, you can debug, calibrate the scanner. Set the high Speed
Portable HD Doc Scanner parameters, and information of USB camera. (IE browser does not display
USB device debugging).

8.3.3 Print Settings

 Global Settings (Valid at each Entry Place)

Template Selection: Select a template to print the template, if the template does not meet the print
content, you can add or edit the template (the default template cannot be edited, deleted).   

Print Photos: Select whether to print receipt when the server is connected to a printer, select
whether to use the catch photo in the receipt (Visitor Photo or Capture Photo).

 Local Settings (Valid at the current Entry Place) 

ZKBioSecurity 3.1.5.0 or above P a g e | 266


Print: You can set the options for the printer, the type of paper to be printed, or the custom paper
size, and view the effect by clicking Print Preview / Direct Print. At last, you can save the current
setting for the print out of the visitor badge.

8.3.4 Visitor Levels

The visitor can be allocated Access or Elevator levels with in registration after the visitor level has
been set.

Click [Basic Management] > [Visitor Levels]:

 Add Access Levels

Click [Basic Management] > [Visitor Levels] > [Add Access Levels]:

ZKBioSecurity 3.1.5.0 or above P a g e | 267


Set a visitor level name, select one or more access levels, click or to move into the
Selected menu. Click [OK].

Allocate the Access levels for the visitor when registering.

 Add Elevator Levels

Same as Add Access Levels.

 Delete Levels

Select a visitor level, click [Delete] in the drop-down list of [More].

 Synchronous Level

When the Access or Elevator levels are modified, click [Synchronous Level] in the drop-down list of
[More] to update the modification in time.

8.3.5 Host Levels

If you want to preset the level for the visitor of any host, then use this function. After setting the
level(s), at the entry registration page, the visitor level is automatically selected once you select the
host.

1. On the host level interface, click on [New]. Select required Personnel, move them to selected list
and then click [OK].

ZKBioSecurity 3.1.5.0 or above P a g e | 268


ZKBioSecurity 3.1.5.0 or above P a g e | 269
8.3.6 Visited Department Levels

It is same as Host levels, the only difference is that, in this you can set for department.

8.3.7 Entry Place

 Add an Entry Place

1. Click [Basic Management] > [Entry Place] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 270


Fields are as follows:

Place Name: Must be unique with maximum of 50 characters.

IP Address: The IP address of the server.

Photo Collection: USB Camera, IP Camera and Dual Camera High-Speed Portable HD Doc Scanner
are available. The IP Camera must be added in the “Video Device” before.

Document Collection: USB Camera, High-Speed portable HD Doc Scanner, Scanner and Dual
Camera High-Speed Portable HD Doc Scanner are available.

Default Access Level: Set the default levels in this entry place.

Area Name: The name of the area the entry place belongs to, and the registration record for each
entry place is filtered according to the area of the entry place. 

2. Click [Edit] or [Delete] as required.

 Automatic Exit Place

Please refer to Parameters.

8.3.8 Visit Reason

You can add visit reason, so that you can select either from them at the entry registration page.

1. Click [Basic Management] > [Visit Reason] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 271


2. Click [OK] to finish. You can also click [Edit] or [Delete] as required.

8.3.9 Custom Attributes

If you want to add a specific field on the registration page then you can use this function.

Input the Attribute name, select the field type as; Pull down, Multiple Choice, Single Choice or Text.

If you select any of the type except Text, then you have to mention the attribute value(s). use a
semicolon to separate the values. Enter Row and Column as required. You can choose, if this
attribute is displayed or Registration or Exit registration.

8.4 Visitor Reports

8.4.1 Last Visited Location

Click [Reports] > [Last Visited Location] to view the reports. The reports can be filtered by different
conditions.
ZKBioSecurity 3.1.5.0 or above P a g e | 272
You can export the data into an Excel, PDF, or CSV file. See the following figure.

8.4.2 Visitor History Record

Click [Reports] > [Visitor History Record] to view the reports. The reports can be filtered by different
conditions.

You can export the records into an Excel, PDF, or CSV file. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 273


9. Parking Lot System
Modern parking management involves management of various aspects, in which vehicle
management is an important part. In special areas, such as special parking lots, military regions,
government agencies, and residential areas, strict management must be performed on vehicles in
real time, that is, strictly monitoring the incoming/outgoing time, and registering and identifying
vehicles (including internal and external vehicles). In large-scale areas, there are a large number of
incoming/outgoing vehicles. If each vehicle needs to be manually identified, it is time consuming
and difficult to implement management, query, and safeguarding, resulting in low efficiencies. To
improve this management mode that is not suitable for modern parking lots, military regions,
government agencies, and residential areas, it is urgent to implement automatic and intelligent
vehicle management using computer networks to effectively and accurately monitor and manage
vehicles at all exits and entrances. This requires corresponding application software for highly
efficient and intelligent management on parking lots.

Functional Modules of the System:

This system comprises seven functional modules:

 Operation Wizard: Guides users through basic configuration of the system.

 Authorization Management: License Plate registration, manages license plate authorization of


fixed vehicles and temporary vehicles, and extends valid time of fixed vehicles.

 Parking Lot Management: Sets the vehicle type, parking lot, parking area, channel entrance/exit,
and device, manages the blacklist and whitelist, and sets parking lot parameters.

 Guard Booth Settings: Configures the guard booth and channel, manual processing method and
manual release reason.

 Charge: Sets the fixed vehicle fee standard, temporary vehicle fee standard, and overtime charge
standard, vendor discount strategy, guard booth on duty, and reconciliation.

 Report: Performs macro analysis and monitoring on the charge details, handover records,
vehicles in the parking lot, daily reports and monthly reports.

 Real-Time Monitoring: Implements most terminal functions, including video surveillance,


entrance and exit snapping, duty information display, central payment station, manual release,
remaining available parking spaces, blacklist and whitelist, charge details, and vehicles in the
parking lot.

9.1 Operation Wizard


The Operation Wizard page guides users through basic configuration of the system based on the
operation procedure. The online monitoring function can be used after all basic configurations are
completed.

ZKBioSecurity 3.1.5.0 or above P a g e | 274


Choose [Parking Lot] > [Operation Wizard] > [Operation Wizard]. The Operation Wizard page is
displayed.

Click a prompt point on the page to go to the corresponding function page for settings.

Correspondingly, there is a button on each page. You can click this button to go
back to the Operation Wizard page and perform the next step, as shown in the following figure.

9.2 Authorization Management


The Authorization Management module is used to license plate registration, authorize fixed and
temporary vehicles, and extend the valid time of fixed vehicles.

9.2.1 License Plate Registration

Choose [Authorization Management] > [License Plate Registration]. The License Plate Registration
page is displayed as in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 275


 New

(1) Click [Authorization Management] > [License Plate Registration] > [New]. The New page is
displayed.

(2) Select Person and Card number, enter License Plate Number.

(3) Click [Save and New] to register more license plate or click [OK] to save and exit.
 Edit

Click [Edit] at the end of each line or click the corresponding Personnel ID and modify personnel
license plate registration information in the Edit dialog box.

ZKBioSecurity 3.1.5.0 or above P a g e | 276


 Delete

Select one or more license plate registration information and click [Delete] at the upper part of the
list and click [OK] to delete the selected registration information. Click [Cancel] to cancel the
operation, or click [Delete] in the Operation column to delete a single registration information.

9.2.2 Vehicle Management

Choose [Authorization Management] > [Vehicle Management]. The Vehicle Management page is
displayed, as shown in the following figure.

 Fixed Vehicle Authorization

Click [Fixed Vehicle Authorization]. The Fixed Vehicle Authorization page is displayed as in the
following figure.

Once you click on Fixed Vehicle Authorization, you will get below prompt at the initial startup:

ZKBioSecurity 3.1.5.0 or above P a g e | 277


You need to select the Parking Lot Mode from the above two choices. One parking lot with more
car means one Parking lot for more than one license plate. And One parking space with one car
means one parking lot for only one license plate.

The fields are described as follows:

Person: Enter one or more characters contained in the name or number of the vehicle owner to
query the owner in fuzzy mode.

License Plate Number: Select the license plate number to be authorized.

Entrance and Exit area: Set the entrance and exit area of the license plate.

Vehicle Type: Select the type of the vehicle.

Start Time: Select the time when the authorization on the license plate number starts to take effect.
The default value is the current time.

End Time: Select the time when the authorization on the license plate number ends.

Fee: Record the fee charged for this authorization.

Note: An owner can have multiple license plate numbers, all of which must be authorized. You
can register a person and one or more license plates in the Personnel Management module.

You can select a person and license plate in Vehicle Management only after the person and license

ZKBioSecurity 3.1.5.0 or above P a g e | 278


plate are registered. The procedure for registering a person and license plate is described as follows.

 Person Registration and License Plate Registration

Choose [Personnel] > [Person]. The Personnel Management page is displayed as in the following
figure.

 New: Click [New]. The below page is displayed.

Set Personnel ID, Name (optional) and Department (use the default value). For details, see
Personnel Management.

ZKBioSecurity 3.1.5.0 or above P a g e | 279


Enter necessary information about the license plate on the Plate Register tab page. To add more
license plates, click at the end of the line (a maximum of 6 plates can be added). To delete a
license plate, click at the end of the line.

 Edit: Click [Edit] at the end of each line or click the corresponding Personnel ID or First Name,
and modify personnel information in the Edit dialog box.

 Delete: Select one or more records to be deleted and click [Delete] to delete personnel
information in batches.

 Fixed vehicle batch authorization

On the Vehicle Management page, click [Fixed vehicle batch authorization]. The Fixed vehicle batch
authorization page is displayed as in the following figure.

Select one or more license plates to be authorized from the list on the left. Click in the middle
to add the license plate to the list on the right. Enter the vehicle type, entrance and exit area, fee,
start time and end time in the Authorization area, and click [OK] to save the information and
authorize fixed vehicles in batches.

 Temporary Vehicle Authorization

On the Vehicle Management page, click [Temporary Vehicle Authorization]. The Temporary Vehicle
Authorization page is displayed, as shown in the following figure. Only the entrance and exit areas to
be authorized need to be selected.

ZKBioSecurity 3.1.5.0 or above P a g e | 280


 Cancellation

Select multiple check boxes in the first column of the license plate list and click [The Cancellation] to
cancel license plates in batches or click [The Cancellation] at the end of each line to cancel a single
license plate, as in the following figure.

9.2.3 Vehicle Valid Time Extension

Choose [Authorization Management] > [Vehicle Valid Time Extension]. The Vehicle Valid Time
Extension page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 281


 Vehicle Valid Time Extension

1) Select a fixed license plate for which the valid time needs to be extended and click [Vehicle Valid
Time Extension] or click [Vehicle Valid Time Extension] at the end of a fixed license plate. The
Vehicle Valid Time Extension page is displayed.

2) Set Extended Deadline and Fee.

3) Click [OK] to save and exit.

 Cancellation

Select multiple check boxes in the first column of the license plate list and click [Cancellation] to
cancel license plates in batches or click [Cancellation] at the end of each line to cancel a single
license plate.

ZKBioSecurity 3.1.5.0 or above P a g e | 282


9.3 Parking Lot Management
Parking Lot Management comprises seven modules: Vehicle Type, Parking Lot, Parking Area, Channel
Entrance and Exit Area, Device Management, White-Black list, and Parameter Setting.

9.3.1 Vehicle Type

Upon initial startup, the system automatically initializes the vehicle type, which can be only modified,
but not added or deleted. Choose [Parking Lot Management] > [Vehicle Type]. The Vehicle Type
page is displayed, as in the following figure.

 Editing the Vehicle Type

1. Click a vehicle type name or [Edit] in the operation column. The Edit page is displayed.

2. Set Vehicle Type, select a Status, and enter the vehicle type description in Remark.

3. Click [OK] to save and exit.

ZKBioSecurity 3.1.5.0 or above P a g e | 283


9.3.2 Parking Lot

A parking lot has multiple parking areas and a parking area has multiple entrance and exit areas.
Choose [Parking Lot Management] > [Parking Lot]. The Parking Lot page is displayed, as in the
following figure.

 New

1) Choose [Parking Lot Management] > [Parking Lot] > [New].

2) Set Name (unique) and Remark.

3) Click [Save and New] to add more parking lots or click [OK] to save and exit.

ZKBioSecurity 3.1.5.0 or above P a g e | 284


 Edit

Click a parking lot name or [Edit] in the Operation column to go to the Edit page. Make modifications
and click [OK] to save modifications.

 Delete

Select one or more parking lots and click [Delete] at the upper part of the list and click [OK] to delete
the selected parking lots. Click [Cancel] to cancel the operation or click [Delete] in the Operation
column to delete a single parking lot.

 Refresh

Click [Refresh] at the upper part of the list to load new parking lots.

