0% found this document useful (0 votes)
21 views20 pages

ZKTeco Product Training

The document outlines the advantages and functions of ZKTeco's access control systems, including easy integration with various software and a wide range of biometric technologies. It details the process for specifying an access control system, including client needs, technology options, and access modes, as well as the types of locks and operational options available. Additionally, it describes various software packages and hardware components designed for effective access control and time attendance management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views20 pages

ZKTeco Product Training

The document outlines the advantages and functions of ZKTeco's access control systems, including easy integration with various software and a wide range of biometric technologies. It details the process for specifying an access control system, including client needs, technology options, and access modes, as well as the types of locks and operational options available. Additionally, it describes various software packages and hardware components designed for effective access control and time attendance management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Product Training Course

Advantages of ZKTeco
Easy to use Access Control Software

Integrated into many stand-alone software packages

Wide arrange of readers for every solution

Single software for controller-based systems


Functions
Access Control: Allowing or Denying Access to certain Areas

Time and Attendance: Profiling workers’ working hours

Integrated with multiple Payroll software packages

Bluetooth App-based configurable units now available

Controllers add functionality


Specifying an Access Control
System
1. Determine the clients need, i.e. will it be for:
• Plain Access Control
• Time and Attendance
• Both
• Payroll Integration

2. Determine the technology that will suit his needs, i.e. pin/biometric/card/MultiBio etc.

3. Determine the estimated amount of users the client has

4.Determine the access modes to be used as well as number of doors or entry ways

5. Determine the way the readers will be connected

6. Pick a suitable software package and determine if all the hardware required will be
available
Biometric Technologies
PIN: Easy to program but least secure. PINs can be stolen and used and another
person’s used. Usually used in conjunction with card.
Card: Easy to program but least secure. Can be copied, forgotten or stolen. PINs can be
added to increase security

Fingerprint: Currently preferred technology. Cannot be forgotten and very hard to copy.
Some users do have issues with fingerprints. Only drawback is that some persons object
due to hygiene concerns, but have been proven not to carry any more risk than a door
handle

Facial Recognition: Advanced technology that is improving daily. Very user friendly, but
significantly more expensive.

Vein: Unsurpassed performance with highly accurate finger vein recognition technology

Palm: Its infra red rays illuminates the vein pattern which is then converted into a biometric template
Access Modes
There are a few options of access modes available:
• T&A only: Usually just one reader, just clocking personnel No lock
connection needed. Hence the cheaper T&A units usually do not have a
relay to control a lock
• Reader in, NTTE (No-Touch-To-Exit) out: Fine for most applications,
where out times need not be recorded for reporting
• Reader in, Slave Out: Slightly more secure as the NTTE’s can be easily
fooled by other devices. NOTE however that most reader/slave
combinations do NOT record which one tagged the finger, and hence will
not say if the person punched IN or OUT
• Reader In/Out: Required if detailed reports on movements are required,
but of course more expensive due to doubling of readers required
Locks
There are also 2 main types of locks available:
• Fail SAFE: This is a lock that RELEASES if the power supply fails. This is
done so that in case of fire or other emergencies people can escape the
danger. This is usually a magnetic lock (Mag-lock)
• Fail SECURE: This is a lock that REMAINS LOCKED if the power supply
fails. This is only used where extremely valuable equipment is kept, and
must have a bypass mechanism for persons inside. This is usually a
striker lock
Many other devices can also be opened: boom gates, garage doors,
turnstiles, all they usually require is an output on the reader to trigger
them
Operational options
Stand-alone: 1 reader is used on its own. Requires every person to be programmed
separately but very quick and very easy to install. Ideal for single access points.

Networked: All readers connected on standard LAN. More installation but allows users to be
enrolled from a single point and reports to be pulled online. Requires PC for software
management.

Cloud: Allows remote sites to connect via Internet. More complex but very useful for
dispersed roll-outs, such as large companies.

Controller based: Will always be PC based. Good for large sites but not recommended for
Payroll software.
Software
4 Software Packages are available, to suit the needs of all 3 Tiers:

• ZKAccess 3.5: basic free package

• BioTime 8: more advanced package with WDMS and complete


Time & attendance functionality

• ZKBioSecurity: Ultimate security package for fully secured buildings


ZKAccess 3.5

• Free, easy to use software

• Reports available for security purposes and T&A (but limited


to daily shifts)

• Allows configuration of inBio controllers


BioTime 8
• Allows for shifts across 24-hours

• WDMS allows seamless shift checking over internet


connection
ZKBioSecurity
• Allows integration of Green Label controllers, allowing up to
20 000 users per door

• Dahua Camera system fully supported


Time and Attendance Units
AC-ZKD1

Usually just one reader, just clocking personnel. No lock connection


needed. Hence the cheaper T&A units usually do not have a relay to
control a lock.
Access Control Units

Can be used to open a door. They have a built-in relay to open


and close the lock.
Take-on Readers

Plug and Play USB devices used to program fingerprints or


cards/tags.

Biometric Take-on Reader Card/Tag Take-on Reader


Controllers
Door Controllers can be used to connect readers to open and close
multiple doors. 1, 2 and 4 door models available.

AC-ZKF3200 / AC-ZK6400
• Lite controllers for slave tag readers

AC-ZKMA300
• Controllers for biometric or card slave readers
Slave Readers

Slave readers can be used in conjunction with Access Control units


as a cheaper option.

AC-ZKKR300
• Slave Tag Reader for Controllers
• No on-board relay or intelligence

AC-ZKF12/ID
• Slave fingerprint reader for Controllers
• No on-board relay or intelligence
Components
Green Label

Design

Face/Finger/PIN,
all-in-one units

Up to 20 000
Fingerprints on
controllers
Also Available
Tripod
Turnstiles

Barriers

Metal
Detectors

You might also like