Preview

Biometric Manual

Powerful Essays
Open Document
Open Document
1347 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Manual
Fingerprint Biometric Device User Manual

FS-800u

Powered by:

“Providing Best Solutions”

TABLE OF CONTENTS I. FS-800u Device Features ..…………………………… 1

I. FS-800u Device Features
FS-800u is a time and attendance system with built-in USB port and can operate in both Linux and Windows. Thru its USB port, this device gives you the convenience of accessing time logs outside of the site. FS-800u has a 3” TFT color LCD to enhance its features, slightly smaller and more compact version compared to other devices. Technical Specifications User Capacity Data Transaction Verification Mode Display Communication Keyboard & Button Power Identification Speed Dimension More Standard Function Management Software 3,000 100,000 1:1 4 lines, 16 characters each line Graphic Display LCD TCP/IP, Serial 9-pin DBF & Usb 16 key numeric & Function Keypad 12V DC 0.5 second 190 x 140 x 57 Short Message (SMS), Record Checking, Ring bell, 9 digits-code, FS Device Manager

II. Standard Operating Procedure ……………………… 2 III. Proper Fingerprint Registration ………………………. 3 IV. User Management ……………………………………. 4 a. Enroll FP User or Admin b. Manage FP User or Admin V. Communication ..……………………………………….. 5 a. Network b. RS-232/485 c. Security VI. System Management …………………………………. 6 a. System Option b. Data Manage c. Update d. Keyboard e. Display Setup f. Reset g. Bell Schedule h. Miscellaneous Settings VII. Date Time Settings …………………………………….. 7 VIII. Pen Drive ……………………………………………….. 7 Download a. Download Attlog b. Download User c. Download SMS Upload a. Upload User b. Upload SMS c. Upload Picture IX. AutoTest …………………………………………………. 8 X. Record …………………………………………………… 8 XI. System Information …………………………………….. 8

1

II. Standard Operating Procedure
Step 1 : Step 2: Install the device and power it up. Enroll users by registering his/her fingerprints, passwords or card. Assign users’ security privileges directly on the device. After enrolling users, verify that his/her enrolled fingerprint,

You May Also Find These Documents Helpful

  • Good Essays

    Ics 200 Final Paper

    • 1131 Words
    • 5 Pages

    3) _________________ means that each individual involved in incident operations will be assigned to only one supervisor.…

    • 1131 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Marketing Math Practice

    • 285 Words
    • 2 Pages

    B. Time Saver Systems (TSS) manufactures a line of personal digital assistants (PDA’s) that are distributed through cellular providers and large retailers. The line consists of three models of PDAs. The following data are available regarding these models:…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    TCEFC1/TCESC1 – FIPS 201, Large image capture area (TCS1 sensor) TCEFD1/TCESD1 – SteelCoat, Large image capture area (TCS1 sensor) TCEFD2/TCESD2– SteelCoat, Medium image capture area (TCS2 sensor) UPEK’s TouchChip Fingerprint Modules (TCEF) leverage UPEK’s widely deployed and proven fingerprint sensors and package them into a drop-in module for easy integration and fast time-to-market.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Com Data

    • 398 Words
    • 2 Pages

    AUTH. CHECK FP=JUST VERIFY THE AMOUNT AND PRESS F2, PAG NAKITA K NA NO AUTH. FP JUST PRESS F2…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The system will gather time and attendance information from the time keeping equipment and transfer it to the payroll system upon approval by the Manager.…

    • 1146 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Letter of explanation regarding bonus structure, explain bonus is paid twice a year and explain how your 2014 bonus was large than usual and why…

    • 61 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    “Keeping track of employee working hours is not an optional chore: The federal Fair Labor Standards Act (FLSA), and numerous other federal and state laws, require employers to keep records of hours worked, wages paid, and other conditions of employment” (Business and Legal Resources 2017). Our goal is to have an effective time tracking management system like Ideal Image, who is known for their excellent bio/thumbprint system. Their system ensures all employees are accurately tracking their time and compensated…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    •Employees will be able to enter and edit their timesheet data at any time from any location instead of phoning their data to their regional manager for entry into the mainframe system…

    • 845 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The intended users for this system are employees and managers. The employees will need to be able to clock in and out of specific projects in order to give accuracy to the system when the manager runs the report. The managers will also need to have the ability to clock not only themselves in and out, but the employees as well.…

    • 829 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Please write an essay on the AFIS system. This is the Automatic Fingerprint Identification System. This should be in the order of 1500-2,000 words. Bring out the main points of the system. E.g. History, who uses it, future developments. Also include technical information on how it works with advantages and disadvantages.…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Biometric devices authenticate a person’s identity by verifying unique personal characteristics. These devices translate a biometric identifier, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer. If the digital code in the computer matches the personal characteristic code, the computer grants access. Examples of biometric devices include fingerprint readers and face recognition systems.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 1 About This Manual ......................................................................... 1.1 Overview of This Manual ........................................................................ 1.2 Organization of This Manual .................................................................. 1.3 Reference ............................................................................................... Chapter 2 UE Idle Mode Behavior .................................................................. 2.1 Introduction............................................................................................. 2.2 Glossary ................................................................................................. 2.2.1 Terms ............................................................................................. 2.2.2 Acronyms and Abbreviations ......................................................... 2.3 Application .............................................................................................. 2.3.1 Availability ...................................................................................... 2.3.2 Benefit ............................................................................................ 2.3.3 Limitation and Restriction............................................................... 2.4 Technical Description ............................................................................. 2.4.1 PLMN Selection[2] ......................................................................... 2.4.2 Cell Selection[4] ............................................................................. 2.4.3 Cell Reselection ............................................................................. 2.4.4 Location Update and Routing Area Update[3] ............................... 2.4.5 Paging[4][5] .................................................................................... 2.4.6 System Information[5]…

    • 76938 Words
    • 308 Pages
    Satisfactory Essays
  • Powerful Essays

    Before access system the Auxiliary Police Officer need to login first. Where they will able to view or check the incoming visitor. After the checking the system will sent Short Message Services (sms) to top management.…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Installation Process

    • 706 Words
    • 3 Pages

    5. Wait for the activation process to finish. When it's done you should see the following message:…

    • 706 Words
    • 3 Pages
    Satisfactory Essays