9.3.3 Parking Area

Choose [Parking Lot Management] > [Parking Area]. The Parking Area page is displayed, as shown in
the following figure.

 New

Click [New]. The below page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 285


The fields are described as follows:

Area type of car yard: It is the car variety area, Either small or Large.

Parking area name: Unique name of a parking area.

Belonging Parking Lot: Parking lot to which this parking area belongs.

Parking Spaces: Total number of parking spaces in this area.

Remark: Text description.

 Edit

Click a parking area name or [Edit] in the Operation column to go to the Edit page. Make
modifications and click [OK] to save modifications.

 Delete

Select one or more parking areas and click [Delete] at the upper part of the list and click [OK] to
delete the selected parking areas. Click [Cancel] to cancel the operation or click [Delete] in the
Operation column to delete a single parking area.

 Refresh

Click [Refresh] at the upper part of the list to load new parking areas.

9.3.4 Entrance and Exit Area

Choose [Parking Lot Management] > [Entrance and Exit Area]. The Entrance and Exit Area page is
displayed, as shown in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 286


 New

Click [New]. The Edit page is displayed.

The fields are described as follows:

Area Name: Unique name of an entrance and exit area.

Parking Area: Parking area to which this entrance and exit area belongs.

 Edit

Click an entrance and exit area name or [Edit] in the Operation column to go to the Edit page. Make
modifications and click [OK] to save modifications.

ZKBioSecurity 3.1.5.0 or above P a g e | 287


 Delete

Select one or more entrance and exit areas and click [Delete] at the upper part of the list and click
[OK] to delete the selected entrance and exit areas. Click [Cancel] to cancel the operation, or click
[Delete] in the Operation column to delete a single entrance and exit area.

 Refresh

Click [Refresh] at the upper part of the list to load new entrance and exit areas.

9.3.5 Device Management

Choose [Parking Lot Management] > [Device]. The Device Management page is displayed, as shown
in the following figure.

 New

Click [New]. The below page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 288


The fields are described as follows:

Device Name: Unique name which can identify a device.

Device Type: It has only one option as LPR Camera.

Device Brand: Manufacturer of the device.

IP Address: Unique IP address for connecting the device.

Port: Port number for connecting the device.

LED Screen Type: Here you can set the display LED type. It has two options; Two-color LED Screen
and Monochrome LED Screen, choose accordingly.

 Edit

Click a device name or [Edit] in the Operation column to go to the Edit page. Make modifications
and click [OK] to save modifications.

 Delete

Select one or more devices and click [Delete] at the upper part of the list and click [OK] to delete the
selected devices. Click [Cancel] to cancel the operation or click [Delete] in the Operation column to
delete a single device.

 Refresh

Click [Refresh] at the upper part of the list to load new devices.

 Search Device

All devices to which a guard booth can connect are searched out and displayed in the list.

Click . The Search Device page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 289


Click [Search]. All available devices are displayed in the list. Click [Add] in the Operation column. The
Add page is displayed with all information automatically entered, as shown in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 290


 Enable

Enable the device. Only enabled devices can be normally used.

Select the device to be enabled and click [Enable].

 Disable

Disabled devices cannot be normally used.

Select the device to be disabled and click [Disable].

 Synchronize Device Time

Synchronize the internal time of the device with the current system time.

Select the device on which the time needs to be synchronized and click [Synchronize Device Time].

ZKBioSecurity 3.1.5.0 or above P a g e | 291


9.3.6 Device Management(When Access Controller is used for Parking)

Choose [Parking Lot Management] > [Device]. The Device Management page is displayed, as shown
in the following figure.

 New

Click [New]. The below page is displayed.

The fields are described as follows:

Device Name: It identifies a device.

Device Type: The value can be Access Controller.

IP Address: Unique IP address for connecting the device.

Door Name: Click to select the door list of the access control module. The door corresponding to the

ZKBioSecurity 3.1.5.0 or above P a g e | 292


device supporting Multiple Cards per Person may be selected (firmware version above 3.0.3.0).

Port: Port number for connecting the device.

Remark: Remark of the device.

 Edit

Click a device name or [Edit] in the Operation column to go to the Edit page. Make modifications
and click [OK] to save modifications.

 Delete

Select one or more devices and click [Delete] at the upper part of the list and click [OK] to delete the
selected devices. Click [Cancel] to cancel the operation, or click [Delete] in the Operation column to
delete a single device.

 Refresh

Click [Refresh] at the upper part of the list to load new devices.

 Get Device Option

Select the device for which you want to get information, click to send command and get the device
related parameters, such as: serial number, IP address, device model, firmware version number, etc.

9.3.7 White-Black List

Vehicles in the whitelist include fire engines, police cars, and some privileged vehicles, which are not
charged. Vehicles in the blacklist refer to those who are not allowed to enter or exit from the parking
lot.

Choose [Parking Lot Management] > [White-Black List]. The White-Black List page is displayed, as
shown in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 293


 New

Click [New]. The New page is displayed.

The fields are described as follows:

License Plate Number: License plate numbers to be added to the blacklist or whitelist.

License Plate type: The value can be Blacklist or Whitelist.

Start Time: Time when the whitelist takes effect (This parameter is not available for the blacklist).

End Time: Time when the whitelist expires (This parameter is not available for the blacklist).

ZKBioSecurity 3.1.5.0 or above P a g e | 294


 Edit

Click a license plate number or [Edit] in the Operation column to go to the Edit page. Make
modifications and click [OK] to save modifications.

 Delete

Select one or more license plate numbers and click [Delete] at the upper part of the list and click [OK]
to delete the selected license plate numbers. Click [Cancel] to cancel the operation or click [Delete]
in the Operation column to delete a single license plate number.

 Refresh

Click [Refresh] at the upper part of the list to load the latest blacklist and whitelist.

 Synchronize Blacklist

Click [Synchronize Blacklist], click [OK] to synchronize all blacklists, click [Cancel] to cancel.
When the device is off-line, the device will automatically synchronize blacklist and broadcast voice. It
should be noted that the device must be equipped with an SD card.

 Synchronize Whitelist

Click [Synchronize Whitelist], click [OK] to synchronize all whitelists, click [Cancel] to cancel.
When the device is off-line, the device will identify the whitelist synchronized and automatically
open the gate. It should be noted that the device must be equipped with an SD card

9.3.8 Parameter Setting

Set basic public parameters of the parking lot.

Choose [Parking Lot Management] > [Parameter Setting]. The Parameter Setting is displayed, as in
the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 295


The fields are described as follows:

 Parking lot setting

Company Name: Company name displayed on the printed fee receipt.

Parking Lot Mode: Click here for details.

 Channel Entrance and Exit Setting

Enable Fixed Vehicles Multiple In and Out: If this parameter is selected, no fee is charged when
fixed vehicles go in or out of the parking lot.

Enable Temporary Vehicles Multiple In and Out: If this parameter is selected, no fee is charged
when temporary vehicles go in or out of the parking lot.

Enable Shift process: Whether to enable the shift change of guard booths.

The default license plate: Default province of the license plate in scenarios where license plate
numbers need to be entered, for example, upon manual correction or manual release, or at the
central payment station.

ZKBioSecurity 3.1.5.0 or above P a g e | 296


Matching precision of Entrance and exit: Matching rule for license plate number searching. An
extract match: A license plate number can be found only upon exact match; 4-digit: A license plate
number can be found when the entered license plate number has the same four digits as that in the
database; 5-digit: A license plate number can be found when the entered license plate number has
the same five digits as that in the database. And so on for 6 and 7 digits.

Whether allows temporary vehicles to enter while the parking space is full: If selected, it will allow
the temporary vehicle to enter the parking lot when the parking space is full.

 Charge Management Settings

Enable Fixed Vehicle Charges: If a fixed vehicle charge standard has been defined in charge settings
and this parameter is selected, the standard is charged upon extension. Otherwise, the extension
time and amount must be manually entered on the Fixed Vehicle Valid Time Extension page.

Print Fee Receipts: Whether to print fee receipts when charging. If yes, the system must be
connected to the receipt printer.

Enable the Consumer Discount: Whether to enable the consumer discount function. The detailed
consumer discount strategy is set in 9.5.5 Discount Strategy.

Unmatched Processing Mode: It can be either Free or Charged. If a vehicle was not registered at the
time of entrance, then this function gets effective at the time of exit of the vehicle. If you want to
charge, then select “Release After Charging” and set the amount. If you don’t want to charge, then
select “Free”.

 Fixed vehicles setting

Enable Fixed Vehicle Transfer to Temporary Vehicle: If this parameter is selected, fixed vehicles are
automatically changed to temporary vehicles for charging. Otherwise, after the valid time of fixed
vehicles expires, manual processing is required.

Fixed Vehicles Days Warning: A valid time extension prompt is sent to a fixed vehicle owner upon
entrance and exit within the preset warning days. For example, if this parameter is set to 5 and there
are 31 days in the current month, the prompt is sent from the 27th day.

 Voice and Display Setting

Entrance Display residual parking space: If selected, it will display with voice prompt, the number
of available spaces for parking at the entrance on the LED screen.

Regional parking space statistics for large car field: It will show the statistics for large car parking
space.

Display color: You can set the color of display. If you have installed dual color LED screen, then you
can set color for the second line of display also.

 Other Setting

Days to keep the vehicles record in the field: You can set the required number of days to keep the
vehicle records in database.

ZKBioSecurity 3.1.5.0 or above P a g e | 297


Capture photos preservation days: Photos taken by the IPC device are automatically deleted after
the number of days specified by this parameter expires.

Captured Photos Saving Path: Path for saving photos captured during license plate identification
(Here, only a basic path is configured. The actual saving path also includes
\BioSecurityFile\park\YYYY-MM-DD\).

 Offline Setting

Enabled offline mode part of the function temporarily does not support!

9.4 Guard Booth Setting


Guard Booth Setting includes four modules: Guard Booth, Channel, Manual Processing Method, and
Manual Release Reason.

9.4.1 Guard Booth Setting

Choose [Guard Booth Setting] > [Guard Booth]. The Guard Booth page is displayed, as shown in the
following figure.

 New

Click [New]. The New page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 298


The fields are described as follows:

Guard Booth Name: Name of a guard booth.

Channel Entrance and Exit Name: Entrance and exit area to which the guard booth belongs.

Computer IP Address: IP address of the guard booth (It must be unique. The local IP address is read
and set as the initial value when a new guard booth is added).

Belonging Parking Lot: Parking lot to which the selected entrance and exit area belongs. This
parameter is set as “read only”.

Parking Area: Parking area to which the selected entrance and exit area belongs. This parameter is
set as read only.

Temporary Vehicle Free: If it is set to Yes, the Free button is displayed on the temporary vehicle
charging result page to allow free of charge for temporary vehicles.

Enable replacement of vehicle: The type of temporary vehicles can be changed on the temporary
vehicle charging result page. Since different types of vehicles have different charge standard, the
charging result may also change.

Enable Manual Release: If this parameter is selected, the gate can be manually controlled to release
vehicles.

Temporary vehicle fast exit: If no fee is generated for a temporary vehicle, no charging result
confirmation page is displayed and the gate is directly open to release the temporary vehicle.

One channel mode: It this mode is enabled; a channel can be physically used as the entrance and
exit at the same time. However, it is suggested to use different channels for binding different IPC
devices.

The above Settings are copied to: The following two options are available.

ZKBioSecurity 3.1.5.0 or above P a g e | 299


All Guard Booths in the Belonging Parking Area: Information in Parameter Setting is copied to all
guard booths in the belonging parking area.

All Guard Booths in the Belonging Parking Lot: Information in Parameter Setting is copied to all
guard booths in the belonging parking lot.

Parameters in the red box are copied, as shown in the following figure.

 Edit

Click a guard booth name or [Edit] in the Operation column to go to the Edit page. Make
modifications and click [OK] to save modifications.

 Delete

Select one or more guard booths and click [Delete] at the upper part of the list and click [OK] to
delete the selected guard booths. Click [Cancel] to cancel the operation, or click [Delete] in the
Operation column to delete a single guard booth.

 Refresh

Click [Refresh] at the upper part of the list to load new guard booths.

9.4.2 Channel Setting

Choose [Guard Booth Setting] > [Channel]. The Channel page is displayed as in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 300


 New

Click [New]. The New page is displayed.

The fields are described as follows:

Channel Name: Unique channel name.

Guard Booth Name: Guard booth to which the channel belongs.

Channel State: Channel type.

IPC1 IP: IP address of IPC1 (which can be in “read only” mode after device information has been
added in 9.3.5 Device Management and bound devices are not displayed).

ZKBioSecurity 3.1.5.0 or above P a g e | 301


Video Preview Window (IPC1): Display location of IPC1 on the monitoring page.

IPC2 IP: IP address of IPC2 (which can be in “read only” mode after device information has been
added in 9.3.5 Device Management and bound devices are not displayed).

Video Preview Window (IPC2): Display location of IPC2 on the monitoring page.

Fixed Vehicle Open type: If it is set to Direct pass, no confirmation window is displayed. If it is set to
Confirm pass, a confirmation window is displayed and the gate is opened upon manual click.

Temporary Vehicle Open type: Same as the above.

Limit Line Mode Forbids Vehicle Type: You can set the types of vehicles forbidden to pass. The
vehicles type contains all the vehicles types that are maintained in the system, it allows multiple
choices.

 Edit

Click a channel name or [Edit] in the Operation column to go to the Edit page. Modify and click [OK]
to save modifications.

 Delete

Select one or more channels and click [Delete] at the upper part of the list and click [OK] to delete
the selected channels. Click [Cancel] to cancel the operation, or click [Delete] in the Operation
column to delete a single channel.

 Refresh

Click [Refresh] at the upper part of the list to load new channels.

9.4.3 Channel Setting (When Access Controller is used for Parking)

Choose [Guard Booth Setting] > [Channel]. The Channel page is displayed, as shown in the following
figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 302


 New

Click [New]. The New page is displayed.

The fields are described as follows:

Channel Name: Unique channel name.

Door Name: Select the device added in Device Management (the door name access control module
corresponds to).

Channel State: Channel type.

Guard Booth Name: Guard booth to which the channel belongs.

ZKBioSecurity 3.1.5.0 or above P a g e | 303


Video 1: Select Video Channel added by the video module.

Video Preview Window (Video 1): Display location of Video Channel on the monitoring page.

Video 2: Select Video Channel added by the video module.

Video Preview Window (Video 2): Display location of Video Channel on the monitoring page.

Fixed Vehicle Open Type: If it is set to Direct pass, no confirmation window is displayed. If it is set to
Confirm pass, a confirmation window is displayed and the gate is opened upon manual click.

Temporary Vehicle Open Type: The same as above.

Limit Line Mode Forbids Vehicle Type: You can set the types of vehicles prohibited from passing.
The vehicles type contains all the vehicles types that are maintained in the system, it allows multiple
choices.

 Edit

Click a channel name or [Edit] in the Operation column to go to the Edit page. Make modifications
and click [OK] to save modifications.

 Delete

Select one or more channels and click [Delete] at the upper part of the list and click [OK] to delete
the selected channels. Click [Cancel] to cancel the operation, or click [Delete] in the Operation
column to delete a single channel.

 Refresh

Click [Refresh] at the upper part of the list to load new channels.

9.4.4 Manual Release Button

A manual release reason must be selected when the manual release function is used on the online
monitoring page.

Choose [Guard Booth Setting] > [Manual Release Reason]. The Manual Release Reason page is
displayed as in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 304


 New

Click [New]. The New page is displayed.

The fields are described as follows:

Manual Release Reason: Name of the manual release reason.

Remark: Remark of the manual release reason.

 Edit

Click a name or [Edit] in the Operation column to go to the Edit page. Make modifications and click
[OK] to save modifications.

 Delete

Select one or more manual release reasons and click [Delete] at the upper part of the list and click
[OK] to delete the selected manual release reasons. Click [Cancel] to cancel the operation, or click
[Delete] in the Operation column to delete a manual release reason.

ZKBioSecurity 3.1.5.0 or above P a g e | 305


 Refresh

Click [Refresh] at the upper part of the list to load new manual release reasons.

9.5 Charge
It is mainly used to set charging rules of each vehicle type and vendor discount policies in the
parking lot. Charge Setting includes seven modules: Temporary Vehicle Charge, Overtime Charge
Standard, Fixed Vehicle Charge Standard, Guard Booth on Duty, Discount Strategy, Business, and
Reconciliation.

9.5.1 Temporary Vehicle Charge

Choose [Charge] > [Temporary Vehicle Charge]. The Temporary Vehicle Charge page is displayed,
as shown in the following figure.

 New

Click [New]. The New page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 306


Note: Only one charge standard can be created for each vehicle type in the same parking lot. If no
temporary vehicle charge standard is created for a parking lot, the first charge standard can be
created only for temporary vehicle A. This is because the charge standard for temporary vehicle A
is used for exit of temporary vehicles by default.

The fields are described as follows:

Temporary charge name: It must be unique.

Parking Lot Name: Parking lot of the charging standard.

Vehicle Type: Vehicle type of the charging standard.

Daily Highest Amount: Highest daily charging amount (For example, if 10 dollars is charged for an
hour, 240 dollars is charged for an entire day in normal cases. If this parameter is set to 100 dollars,
only 100 dollars is charged for an entire day).

Free Minutes: No fee is charged when the parking period is within the range specified by this
parameter.

Charging Time includes Free Minutes: If this parameter is selected, Free Minutes is set to 30, and
the actual parking period is 31 minutes, fees are charged based on 31 minutes. If this parameter is
not selected, Free Minutes is set to 30, and the actual parking period is 31 minutes, fees are charged
based on 1 (31-30) minute.

Cross Time Split: Suppose that one dollar is charged every 15 minutes during time period 1 from
9:00 to 10:00 and 10 dollars is charged every 15 minutes during time period 2 from 10:00 to 11:00.
The parking duration is from 9:43 to 10:30. If this parameter is not selected, the period from 9:43 to
9:58 is charged 1 dollar, the period from 9:58 to 10:00 has only 2 minutes, which is shorter than 15

ZKBioSecurity 3.1.5.0 or above P a g e | 307


minutes and must be supplemented by the period from 10:00 to 10:13, and the period from 10:13 to
10:28 is charged based on period 2, and so on. If this parameter is selected, the period from 9:43 to
9:58 is charged 1 dollar, the period from 9:58 to 10:00 has only 2 minutes, which is shorter than 15
minutes but is still charged 1 dollars based on time period 1, and the period from 10:00 to 10:15 is
charged based on period 2, and so on.

Enable the same license plate in Circulation within 24 hours (natural day) Multiple access with
the highest fees: Rolling fee. If the accumulated fees for multiple entrance and exits of the same
license plate exceed this value, no extra fee is charged in the preset cycle. The cycle can be 24 hours
for a natural day or 24 hours for a circulated day: 24 hours for a natural day refer to 00:00 -24:00 and
24 hours for a circulated day are from the entrance time to this time on the next day.

According to time period. The page is displayed in the following figure.

Set different charging standards for different time periods. The time periods must be continuous and
the sum must be 24 hours.

Charge by times: If this parameter is selected, Amount per unit time charge cannot be set and fees
are charged based on the amount set in Maximum charge. If this parameter is not selected, fees are
charged based on the unit time and the period must be multiples of 15. If the fee is higher than the
amount set in Maximum charge, the maximum amount is charged.

According to cycle. The page is displayed in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 308


The next 1440 minutes (24 hours) from the entrance time can be divided based on different charge
standards.

Test Charging Rule: It is used to test the set temporary car charging rules. You can enter the name of
the parking lot, vehicle type, entrance time and exit time in this section, click [Click Test] to view the
results of the charges

Notes:

 When Charge by times is not selected, the time of each cycle must be set to multiples of the
time period specified in Amount per unit time charge. There is no limitation if Charge by
times is selected.

 If According to cycle is selected, Cross Time Split is invalid.

 If Charge by times is selected, Amount per unit time charge cannot be set and fees are
charged based on the amount set in Maximum charge. If this parameter is not selected,
fees are charged based on the unit time and the period must be multiples of 15. If the fee is
higher than the amount set in Maximum charge, the maximum amount is charged.

 Edit

Click a temporary charge name or [Edit] in the Operation column to go to the Edit page. Modify and
click [OK] to save modifications.

 Delete

Select one or more temporary vehicle charge and click [Delete] at the upper part of the list and click
[OK] to delete the selected temporary vehicle charge. Click [Cancel] to cancel the operation or click
[Delete] in the Operation column to delete a single temporary vehicle charge.

ZKBioSecurity 3.1.5.0 or above P a g e | 309


 Refresh

Click [Refresh] at the upper part of the list to load new temporary vehicle charge.

9.5.2 Overtime Charge

Choose [Charge Setting] > [Overtime Charge Standard]. The Overtime Charge Standard page is
displayed as in the following figure.

 New

Click [New]. The New page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 310


Note: The name of the overtime charge standard must be unique. Parking lots for which overtime
charge standards have been configured are not displayed in the Name drop-down list.

The fields are described as follows:

Overtime charge name: Unique name of the overtime charge standard.

Parking Lot Name: Parking lot of the charge standard. Only one standard can be set for a parking lot.

Status: It can enable or disable this charge standard.

Detail: Allowable retention time and overtime charge amount of each temporary vehicle type after
payment at the central payment station.

Allowable Retention Time: Retention period in the parking lot after payment at the central payment
station. If the time in the parking lot exceeds the retention time, fees are charged again.

Include Retention Time: Suppose that the allowable retention time is 30 minutes, and the vehicle
stays in the parking lot for 31 minutes. If this parameter is selected, fees will be charged for 31
minutes. If this parameter is not selected, frees will be charged for 1 minute.

Overtime Charge Amount: Charge standard when the allowable retention time is exceeded.

 Edit

Click a name or [Edit] in the Operation column to go to the Edit page. Modify and click [OK] to save
modifications.

 Delete

Select one or more temporary vehicle charge and click [Delete] at the upper part of the list and click
[OK] to delete the selected temporary vehicle charge. Click [Cancel] to cancel the operation, or click
[Delete] in the Operation column to delete a single temporary vehicle charge.

ZKBioSecurity 3.1.5.0 or above P a g e | 311


 Refresh

Click [Refresh] at the upper part of the list to load new temporary vehicle charge.

9.5.3 Fixed Vehicle Charge

Choose [Charge Setting] > [Fixed Vehicle Charge]. The Fixed Vehicle Charge page is displayed as in
the following figure.

 New

Click [New]. The New page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 312


Note: The fixed charge name must be unique. Fixed vehicle types whose charge standards have
been set cannot be set again. The standard is applicable to all parking lots.

The fields are described as follows:

Fixed charge name: Unique name of a fixed vehicle charge.

Vehicle Type: Vehicle type of the fixed vehicle charge. Only one fixed vehicle charge can be set for
each vehicle type.

Cycle Type: Month/Daily.

Cycle: Valid time of fixed vehicles.

Amount: Paid amount.

 Edit

Click a fixed charge name or [Edit] in the Operation column to go to the Edit page. Modify and click
[OK] to save modifications.

 Delete

Select one or more temporary vehicle charge and click [Delete] at the upper part of the list and click
[OK] to delete the selected temporary vehicle charge. Click [Cancel] to cancel the operation or click
[Delete] in the Operation column to delete a single fixed vehicle charge.

 Refresh

Click [Refresh] at the upper part of the list to load new temporary vehicle charge.

9.5.4 Shift Setting

Choose [Charge Setting] > [Shift Setting]. The Shift Setting page is displayed as in the following
figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 313


 New

Click [New]. The New page is displayed.

The fields are described as follows:


Shift Name: Unique name of a shift.
The Guard Booth on duty: Guard booth of the shift.
Start Time: Start time of the shift.
End Time: End time of the shift.
Cross Day: Whether the shift spans two days.

ZKBioSecurity 3.1.5.0 or above P a g e | 314


 Edit

Click a name or [Edit] in the Operation column to go to the Edit page. Make modifications and click
[OK] to save modifications.

 Delete

Select one or more shifts and click [Delete] at the upper part of the list and click [OK] to delete the
selected shifts. Click [Cancel] to cancel the operation, or click [Delete] in the Operation column to
delete a single shift.

 Refresh

Click [Refresh] at the upper part of the list to load new shifts.

9.5.5 Discount Strategy

Choose [Charge Setting] > [Discount Strategy]. The Discount Strategy page is displayed, as shown in
the following figure.

 New

Click [New]. The New page is displayed.

ZKBioSecurity 3.1.5.0 or above P a g e | 315


The fields are described as follows:

Name: Unique name of the discount strategy.

Discount Type: a. Free (no charge); b. Deduction Amount (deducting a fixed amount from the fee); c.
Deduction Minute (deducting minutes from the parking period and then make the charge); d.
Deduction Percentage (deducting fees at a specified percentage).

Deduction Amount: When Discount Type is Free, this parameter does not need to be entered.
When Discount Type is set to other values, enter the corresponding unit.

 Edit

Click a name or [Edit] in the Operation column to go to the Edit page. Make modifications and click
[OK] to save modifications.

 Delete

Select one or more discount policies and click [Delete] at the upper part of the list and click [OK] to
delete the selected discount policies. Click [Cancel] to cancel the operation, or click [Delete] in the
Operation column to delete a single discount strategy.

 Refresh

Click [Refresh] at the upper part of the list to load new discount policies.

9.5.6 Business

Choose [Charge Setting] > [Business]. The Business page is displayed as in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 316


 New

Click [New]. The New page is displayed.

The fields are described as follows:

Business Name: Unique vendor name.

Discount Way: Select a discount strategy set in 9.5.5 Discount Strategy.

Contact: Vendor contact.

ZKBioSecurity 3.1.5.0 or above P a g e | 317


Business Phone: Vendor phone number.

Business Address: Vendor address.

 Edit

Click a name or [Edit] in the Operation column to go to the Edit page. Modify and click [OK] to save
modifications.

 Delete

Select one or more vendors and click [Delete] at the upper part of the list and click [OK] to delete the
selected vendors. Click [Cancel] to cancel the operation, or click [Delete] in the Operation column to
delete a single vendor.

 Refresh

Click [Refresh] at the upper part of the list to load new vendors.

9.5.7 Financial Reconciliation

Choose [Charge Setting] > [Financial Reconciliation]. Set parameters such as Duty Officer Name and
Duty Office ID and click to query reconciliation data as shown in the following figure.

 Reconciliation

Click [Reconciliation] in the Operation column. The Reconciliation page is displayed as shown in the
following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 318


The fields are described as follows:

Duty Officer Name: Duty officer name.

Duty Officer ID: Duty officer ID.

Duty start time: Duty start time.

Duty end time: Duty end time.

The number of free release vehicle: Number of vehicles released free of charge.

The number of manual release: Number of vehicles released manually.

Confirmor: Reconciliation personnel.

Advance amount: Amount prepaid to the guard booth (for changes).

Turnover: Paid amount.

The total amount: Advance amount + Turnover

The actual amount: Amount entered by the duty officer during the shift change.

Confirm Time: Current time.

Confirm Amount: Amount confirmed by the reconciliation personnel.

Remark: Remark to be added.

9.6 Report
Report comprises five modules: Charge Details, Handover Record, Vehicles in the Parking Lot, Daily
Report and Monthly Report. You can analyze and collect statistics on the parking lot data to gain a
macro control on the parking lot.

ZKBioSecurity 3.1.5.0 or above P a g e | 319


9.6.1 License Plate Report

It will provide all the details for the vehicle whose license plate has been registered in the system.
You can export the details as required.

Choose [Report] > [License Plate Report]. Select the desired time period and operation type and click
to search. Click [More] to search based on other conditions.

9.6.2 Charge Details

The Charge Details module provides reports of charging information of all exit vehicles (records with
fee of 0 are also generated for fixed vehicles and charging-free temporary vehicles).

Choose [Report] > [Charge Details]. Select the desired time period and operator name, and click
to query charging details. Click [More] to query based on other conditions. The page is shown in the
following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 320


9.6.3 Handover Record

The Handover Record provides reports of handover records.

Choose [Report] > [Handover Record]. Select the desired time period and operator name, and click
to query handover records. Click [More] to query based on other conditions. The page is shown
in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 321


9.6.4 Vehicles in the Parking Lot

The Vehicles in the Parking Lot module provides statistics of all vehicles in the parking lot.

Choose [Report] > [Vehicles in the Parking Lot]. Select the desired time period and license plate
number and click to query vehicles in the parking lot. The page is shown in the following figure.

9.6.5 Entry Records

It will provide the details of the vehicle which entered into the parking.

Click [Report] > [Entry Record]. Select the desired time period, vehicle owner and license plate
number, and click to query Entry records. Click [More] to query based on other conditions.

ZKBioSecurity 3.1.5.0 or above P a g e | 322


9.6.6 Exit Records

It will provide the details of the vehicle which exited out of the parking.

Click [Report]  [Exit Record]. Select the desired time period, vehicle owner and license plate
number, and click to query Exit records. Click [More] to query based on other conditions

9.6.7 Daily Reports

The Daily Report provides reports of the total amount of charges per day for each shift in each duty
guard booth.

Choose [Report] > [Daily Reports]. Select the desired time period and click to query the total
amount of charges for each shift in each duty guard booth. The page is shown in the following
figure.

9.6.8 Monthly Reports

The Monthly Report provides statistics of parking fees for each day of the month.

Choose [Report] > [Monthly Reports]. Select the desired time period and click to query the
parking fees. The page is shown in the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 323


9.7 Real-Time Monitoring
Real-Time Monitoring provides real-time monitoring data and comprises two modules: Guard Booth
and Monitoring Room.

9.7.1 Guard Booth

Please open this module in Internet Explorer, as the video preview is only supported in this browser.

Choose [Real-Time Monitoring] > [Guard Booth]. The Guard Booth page is displayed as in the
following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 324


You will get below message:

Prompt:

Unable to preview, processing methods are as follows:

1. Your computer does not install a video control, or the version of the video control is not the latest.
Please click download controls: Download ZK OCX

2. If you have already installed the browser correctly. Please check the user UAC level (adjusted to the
default or minimum).

3. After the operation, you should restart or refresh the browser

Click on Download ZK OCX. You will get below pop-up. Save the setup and then run it.

Complete the installation and then refresh the browser.

Click “Allow” to give permission for the video preview.

ZKBioSecurity 3.1.5.0 or above P a g e | 325


Note: To properly use this function, set the temporary vehicle charge and fixed vehicle charge in
advance. An overtime charge standard must be set for the central payment station. If the consumer
discount function is enabled, the vendor discount must be set. Otherwise, a prompt in the red box
will be displayed.

Click the link in the prompt to quickly locate the corresponding module and add necessary
information.

If the local host is not set as the guard booth, a prompt in the red box will be displayed:

ZKBioSecurity 3.1.5.0 or above P a g e | 326


If the local host is set as the guard booth but has not been bound to any channel or device, a
prompt in the red box will be displayed:

 Automatic License Plate Identification/Video Surveillance

Area 1 in the following figure shows the automatic license plate identification/video surveillance in
normal state:

ZKBioSecurity 3.1.5.0 or above P a g e | 327


When the entrance channel identifies the license plate of a vehicle going entering the parking lot,
the following box is displayed:

Click [Open] to allow the vehicle whether to enter the parking lot.

Note: When Direct pass is set for fixed vehicles (temporary vehicles) in 9.4.2 Channel Setting, the
vehicle can successfully enter the parking lot, and this box will not be displayed.

When the exit channel identifies the license plate of a vehicle going out of the parking lot and there
is a record about normal entrance of the vehicle, the following box is displayed:

ZKBioSecurity 3.1.5.0 or above P a g e | 328


Note: If consumer discount is not enabled in 9.3.8 Parameter Setting, consumer discount cannot
be enabled, as shown in the following figure:

The Free button is displayed only when Temporary Vehicle Free is set to Yes in 9.4.1 Guard Booth
Setting.

The vehicle type can be changed and fees are recalculated only when Enable replacement of
vehicle is set to Yes in 9.4.1 Guard Booth Setting.

Click [Open] to allow the vehicle to exit from the parking lot.

ZKBioSecurity 3.1.5.0 or above P a g e | 329


Click [Print the bills] to print receipts. The following dialog box is displayed:

Note: To use the printing function, select Printing fee receipts in 9.3.8 Parameter Setting. If the
printing plug-in is not installed, a prompt is displayed as follows:

If the license plate identified by the exit device does not match any entrance record, the Manual
Correction page is displayed as the following figure:

ZKBioSecurity 3.1.5.0 or above P a g e | 330


On this page, the license plate number entered in the first line is used as the standard and entrance
records of similar license plate numbers are searched in the database based on the entrance and exit

matching precision rules set in 9.3.8 Parameter Setting. Click and to go to the previous or
next record. Select the record to be corrected, enter the corrected license plate number, and click
[Manual correction] to correct the license plate number and allow the vehicle to exit the parking lot.
If no similar entrance record is found, click [Non-matching process]. The manual release method is
prompted and the amount for gate opening cannot be entered.

 Scrolled Display of Entrance and Exit Messages

When a vehicle enters or exits from the parking lot, the table at the lower part of the page displays
the license plate number, vehicle type, time, channel state and event type. Events such as manual
release, VIP vehicle entrance and exit, fixed vehicle transfer to temporary vehicle, and non-matching
process are displayed in red, as shown in the following figure.

 Current Duty

Duty information is displayed at the upper right of the page. The information includes the current
guard booth, current duty, duty start time, and charge time, as shown in the preceding figure.

 Central Payment Station

Enter the license plate number on the Central Payment Station tab page and click [Charge]. If no
entrance record of the license plate number is found, the Manual correction page is displayed as in
the following figure:

ZKBioSecurity 3.1.5.0 or above P a g e | 331


On this page, the license plate number entered in the first line is used as the standard and entrance
records of similar license plate numbers are searched in the database based on the entrance and exit

matching precision rules set in 9.3.8 Parameter Setting. Click and to go to the previous or
next record. Select the record to be corrected, enter the corrected license plate number, and click
[Manual correction] to correct the license plate number and allow the vehicle to exit the parking lot.

If a normal entrance record is matched, a charging result page is displayed and a charging success
message is displayed after you press [OK].

 Manual Release

The information is shown in the red box of the following figure:

ZKBioSecurity 3.1.5.0 or above P a g e | 332


Enter a license plate number, select the release channel and manual release reason (set in 9.4.4
Manual Release Reason), and click [OK]. For the entrance channel, directly open the gate to release
the vehicle. For the exit channel, there may be two situations: if an entrance record is matched, the
charging result page is displayed and the vehicle successfully exits from the parking lot; if no
matched entrance record is found, the Manual correction page is displayed for manual correction.
(The charging result page and manual correction page have been mentioned above and are not
described here.)

 Remaining Parking Spaces

The information is shown in the red box of the following figure:

ZKBioSecurity 3.1.5.0 or above P a g e | 333


This area displays the name of the parking area to which the guard booth belongs, and the
remaining parking spaces in the parking area. (Records are read from the database and the displayed
is updated every 5 seconds.)

 Change Duty

Click in the lower right corner. The following dialog box is displayed (note: this button is

valid only when Enable the shift process is selected in 9.3.8 Parameter Setting.)

Set Advance amount and The actual amount and click [OK]. The current shift ends and the next
shift starts. A login dialog box is displayed:

ZKBioSecurity 3.1.5.0 or above P a g e | 334


Enter the user name and password and click [Login] for successful shift change. Fingerprints can also
be used for login, as shown in the following figure:

 White-Black List Management

Click in the lower right corner. The black/white list management page is displayed (see 9.3.7

White-Black list).

ZKBioSecurity 3.1.5.0 or above P a g e | 335


 Vehicle Search

Click in the lower right corner. The Vehicle Search page is displayed (see 9.6.4 Vehicles in the

Parking Lot).

ZKBioSecurity 3.1.5.0 or above P a g e | 336


 Charge Detail

Click in the lower right corner. The Charge Detail page is displayed (see 9.6.2 Charge Detail).

9.7.2 Guard Booth (When Access Controller is used for Parking)

Choose [Real-Time Monitoring] > [Guard Booth]. The Guard Booth page is displayed, as shown in
the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 337


 Temporary Vehicles entry and exit Management

The function will appear when access controller is used for parking. It is similar to manual release.

Select the entry and exit credentials according to parking parameters settings: Card or Barcode
displays different interfaces. Need card reader and scan code gun.

9.7.3 Monitoring Room

In Monitoring Room, you can check video images and entrance and exit information of all guard
booths in all parking lots.

Choose [Real-Time Monitoring] > [Monitoring Room]. The Monitoring Room page is displayed as in
the following figure.

Choose [Parking Lot] > [Parking Area] > [Guard Booth] to see the video images of the selected guard
booth, the message list for scrolled display can receive entrance and exit events of all guard booths
in all parking lots, and the graphic statistics in the right displays traffic information.

ZKBioSecurity 3.1.5.0 or above P a g e | 338


10. Patrol System Patrol System
The patrol system can help enterprise management personnel to effectively supervise and manage
the patrol personnel, plans and routes. In addition, periodic statistics and analysis can be performed
on the patrol routes and results.

Note: Before patrol operations, you need to add patrol devices in the [Access] module and add
patrol personnel in the [Personnel] module.

10.1 Operation Wizard


After logging into the system, click [Patrol] to go to [Operation Wizard]. Click on the page as
prompted to go to different functional modules and perform operations. The page is displayed as
follows:

10.2 Route Monitoring


This function displays all the scheduled routes of the current day in the patrol plan. When the patrol
personnel patrols based on the plan, the corresponding checkpoints in the patrol route will turn
green. If the personnel do not patrol based on the plan, the checkpoints will turn red. The page is
displayed as follows:

ZKBioSecurity 3.1.5.0 or above P a g e | 339


 

Checkpoint status:

Normal Patrol: The patrol personnel finished the patrol in the normal time segment in normal
sequence.

Patrol Route Error: The patrol personnel finished the patrol in the normal time segment but did not
follow the route.

Leakage Patrol: The patrol personnel did not finish the patrol in the normal time segment, that is,
one or more checkpoints are not patrolled.

Not Patrol: The patrol personnel did not finish the patrol in the normal time segment, that is, the
entire patrol route is not patrolled.

10.3 Basic Management

10.3.1 Device

 Add

Select a device to be used as the patrol device from the access control devices. Click [Basic
Management] > [Device] > [New]. In the [Alternative] box, add available devices and click [OK] to
save the setting. The page is displayed as follows:

ZKBioSecurity 3.1.5.0 or above P a g e | 340


 

10.3.2 Checkpoint

 Add

(1) Click [Basic Management] > [Checkpoint] > [New]. The page is displayed as follows:

 
Patrol Tag: Currently, only access control readers are supported.

(2) After the setting (parameters with * are mandatory), click [OK] to save the setting. You can also

ZKBioSecurity 3.1.5.0 or above P a g e | 341


click [Save and New] to save the current setting and add another checkpoint. Click [Cancel] to
cancel the setting and return to the upper-level menu.

Note: Patrol tags that have been used by checkpoints cannot be used again when you add
another checkpoint.

10.3.3 Parameters

(1) Click [Patrol] > [Basic Management] > [Parameters].


(2) Set the interval for patrol statistics collection.
(3) Click [OK] to save the setting.

10.4 Patrol Management

10.4.1 Plan

 Add

Click [Patrol Management] > [Plan] > [New]. Plans by date, week and month are displayed as follows:

 
Time Segment: You can set the start and end time of the patrol. The time segment can be across
different days.

ZKBioSecurity 3.1.5.0 or above P a g e | 342


By Date: The patrol plan is scheduled by day. Select [By Date] and set the start and end date for the
patrol plan.

By Week: The patrol plan is scheduled by week.

By Month: The patrol plan is scheduled by month.

A patrol plan by month can be executed every day or periodically. If you choose to execute the
patrol plan every day, the patrol task is performed every day in the specified month. If you
choose to periodically execute the patrol plan, the patrol task is performed on the specified date
in the month.

Note: A maximum of three patrol shifts can be added for a patrol plan.

10.4.2 Patrol Group

A patrol group consists of multiple patrol personnel. Personnel in the patrol group work together to
finish the corresponding patrol task. Click [Patrol Management] > [Patrol Group].

 
 Add

1. Click [Patrol Management] > [Patrol Group] > [New] to go to the patrol group adding page as
follows:

ZKBioSecurity 3.1.5.0 or above P a g e | 343


 

2. Set the following parameters: Select a patrol group name (not repeatable), patrol mode and
remarks.

3. Click [Save and New] to add another patrol group and click [OK] to finish the setting.

4. Add/Delete personnel for a specified patrol group. (The following operations cannot be
performed if the patrol group is used by a patrol route).

(1) Click [Patrol Management] > [Patrol Group]. Click a patrol group from the list on the left.
Personnel in the patrol group are displayed in the list on the right.
(2) Click [Add Personnel] under Operation in the list on the left. The page for adding personnel is
displayed (or adding by department). Add personnel to the list on the right and click [OK] to
finish the setting.
(3) Select personnel in the list on the right and click [Delete] above the list to delete the
personnel from the patrol group.
Note: In [Patrol Mode], Any Person Verification means that the patrol task is finished as long as one
person in the patrol group swipes the card at the checkpoint in the plan, while All People Verification
means that the patrol task is finished only after all people in the patrol group swipe their cards at the
checkpoint in the plan. A patrol group cannot be edited or deleted when it is used by a patrol route.

10.4.3 Route

A patrol route consists of a series of checkpoints in a specified sequence.

 Add

Click [Patrol Management] > [Route] > [New]. The page is displayed as follows:

1. Set basic information for a route in the following box. The Limited Time parameter refers to the
time limit for finishing the entire route.

ZKBioSecurity 3.1.5.0 or above P a g e | 344


Description of the time segment legends: It is set according to the allowed error time during the
patrol. Suppose that the patrol plan is scheduled between 9:00 and 12:00 (which can be set in the
patrol plan), and the allowed error time is 5 minutes. This means records between 8:55 and 12:05 are
valid and those segments out of this time are invalid.

2. After the setting, click [Next] to go to the [Route Definition] dialog box. Routes can be classified
to Order routes and Disorder routes (two categories and five situations are available). The
and buttons are used to move the checkpoint up and down.

Order: During patrol plan execution, there is no time limit between checkpoints. Patrol personnel
can patrol checkpoints in a specified sequence according to their habits within the time limit.

ZKBioSecurity 3.1.5.0 or above P a g e | 345


 

Disorder: Disorder routes are divided into the following:

Total Disorder: All checkpoints in the patrol route are disordered. Patrol personnel can patrol
checkpoints according to their habits within the time limit.

Disorder Except the First Checkpoint: In the patrol route, all checkpoints except the first checkpoint
are disordered.

Disorder Except the Last Checkpoint: In the patrol route, all checkpoints except the last checkpoint
are disordered.

Disorder Except the First and Last Checkpoint: In the patrol route, all checkpoints except the first
and last checkpoints are disordered.

 
3. Click [OK] to save the setting.

ZKBioSecurity 3.1.5.0 or above P a g e | 346


Note:
Before patrol operations, you need to add patrol devices in the [Access] module and add patrol
personnel in the [Personnel] module. Note that if the patrol personnel are required to patrol
according to the card number but do not have the right for opening the door, you cannot select any
rights group in the access control setting when adding personnel or add a rights group that cannot
pass the door in any time segment, and then select the rights group in the access control setting
when adding personnel.

10.5 Reports
There are four modules: All transactions, Patrol Records Today, Patrol Route Statistics, and Patrol
Personnel Statistics. You can analyze and collect statistics on the patrol data to gain an overall
control on the patrol process.

10.5.1 All transactions

Click [Reports] > [All transactions] to view all transactions, that is, all event records generated by the
patrol device.

You can export all transactions into an Excel, PDF, or CSV file. See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 347


10.5.2 Patrol Records Today

Click [Reports] > [Patrol Records Today] to view event records generated by the patrol device today.

You can export patrol records today into an Excel, PDF, or CSV file. See the following figure.

10.5.3 Patrol Route Statistics

Click [Reports] > [Patrol Route Statistics] to view all normal and abnormal situations collected during
the patrol process.

You can export patrol route statistics into an Excel, PDF, or CSV file. See the following figure.

10.5.4 Patrol Personnel Statistics

Click [Reports] > [Patrol Personnel Statistics] to view patrol statistics of patrol personnel.
ZKBioSecurity 3.1.5.0 or above P a g e | 348
You can export patrol personnel statistics into an Excel file. See the following figure.

Supposed Patrol Times: Number of times that the patrol personnel should normally patrol.

Real Patrol Times: Number of times that the patrol personnel actually patrol.

Wrong Patrol Times: Number of times that the patrol personnel do not patrol based on the patrol
route.

Missed Patrol Times: Number of times that the patrol personnel miss one or more checkpoints in
the patrol route within the patrol time.

Absence Times: Number of times that the patrol personnel do not patrol.

ZKBioSecurity 3.1.5.0 or above P a g e | 349


11. Video
The system supports video linkage of access elevator control. You can achieve the management of
DVR / NVR / IPC, real-time video preview, video records query and automatically popping up of
linkage events.

You need to add video device, set linkage function in Linkage Setting and Global Linkage in
advanced.

Note: The current software only supports HIKVision, ZKIVision and Dahua devices. For more details
about the devices models, please contact technical support personnel to confirm.

11.1 Video Device


 Add a Video device

Click [Video] > [Video Device] > [Video Device] > [New]:

Fields are as follows:


Device Brand: The current software version only supports ZKTeco, HIKVISION, Dahua, Axis, Panasonic
and Geovision brands. For each brand supporting models, please refer to the
Hardware Support List for Video Module.

Protocol Type: The Private or Onvif protocol is automatically selected after Device Brand is specified.

Device Name: Any characters within a length of 30.

Host Address: Input the device’s IP address.

IP Port: The default corresponding IP Port will display after select Device Brand.

User Name: Any characters within a length of 15 (mandatory).

ZKBioSecurity 3.1.5.0 or above P a g e | 350


Password: Any characters within a length of 32 (mandatory).

Area Name: Divide area for the device.

Note: After adding device, only the device name and area name can be modified again, other
options cannot be modified. 

 Enable/Disable a Video Device

Select a video device in the list and click [Enable] or [Disable].

 Edit/Delete Video a Device

Select a video device in the list and click [Edit] or [Delete].

 Communication Settings

When the communication parameters are modified in the device, the modification must be
synchronized to the software to keep consistency, otherwise all the channels of the video device will
not work normally.

Select a device, click [Communication Settings]:

 Video Linkage Operation Guide

Click [Video Linkage Operation Guide], guide users to add video equipment, binding cameras for
access control equipment and set the linkage.   

11.2 Video Channel


When adding a video device, the system will automatically detect the number of cameras on this
device, that is, the number of channels, and generate a number of channels accordingly. For
example, a video device has 16 cameras. After adding this device, the system will generate 16
channels, and name the channels by default using the format "Device name-channel No.".

 Enable/Disable Video Device

Click [Video] > [Video Device] > [Channel]:

ZKBioSecurity 3.1.5.0 or above P a g e | 351


Click [Edit] below Operations in the list:

Fields are as follows:

Channel Name: Any characters within a length of 30.

Device Name, Channel Number and Channel Status are not editable in this page. You can modify
them in Video Device. The channel number is the channel number in video device.

11.3 Video Preview


Click [Video] > [Video Device] > [Video Preview], the left side is the device and channel lists, click a
channel to view the monitor screen.

ZKBioSecurity 3.1.5.0 or above P a g e | 352


Re-click the channel to shut down the screen.

Notes:

 A video can allow five users to preview at the same time. In chronological order, the
exceeded users cannot preview the video normally, and the page will be grey.

 If there are no video controls in the system, the below prompts will be displayed:

Click to download both the controls. Install the controls, and refresh the page, you can view the
monitor screen normally. To prevent abnormal video display, please install the controls that
ZKBioSecurity offers.

ZKBioSecurity 3.1.5.0 or above P a g e | 353


11.4 Video Event Record
View the records of catching pictures and videos.

Click [Video] > [Video Device] > [Video Event Record]:

The media file is:

:Indicates that the linkage type is “Video”, you can click to download this file. Please choose a third
part of video player to play the file, or else it cannot be played normally.

:Indicates that the linkage type is “Capture”, you can click to view this file.

ZKBioSecurity 3.1.5.0 or above P a g e | 354


Note: If the “Video” and “Capture” are both selected, there will be 2 records. For more details about
the way to set the linkage type, please refer to Linkage Setting.

11.5 Parameters
Click [Video] > [Video Device] > [Parameters]:

Video File Path: Path for storing files when the server records videos or captures images.

Video File Clean Up: When the disk space for storing video files is smaller than the pre-set value, you
can choose to delete the old video files or not to record videos or capture images. If you choose
Delete, the software will delete the video files that are generated in the earliest day and continue to
record videos; otherwise, the software does not record videos.

Video Control selection: It can set whether to download OCX 1.0 or OCX 2.0.

11.6 Solutions of Exceptions


A. Client browser cannot playback video, preview, or Real-Time Monitoring page has no video
pops-up:

Firstly, ensure IE11 or above version browser is available, client and Video Server are on the same
network segment and the video ActiveX installation is successful. If the ActiveX installation fails,
above all, uninstall the video ActiveX that were originally installed, run the "regsvr32-u
NetVideoActiveX23.ocx"command, and then in the browser, set all the options in "Tools -> Internet
Options -> Security -> Custom Level" on the ActiveX to "Enable or Prompt", re-open the browser,
re-login screen and open the video preview page, run the button "all add items of the site".

B. The network or power of video device is shut off while previewing the video screen.

Check whether the network or power is connected normally. Refresh the page after ensuring that
the connection is normal, refresh the page, and re-open the video preview.

C. In the E-Map, no video pops-up after clicking the camera icon:

Make sure to use IE11 and above version browser, client and Video Server on the same network

ZKBioSecurity 3.1.5.0 or above P a g e | 355


segment and the video ActiveX installation is successful. Also, view whether the browser is
preventing the temporary window pops up, if it is, change to allow window pops up to the site.

D. Video linkage is triggered, the video server does not have video or size of the video file that
the client downloads from the Video Server is 0kb:

First, ensure that the software server has set Time Server (keep the Windows time service and has set
the NTP function of the video server), it is recommended to set the time interval of the video server
smaller to ensure accurate synchronization software server and video server time, so as to keep the
time consistent between software server and controllers. It is recommended set Linkage Recording
Time more than 5 seconds, to avoid executing video linkage commands delay, which may lead to
the downloaded 0kb video file.

E. The Video system is not normal to use in windows server 2008:

Desktop Experience feature needs to be added in windows server2008 before the normal use of the
video.

Step 1: Run” services.msc” to open the “Service Manager”.

Step2: Set the start type of “Windows Audio” and “Themes” as Automatically Start.

Step3: Run the service manager, click [Add functions], check the “Desktop Experience” box and click
[Install]. Reboot the server after the installation is finished.

F. The video downloaded to local cannot be played:

Please choose a third part of video player to play the file, or else it cannot be played normally.

G. When the browser is chrom42 or above version, the system will prompt you to install video
controls though you have already installed.

The old NPAPI controls are disabled in chrom42 or above version. You should open the browser and
enter “chrome://flags/#enable-npapi” in address bar to enable the controls.

ZKBioSecurity 3.1.5.0 or above P a g e | 356


12. System Management
System settings primarily include assigning system users (such as company management user,
registrar, access control administrator) and configuring the roles of corresponding modules,
managing database, setting system parameters and view operation logs, etc.

12.1 Basic Management

12.1.1 Operation Logs

Click [System] > [Basic Management] > [Operation Log]:

All operation logs are displayed in this page. You can query specific logs by conditions.

Export: Export the operation log records, save to local. You can export to an Excel, PDF, or CSV file.
See the following figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 357


12.1.2 Database Management

Click [System] > [Basic Management] > [Database Management]:

All history operation logs about database backup are displayed in this page. You can refresh, backup
and schedule backup database as required.

 Backup Immediately

Backup database to the path set in installation right now.

Note: The default backup path for the system is the path selected during the software installation.
For details, refer to 《Software Installation Guide》.

ZKBioSecurity 3.1.5.0 or above P a g e | 358


 Backup Schedule

Click [Backup Schedule]:

Set the start time, set interval between two automatic backups, click [OK].

 Restore Database

1. Click the start menu of the PC[All programs][ZKBioSecurity]Then run “Services Controller”,
and you can find out the icon of “Services Controller” in Taskbar as follow, right click that icon,
then left click “Restore Database”.

2. In the popup window, click “Browse” to choose the backup file to restore the database.

ZKBioSecurity 3.1.5.0 or above P a g e | 359


Note: Before restoring a database, it is recommended that you back up the current database to
avoid data loss.

12.1.3 Area Setting

Area is a spatial concept which enables the user to manage devices in a specific area. After area
setting, devices (doors) can be filtered by area upon real-time monitoring.

The system, by default, has an area named [Headquarters] and numbered [1].

 Add an Area

Click [System] > [Area Setting] > [Area] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 360


Fields are as follows:

Area Number: It must be unique.

Area Name: Any characters with a length less than 30.

Parent Area: Determine the area structure of system.

Click [OK] to finish adding.

 Edit/Delete an Area

Click [Edit] or [Delete] as required.

12.1.4 System Parameters

Click [System] > [System Parameter]:

12.1.5 E-mail Management

Set the email sending server information. The recipient e mail should be set in Linkage Setting.

Click [Basic Management] > [Email Management] > [Email Parameter Settings]:

ZKBioSecurity 3.1.5.0 or above P a g e | 361


Note: The domain name of E-mail address and E-mail sending sever must be identical. For
example, the Email address is: [email protected], and the E-mail sending sever must be:
smtp.gmail.com.

12.1.6 Data Cleaning

The data cleaning time settings are available to set. The data volume will increase with the use of the
system. To save the storage space on the disks, you need to periodically clean expired data
generated by the system.

Click [Basic Management] > [Email Management] > [Email Parameter Settings]:

ZKBioSecurity 3.1.5.0 or above P a g e | 362


The system executes [Immediately Clean Up] operation after it is clicked and [OK] is clicked. Without
clicking [OK], the system will not clean data.

Note: In order to reduce the load of the system and not to affect the normal running, the cleaning
time should be set in the 1 o’clock am.

12.1.7 Audio File

Click [Basic Management] > [Audio File] > [New]:

You can upload a sound from the local. The file must be in wav or mp3 format, and it must not
exceed 10M.

ZKBioSecurity 3.1.5.0 or above P a g e | 363


12.1.8 Certificate Type

The types of certificates available for registration in the system, where you can add, delete, enable,
disable these document types as follows:   

 
 Add

Click to input the Certificate Type Name and check the Module Name, click [OK]. 

 Delete/Enable/Disable

Select the Certificate Type, click [Delete]/ [Enable]/ [Disable]], perform the appropriate action. “√”
means to enable the certificate, “-”means to disable the certificate.

12.1.9 Parameters

Configure the system-related settings parameters, as shown below:   

ZKBioSecurity 3.1.5.0 or above P a g e | 364


You can choose display as auto adjusting type or just icons only.

12.2 Authority Management

12.2.1 User

Add new user and implement levels for the user in the system.

1. Click [System Management] > [Authority Management] > [User] > [New]:

Fields are as follows:

Username: Any characters within a length of 30.

Password: The length must be more than 4 digits and less than 18 digits. The default password is
111111.

State: Enable or disable the user to operate the system.

Super User State: Enable or disable the user to have the superuser’s levels.

Role Group: Non-super user needs to choose a role group to get the levels of the group. The role

ZKBioSecurity 3.1.5.0 or above P a g e | 365


group must be set in advanced in Role Group.

Auth Department: If no department is selected, then the user will have all department rights by
default.

Authorize Area: No area selected means the user possesses all area rights by default.

Email: Type your email in the correct format.

First Name/Last Name: Type your initials.

Fingerprint: Enroll the user fingerprint or duress fingerprint. The user can login the system by
pressing the enrolled fingerprint. If the user presses the duress fingerprint, it will trigger the alarm
and send the signal to the system.

2. After editing, click [OK] to complete user adding, and the user will be shown in the list.

Click [Edit] or [Delete] as required.

12.2.2 Role

When using the system, the super user needs to assign different levels to new users. To avoid setting
users one by one, you can set roles with specific levels in role management and assign appropriate
roles to users when adding users. A super user has all the levels, can assign rights to new users and
set corresponding roles (levels) according to requirements.

1. Click [System] > [Authority Management] > [Role] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 366


2. Set the name and assign permissions for the role.

3. Click [OK] to save.

12.2.3 Role Group

You can add role groups to the system. A role group has all the levels assigned to roles within the
group. An appropriate role group can be directly assigned to a newly-added user. Include all the
levels for using all the service modules of the system and the system setup module. The default
super user of the system has all the levels, can assign rights to new users and set corresponding role
groups (levels) according to requirements.

1. Click [System Management] > [Authority Management] > [Role Group] > [New]:

ZKBioSecurity 3.1.5.0 or above P a g e | 367


2. Set the name and parent group, assign role for the group.

3. Click [OK] to save.

12.2.4 API Authorization

1. Activate the API through authorization. You can check whether the API has been activated on
the About page (The API Authorization menu is displayed in System Management only when
the API is activated). API is shown in License details below:

2. Log in to the system (as the super user, for example, admin) to enter the software. Click [System
Management] > [Authority Management] > [API Authorization]. Add a client ID, which must be

ZKBioSecurity 3.1.5.0 or above P a g e | 368


unique, and a client secret, which will be used when the API is invoked

3. Only when the client ID and secret are added can the next API operation page be displayed
normally. Otherwise, the access is abnormal):

4. After the client ID and secret are added, click Browse API on the API Authorization page to skip
to the API operation page (The page of the ZKBioSecurity system must be open for normal
access of the API operation page). This page provides multiple APIs:

ZKBioSecurity 3.1.5.0 or above P a g e | 369


When APIs are invoked, URLs of all request APIs must contain the access_token parameter, whose
value is determined by the client key configured on the background (if there are multiple keys, only
one is selected), for example:

The access_token parameter must be added when the API is invoked (one request URL can be
invoked):

http://110.80.38.74:6066/api/accLevel/getById/2.

ZKBioSecurity 3.1.5.0 or above P a g e | 370


12.2.5 Client Register

You can add client types for the system and generate registration codes for client registrations of
each module function. The number of allowed clients is controlled by the number of allowed points.

1. Click [System Management] > [Authority Management] > [Client Authorization] > [New] to go
to the [New] page: 

Client Type: The value can be APP Client, OCR-Personnel, OCR-Visitor, ID Reader-Personnel, ID
Reader-Visitor or Card Printing- Personnel.

Registration Code: The registration code for [APP Client] is used under [Network Settings] on the APP
login page and that for [Print Card-Personnel] is used under [Parameter Settings] > [Client
Registration]. Only new registration codes added on the server are authorized and one registration
code can be used by only one client.  

2. To reset a client, select the client and click [Reset]. 

ZKBioSecurity 3.1.5.0 or above P a g e | 371


Click [OK] to reset the client.

3. To delete a client, select the client and click [Delete].

Click [OK] to delete the client.

12.3 Communication
Click [System] > [Communication] > [Device Commands], the commands lists will be displayed.

If the returned value is more than or equal to 0, the command is successfully issued. If the returned
value is less than 0, the command is failed to be issued.

Clear Commands: Clear the command lists.

Export: Export the command lists to local host. You can export to an Excel file. See the following
figure.

ZKBioSecurity 3.1.5.0 or above P a g e | 372


12.4 Extended Management

12.4.1 LED Device

The system integrated outsourcing LED equipment (control card: lumens 3200/4200), provides a
window to display data; it can provide customers personnel in the access area quantity statistics,
real-time information about personnel going in and out and personnel information in the area, etc.

ZKBioSecurity 3.1.5.0 or above P a g e | 373


 Add

Click [System]> [Extended Management]> [LED Device]> [New]. The page is displayed as follows:

Fields are as follows:

Device Name: Name of the LED device.

IP Address: IP address of the LED device.

Port: The default communication port is 5200.

Default Pass Code: The default value is 255.255.255.255.

Screen Width: Width of the dot matrix (resolution).

Screen Height: Height of the dot matrix (resolution).

LED Title: Select whether to display the title. If the parameter is left blank, the title is not displayed.

Block Number: Number of blocks that the LED is divided into (Note that the blocks do not contain
the title and system time blocks).

Show Time: It will display time on the LED screen. Once you select it, you will find two options to
choose from; Single Line and Multiline Display. Choose according to your choice.

Automatic Distribute Data: By default, this parameter is selected. You send data to the LED in the

ZKBioSecurity 3.1.5.0 or above P a g e | 374


access control module only when you select this parameter. Otherwise, the content to be sent needs
to be manually defined.

Delete data in device when new: Delete the original data in the device when adding LED device.

Block Layout: After you click , the following box is displayed:

Notes:

 Parameters must be set for each block.

 The height of each block must be equal to or larger than 12. Otherwise, the letters cannot be
completely displayed.

 The total height of all blocks cannot be larger than the screen height.

 Edit
Click a device name or [Edit] under [Operation] to go to the edit page. After editing the device, click
[OK] to save the setting.

 Delete

Click a device name or [Delete] under [Operation] in the device list and click [OK] to delete the
device or click [Cancel] to cancel the operation. Select one or more devices and click [Delete] above
the list and click [OK] to delete the selected device(s) or click [Cancel] to cancel the operation.

ZKBioSecurity 3.1.5.0 or above P a g e | 375


 Enable and Disable

Select a device and click [Enable/Disable] to start/stop using the device. If the device is enabled, data
is transmitted to the device. Otherwise, no data is transmitted to the device.

 Synchronize All Data To Devices

Synchronize the LED block layout and LED data setting in the system to the device. Select a device,
click [Synchronize All Data To Devices], and then click [Synchronize] to synchronize the data.

 LED Template Management

Through this function you can create a template for the blocks. This template you can directly use at
the time of adding LED device. When you are adding LED device, then after defining the blocks
dimensions, you will be prompted to save the template as shown below:

If you save it, then this template will be displayed in the LED Template Management list as shown
below:

You can directly create the blocks by clicking on [New] in above interface.

ZKBioSecurity 3.1.5.0 or above P a g e | 376


Fill all the required details and save. Once saved, you will find this template at the LED device adding
interface.

 Restart

After you restart the device, the LED control card system will be restarted, data on the screen is

ZKBioSecurity 3.1.5.0 or above P a g e | 377


cleared and data saved in the system is restored. After the device is successfully restarted, click
[Synchronize All Data To Devices] to display all distributed content on the LED screen.

 Modify IP address

Modify the IP address of the device. The default IP address of the control card is 192.168.1.222.

 Manually defined content

Select a device and click [Manually defined content]. The page is displayed as follows:

Notes:

 At least one block must be selected for distribution of manually defined content.

 After the manually defined content is selected, the access control module cannot send data
to the LED device.

ZKBioSecurity 3.1.5.0 or above P a g e | 378


Appendices
Common Operations
 Select Personnel

The selected personnel page in the system is as below:

You can select the personnel from list generated, or you can also click [More] to filter by gender or
department.

Click to move the selected personnel in to the selected lists. If you want to cancel the
movement, click .

 Set Date and Time

Click the date and time box:

ZKBioSecurity 3.1.5.0 or above P a g e | 379


Click on the Year to select by clicking or . Click the Month and Date to select directly.

 Import (take the personnel list importing as an example)

If there is a personnel file in your computer, you can Import it into the system.

1. Click [Import]:

Fields are as follows:

File Format: Select the file format to be imported.

Destination File: Choose file to be imported.

Head Start Rows: which row is the first row to be imported.

Delimiter: The delimiter of CSV format file, only “.” and “-” are available.

ZKBioSecurity 3.1.5.0 or above P a g e | 380


2. Click [Next Step]:

3. Select the feeds to be imported to the system. “--------------” indicates the fields will not be
imported.

4. Click [Next Step]:

The data is imported successfully.

Notes:

 When importing department table, department name and department number must not be
empty, the parent department can be empty. Duplicated number does not affect the
operation, it can be modified manually.

 When importing personnel table, personnel number is required. If the personnel number
already exists in the database, it will not be imported.

ZKBioSecurity 3.1.5.0 or above P a g e | 381


 Export (take the personnel list exporting as an example)

1. Click [Export]:

2. Select the file format and export mode to be exported. Click [OK].

3. You can view the file in your local drive.

Note: 10000 records are allowed to export by default, you can manually input as required.

Access Event Type


 Normal Events
Normal Punch Opening: In [Only Card] verification mode, the person having open door levels
punch card at valid time period, open the door, and trigger the normal event.
Normal Press Fingerprint Opening: In [Only Fingerprint] or [Card or Fingerprint] verification mode,
the person having open door levels press fingerprint at valid time period, the door is opened, and
trigger the normal event.
Card and Fingerprint Opening: In [Card and Fingerprint] verification mode, the person having the
open permission, punch the card and press the fingerprint at the valid time period, and the door is
opened, and trigger the normal event.
Exit button Open: press the exit button to open the door within the door valid time zone, and
trigger this normal event.
Trigger the exit button (locked): indicates the normal event triggered by pressing the exit button
when the exit button is locked.
Punch during Normal Open Time Zone: At the normal open period (set normal open period for a
single door or for first-person normally open), or through the remote normal open operation, the
person having open door permission punch effective card at the opened door to trigger this normal
event.
Press Fingerprint during Normal Open Time Zone: At the normal open period (set normal open
period for a single door or for first-person normally open), or through the remote normal open
operation, the person having open door permission press the effective fingerprint at the opened

ZKBioSecurity 3.1.5.0 or above P a g e | 382


door to trigger this normal event.
First-Person Normally Open (Punch Card): In [Only Card] verification mode, the person having
first-person normally open permission, punch at the setting first-person normally open time period
(the door is closed), and trigger the normal event.
First-Person Normally Open (Press Fingerprint): In [Only Fingerprint] or [Card plus Fingerprint]
verification mode, the person having first-person normally open permission, press the fingerprint at
the setting first-person normally open period (the door is closed), and trigger the normal event.
First-Person Normally Open (Card plus Fingerprint): In [Card plus Fingerprint] verification mode,
the person having first-person normally open permission, punch the card and press the fingerprint
at the setting first-person normally open period (the door is closed), and trigger the normal event.
Normal Open Time Zone Over: After the normal open time zone over, the door will close
automatically.
Remote Normal Opening: When set the door state to normal open in the remote opening operation,
this normal event is triggered.
Cancel Normal Open: When Punch the valid card or use remote opening function to cancel the
current door normal open state, this normal event is triggered.
Disable Intraday Passage Mode Time Zone: In door normal open state, punch effective card for five
times (must be the same user), or select [Disable Intraday Passage Mode Time Zone] in remote
closing operation, and this normal event is triggered.
Enable Intraday Passage Mode Time Zone: If the intraday passage mode time zone is disabled,
punch effective card for five times (must be the same user), or select [Enable Intraday Passage Mode
Time Zone] in remote opening operation, and this normal event is triggered.
Multi-Person Opening Door (Punching): In [Only Card] verification mode, Multi-Person combination
can be used to open the door. After the last card is verified, the system triggers this normal event.
Multi-Person Opening Door (Press Fingerprint): In [Only Fingerprint] or [Card plus Fingerprint]
verification mode, Multi-Person combination can be used to open the door. After the last fingerprint
is verified, the system triggers this normal event.
Multi-Person Opening Door (Card plus Fingerprint): In [Card plus Fingerprint] verification mode,
Multi-Person combination can be used to open the door. After the last card plus fingerprint is
verified, the system triggers this normal event.
Emergency Password Opening Door: Emergency password (also known as super password) set for
the current door can be used for door open. This normal event will be triggered after the emergency
password is verified.
Opening Door during Normal Open Time Zone: If the current door is set a normally open period,
the door will open automatically after the setting start time has expired, and this normal event will
be triggered.
Linkage Event Triggered: After linkage configuration takes effect, this normal event will be
triggered.

ZKBioSecurity 3.1.5.0 or above P a g e | 383


Cancel Alarm: When the user cancels the alarm of corresponding door successfully, this normal
event will be triggered.
Remote Opening: When the user opens a door by [Remote Opening] successfully, this normal event
will be triggered.
Remote Closing: When the user closes a door by [Remote Closing] successfully, this normal event
will be triggered.
Open Auxiliary Output: In linkage setting, if the user selects Auxiliary Output for Output Point,
selects Open for Action Type, this normal event will be triggered when the linkage setting takes
effect.
Close Auxiliary Output: In linkage setting, if the user selects Auxiliary Output for Output Point,
selects Close for Action Type, or closes the opened auxiliary output by [Door Setting] > [Close
Auxiliary Output], this normal event will be triggered.
Door Opened Correctly: When the door sensor detects the door has been properly opened,
triggering this normal event.
Door Closed Correctly: When the door sensor detects the door has been properly closed, triggering
this normal event.
Auxiliary Input Point Disconnected: Will be triggered auxiliary input point is disconnected.
Auxiliary Input Point Shorted: When the auxiliary input point short circuit, trigger this normal event.

Device Start: Will be triggered if device starts (This event of PULL devices will not appear in real-time
monitoring and can be viewed only in event records of reports).

 Abnormal Events
Too Short Punch Interval: When the interval between two punching is less than the set time interval,
this abnormal event will be triggered.
Too Short Fingerprint Pressing Interval: When the interval between two fingerprints pressing is less
than the set time interval, this abnormal event will be triggered.
Door Inactive Time Zone (Punch Card): In [Only Card] verification mode, if the user having the door
open permission punch but not at door effective period of time, this abnormal event will be
triggered.
Door Inactive Time Zone (Press Fingerprint): If the user having the door open permission, press the
fingerprint but not at the door effective time period, this abnormal event will be triggered.
Door Inactive Time Zone (Exit Button): If the user having the door open permission, press exit
button but not at the effective period of time, this abnormal event will be triggered.
Illegal Time Zone: If the user with the permission of opening the door, punches during the invalid
time zone, this abnormal event will be triggered.
Illegal Access: If the registered card without the permission of current door is punched to open the
door, this abnormal event will be triggered.

ZKBioSecurity 3.1.5.0 or above P a g e | 384


Anti-Passback: When the anti-pass back takes effect, this abnormal event will be triggered.
Interlock: When the interlocking rules take effect, this abnormal event will be triggered.
Multi-Person Verification (Punching): When Multi-Person combination opens the door, the card
verification before the last one (whether verified or not), this abnormal event will be triggered.
Multi-Person Verification (Press Fingerprint): In [Only Fingerprint] or [Card or Fingerprint]
verification mode, When Multi-Person combination opens the door, the fingerprint verification
before the last one (whether verified or not), this abnormal event will be triggered.
Unregistered Card: If the current card is not registered in the system, this abnormal event will be
triggered.
Unregistered Fingerprint: If the current fingerprint is not registered or it is registered but not
synchronized with the system, this abnormal event will be triggered.
Opening Door Timeout: If the door sensor detects that it is expired the delay time after opened, if
not close the door, this abnormal event will be triggered.
Card Expired: If the person with the door access level, punches after the effective time of the access
control and cannot be verified, this abnormal event will be triggered.
Fingerprint Expired: If the person with the door access permission, presses fingerprint after the
effective time of the access control and cannot be verified, this abnormal event will be triggered.
Password Error: If using [Card plus Password] verification mode, duress password or emergency
password to open door, this abnormal event will be triggered.
Failed to Close door during Normal Open Time Zone: If the current door is in normal open state,
but the user cannot close it by [Remote Closing], this abnormal event will be triggered.
Verification Mode Error: If the user opening door mode is inconsistent with that set for current door,
this abnormal event will be triggered.
Background Verification Failed: If the background verification fails, this abnormal event will be
triggered. 
Background Verification Success: If the background verification succeeds, this abnormal event will
be triggered.
Background Verification Timeout: If no background verification result is returned in the specified
period, this abnormal event will be triggered.
Multi-Person Verification Failed: When Multi-Person combination opens the door, the verification is
failed, and triggers this abnormal event.
 Alarm Events
Duress Password Opening Door: Use the duress password of current door for verifying successfully
and trigger this alarm event.
Duress Fingerprint Opening Door: Use the duress fingerprint of current door for verifying
successfully and trigger this alarm event.

ZKBioSecurity 3.1.5.0 or above P a g e | 385


Duress Opening Door Alarm: Use the duress password or duress fingerprint set for current door for
verifying successfully and trigger this alarm event.
Opened Accidentally: Except all normal events, if the door sensor detects that the door is opened,
and this alarm event will be triggered.
Door-open timeout: This alarm event is triggered when the opened door is not locked at closing
door time.
Tamper-Resistant Alarm: This alarm event will be triggered when AIO device is tampered.
Server Connection Failed: This alarm event will be triggered when the device is disconnected from
the server.
Mains power down: Inbio5 series controller events, external power down.
Battery power down: Inbio5 series controller event, built-in battery power-down.
Invalid card alarm: Alarm event trigger when invalid card swiping five consecutively.
Notes: The user can customize the level of each event (Normal, Abnormal, and Alarm).

Elevator Event Type


 Normal Events

Normal Punch Open: This normal event is triggered if the verification mode is associated with cards,
and a user with the floor opening right punches his/her card and passed the verification.
Punch during passage mode time zone: This normal event is triggered if a valid card is punched
after a user with the floor opening right sets the Normally Open periods for a specific floor, or sets
the floor to the Normally Open state through the remote opening floor operation.
Open during passage mode time zone: This normal event is triggered if a fingerprint is pressed after
a user with the floor opening right sets the Normally Open periods for a specific floor, or sets the
floor to the Normally Open state through the remote opening floor operation.
Remote release: This normal event is triggered if a user remotely releases a button successfully.
Remote locking: This normal event is triggered if a user remotely locks a button successfully.
Disable intraday passage mode time zone: This normal event is triggered if a user performs this
operation on the Remotely Release Button page when a floor is in Normally Open state.
Enable intraday passage mode time zone: This normal event is triggered if the user performs this
operation on the Remotely Lock Button page when the Normally Open periods of the floor are
prohibited on the day.
Normal fingerprint open: This normal event is triggered if a user with the button releasing right
presses his/her fingerprint in the "Card or fingerprint" verification mode and the verification is
passed.
Press fingerprint during passage mode time zone: This normal event is triggered if a fingerprint is

ZKBioSecurity 3.1.5.0 or above P a g e | 386


pressed after a user with the floor opening right sets the Normally Open periods for a specific door,
or sets the door to the Normally Open state through the remote opening door operation.
Passage mode time zone over: When the preset Normally Open period arrives, the button is
automatically locked.
Remote normal opening: This normal event is triggered if a user selects the continuously releasing
button to set the button in continuously released state on the page for remotely opening the floor.
Device started: This normal event is trigger upon startup of the device. (This event will not appear in
the real-time monitoring, and can only be viewed through the event records in the report.)
Password open: This normal event is triggered if a user with the button releasing right presses the
password in the "Password only" or "Card or fingerprint" verification mode and the verification is
passed.
Superuser open buttons: This normal event is triggered if the super user remotely releases a button
successfully.
Start the fire floor: Release all buttons in the case of emergency so that users can select floors.
Superuser close buttons: This normal event is triggered if the super user remotely closes floors
(locks the buttons) successfully.
Enable elevator control button: Restart the elevator control function.
Disable elevator control button: Temporarily disable the elevator control function.
Auxiliary input disconnected: This normal event is triggered if the auxiliary input point is
disconnected.
Auxiliary input shorted: This normal event is triggered if the auxiliary input point is short circuited.
 Abnormal Events
Operate interval too short: This abnormal event is triggered if the actual interval between two times
of card punching is smaller than the interval that is set for this floor.
Press fingerprint interval too short: This abnormal event is triggered if the actual interval between
two times of fingerprint pressing is smaller than the interval that is set for this floor.
Button inactive time zone (punch card): This abnormal event is triggered if the verification mode is
associated with cards, and a user with the floor opening right punches his/her card beyond the
effective periods.
Illegal time zone: This abnormal event is triggered if a user with the floor opening right punches
his/her card beyond the effective periods.
Access denied: This abnormal event is triggered if a registered card is punched before the elevator
control right of the current floor is set for this card.
Disabled card: This event is triggered if the current card number is not registered in the system yet.
Card expired: This event is triggered if a person, for whom the elevator control effective time is set,
punches his/her card beyond the elevator control effective periods and verification fails.

ZKBioSecurity 3.1.5.0 or above P a g e | 387


Fingerprint expired: This event is triggered if a person, for whom the elevator control effective time
is set, presses his/her fingerprint beyond the elevator control effective periods and verification fails.
Password error: This event is triggered if the verification mode is associated with the password and
the password verification fails.
Disabled fingerprint: This event is triggered if the current fingerprint is not registered in the system
or has been registered but not synchronized to the device.
Button inactive time zone (press fingerprint): This abnormal event is triggered if a user with the
floor opening right presses his/her fingerprint beyond the effective periods of the floor.
Failed to close during passage mode time zone: This abnormal event is triggered if the current
floor is in Normally Open state and the button cannot be locked by performing the Remotely
Locking Button operation.
Wiegand format error: This abnormal event is triggered if a card is punched and the Wiegand
format of this card is incorrectly set.
Note: User can self-define the level of each event (normal, abnormal and alarm).

Offline Elevator Control Manual


To use offline elevator control mode, you must use an offline elevator control license.

Offline Elevator Device

Add the offline elevator control device to facilitate user management of device in the software.
Among them, rights management is the same as online elevator control, offline elevator control
module does not support most of the functions, such as synchronization data, equipment
monitoring, real-time monitoring. Compared with the online elevator control, the following
functions are missing: event type, device monitoring, real-time monitoring, holidays, global linkage,
all records, all abnormal records, currently only supports synchronization time and modify button
open duration and card writing operation.

New offline elevator devices:

ZKBioSecurity 3.1.5.0 or above P a g e | 388


 System authorization

After offline elevator control is authorized, the default software and device mode in elevator
parameter setting is offline and cannot be changed.

ZKBioSecurity 3.1.5.0 or above P a g e | 389


 Add devices by manually

Click [Elevator Device] > [Device] > [New] on the Action Menu, the following interface will be shown:

Fields are as follows:

Device Name: Any character, up to a combination of 20 characters.

Device Number: Range 1 ~ 254, the machine number cannot be repeated.

Firmware Version: Firmware version number of elevator control device.

Number of Expansion Board: Expands the number of floors that the elevator control device can
control.

Each expansion board relay number: 16 relays per expansion board.

Area: Specify areas of devices. After Area Setting, devices (doors) can be filtered by area upon
Real-Time Monitoring.

Note: When adding a device, the device number in the software should be the same as the 485
address setting number on the device.
 Synchronize Time

Click [Elevator Device] > [Device] > [Synchronize Time] on the Action Menu, the following interface
will be shown:

ZKBioSecurity 3.1.5.0 or above P a g e | 390


Synchronize device time with current server time.
 Modify Button Open Duration

Click [Elevator Device] > [Device] > [Modify Button Open Duration] on the Action Menu, the
following interface will be shown:

Button Open Duration: It is used to control the time period to press floor button after verification.
The default value is 5 seconds; the range is 0~254 seconds.

ZKBioSecurity 3.1.5.0 or above P a g e | 391


Initialize Card

Users can initialize the card to restore the default password and sector operation.

Click [Elevator Device] > [Card] > [Initialize Card] on the Action Menu, the following interface will be
shown:

Write Card

Write device number, personnel ID, personnel password, personnel authority, start time, end time,
card number (calculated logic card number) and other related information to the card.

Click [Elevator Device] > [Card] > [Write Card] on the Action Menu, the following interface will be
shown:

ZKBioSecurity 3.1.5.0 or above P a g e | 392


Fields are as follows:

First/Last Name: The maximum length cannot exceed 50, does not support comma; value sources
Personnel field, cannot add, modify, delete.

Personnel ID: The default maximum length of personnel ID is 9, the effective range is 1-799999999,
which can be configured according to the actual situation. Value sources Personnel field, cannot be
added, modified or deleted.

Card number: Card number cannot be repeated, the maximum length of 10; value sources
Personnel field, cannot add, modify, delete.

Start time: The effective starting time of the card; value sources Personnel field, cannot add, modify,
delete.

End time: The effective cut-off time of the card; value sources Personnel field, cannot add, modify,
delete.

Note: Personnel related authority (elevator levels), card number and related data can only be
written when the personnel editing page is completely filled in. The card number is calculated
logical card number; the logical card number stored in the database shall prevail.

ZKBioSecurity 3.1.5.0 or above P a g e | 393


Write management card

Management card is mainly used to loss and revert card. When the card is lost or reverted, you need
to write the card information into the management card, thus loss and revert card take effect.

Click [Elevator Device] > [Card] > [Write management card] on the Action Menu, the following
interface will be shown:

Fields are as follows:

Function selection: Management card is used to write the loss and revert card data in the software
system to the management card and then loss and revert card by brushing the management card
on the device.

Loss Card: Lost Card collection, drop-down selection.

Revert card: Revert Card collection, drop-down selection.

Start Time: The effective starting time of the card; value sources Personnel field, cannot add, modify,
delete.

End Time: The effective deadline of the card; value sources Personnel field, cannot add, modify,
delete.

ZKBioSecurity 3.1.5.0 or above P a g e | 394


Personnel System - Card

Check the list of cards in the system and batch issue card, assigning cards to personnel.
 Batch Issue Card

Click [Personnel] > [Card Manage] > [Card] > [Batch Issue Card]:

Card Enrollment Method: USB Reader or device.

Input Card Number: It can be generated by swiping an ID card on the USB reader and device, or
entering it manually. The card manually entered may be IC card.
 Report Lost Card

Click [Personnel] > [Card Manage] > [Card] > [Report Lost Card]:

Note: Report Lost Card is applicable to all functional modules, not to the offline elevator module.
After the report of loss, the status of the card becomes invalid but not written into the management
card. Need to write management card in the appropriate module, such as offline elevator control
module [Write management card] ([Elevator Device] > [Card] > [Write management card]).
 Reactivate Lost Card

Click [Personnel] > [Card Manage] > [Card] > [Reactivate Lost Card]:
Note: Reactivate Lost Card is applicable to all functional modules, not to the offline elevator
module. After reactivating lost card, the status of the card becomes valid but not written into the
management card. Need to write management card in the appropriate module, such as offline
elevator control module [Write management card] ([Elevator Device] > [Card] > [Write management
card]).

ZKBioSecurity 3.1.5.0 or above P a g e | 395


FAQs
Q: How to use a card issuer?
A: Connect the card issuer to PC through USB port, and then select individual personnel card issue or
batch card issue. Move the cursor to the card number input box, and punch the card on the card
issuer, then the card number will be automatically shown in the input box.
Q: What is the use of role setting?
A: Role setting has the following uses: 1. To set unified level for the same type of users newly added,
just directly select this role when adding users; 2. When setting system reminder and determine
which roles can be viewed.
Q: How to operate if I want to set accounts for all personnel of the Company’s Financial
Department?
A: First, create a new role in system setting and configure the functions to be used for this role. Then
add a user, set user information, and select the user’s role, thus adding a new account. For other
accounts, do the same.
Q: In Windows Server 2003, why the IE browser displayed error when access the system, how to
solve it?
A: This problem occurs because that Server 2003 has [Security Configuration Option] settings. If you
want to access the system, please configure it as follows: click Start – Control Panel – Add or Remove
Program, select [Add and remove Windows components] in the interface and click [Internet Explorer
Enhanced Security Configuration] option, cancel the tick before it. Then click [Next] to remove it
from the system. Open the system again the browser will access the system properly.
Q: If backing up or restoring the database fails, the possible reason?
A:
Backup fails: Please check the system environment variables, please go to Properties > Advanced to
set the environment variables as “C:\Program Files\ZKBioSecurity3.0\MainResource\postgresql\bin:”.
“C:\Program Files” is the system installation path, you can modify by your actual situation.
Restore fails: There are several reasons: The system version is too high or too low, or the database
has been damaged, you need to follow the prompts to change the system version or repair the
system, re-install the database.

END-USER LICENSE AGREEMENT


Important - read carefully:

This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or
a single entity) and the mentioned author of this Software for the software product identified above,
which includes computer software and may include associated media, printed materials, and

ZKBioSecurity 3.1.5.0 or above P a g e | 396


"online" or electronic documentation ("SOFTWARE PRODUCT"). By installing, copying, or otherwise
using the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. If you do not
agree to the terms of this EULA, do not install or use the SOFTWARE PRODUCT.

SOFTWARE PRODUCT LICENSE

The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well
as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.

1. GRANT OF LICENSE. This EULA grants you the following rights: Installation and Use. You may install
and use an unlimited number of copies of the SOFTWARE PRODUCT.

Reproduction and Distribution. You may reproduce and distribute an unlimited number of copies of
the SOFTWARE PRODUCT; provided that each copy shall be a true and complete copy, including all
copyright and trademark notices, and shall be accompanied by a copy of this EULA. Copies of the
SOFTWARE PRODUCT may be distributed as a standalone product or included with your own
product.

2. DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS.

Limitations on Reverse Engineering, Recompilation, and Disassembly. You may not reverse engineer,
decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that such
activity is expressly permitted by applicable law notwithstanding this limitation.

Separation of Components.

The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be separated
for use on more than one computer.

Software Transfer.

You may permanently transfer all of your rights under this EULA, provided the recipient agrees to the
terms of this EULA.

Termination.

Without prejudice to any other rights, the Author of this Software may terminate this EULA if you fail
to comply with the terms and conditions of this EULA. In such event, you must destroy all copies of
the SOFTWARE PRODUCT and all of its component parts.
Distribution.

The SOFTWARE PRODUCT may not be sold or be included in a product or package which intends to
receive benefits through the inclusion of the SOFTWARE PRODUCT. The SOFTWARE PRODUCT may
be included in any free or non-profit packages or products.

3. COPYRIGHT.

All title and copyrights in and to the SOFTWARE PRODUCT(including but not limited to any images,
photographs, animations, video, audio, music, text, and "applets" incorporated into the SOFTWARE

ZKBioSecurity 3.1.5.0 or above P a g e | 397


PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PRODUCT are
owned by the Author of this Software. The SOFTWARE PRODUCT is protected by copyright laws and
international treaty provisions. Therefore, you must treat the SOFTWARE PRODUCT like any other
copyrighted material except that you may install the SOFTWARE PRODUCT on a single computer
provided you keep the original solely for backup or archival purposes.

LIMITED WARRANTY

NO WARRANTIES.

The Author of this Software expressly disclaims any warranty for the SOFTWARE PRODUCT. The
SOFTWARE PRODUCT and any related documentation is provided "as is" without warranty of any
kind, either express or implied, including, without limitation, the implied warranties or
merchantability, fitness for a particular purpose, or no infringement. The entire risk arising out of use
or performance of the SOFTWARE PRODUCT remains with you.

NO LIABILITY FOR DAMAGES.

In no event shall the author of this Software be liable for any damages whatsoever (including,
without limitation, damages for loss of business profits, business interruption, loss of business
information, or any other pecuniary loss) arising out of the use of or inability to use this product,
even if the Author of this Software has been advised of the possibility of such damages.

Acknowledgment of Agreement.

I have carefully read and understand this Agreement, ZKTeco, Inc.’s Privacy Policy Statement.

If YOU ACCEPT the terms of this Agreement:

I acknowledge and understand that by ACCEPTING the terms of this Agreement.

IF YOU DO NOT ACCEPT the terms of this Agreement.

I acknowledge and understand that by refusing to accept these terms, I have rejected this license
agreement and therefore have no legal right to install, use, or copy this Product or the Licensed
Software that it incorporates.

ZKBioSecurity 3.1.5.0 or above P a g e | 398


www.zkteco.eu

ZKBioSecurity 3.1.0.0 or above P a g e | 399


© Copyright 2018. ZKTeco Inc. ZKTeco Logo is a registered trademark of ZKTeco or a related company. All other product and company names
mentioned are used for identification purposes only and may be the trademarks of their respective owners. All specifications are subject to
change without notice. All rights reserved.

You might also like