Product Training Course
Advantages of ZKTeco
Easy to use Access Control Software
Integrated into many stand-alone software packages
Wide arrange of readers for every solution
Single software for controller-based systems
Functions
Access Control: Allowing or Denying Access to certain Areas
Time and Attendance: Profiling workers’ working hours
Integrated with multiple Payroll software packages
Bluetooth App-based configurable units now available
Controllers add functionality
Specifying an Access Control
System
1. Determine the clients need, i.e. will it be for:
• Plain Access Control
• Time and Attendance
• Both
• Payroll Integration
2. Determine the technology that will suit his needs, i.e. pin/biometric/card/MultiBio etc.
3. Determine the estimated amount of users the client has
4.Determine the access modes to be used as well as number of doors or entry ways
5. Determine the way the readers will be connected
6. Pick a suitable software package and determine if all the hardware required will be
available
Biometric Technologies
PIN: Easy to program but least secure. PINs can be stolen and used and another
person’s used. Usually used in conjunction with card.
Card: Easy to program but least secure. Can be copied, forgotten or stolen. PINs can be
added to increase security
Fingerprint: Currently preferred technology. Cannot be forgotten and very hard to copy.
Some users do have issues with fingerprints. Only drawback is that some persons object
due to hygiene concerns, but have been proven not to carry any more risk than a door
handle
Facial Recognition: Advanced technology that is improving daily. Very user friendly, but
significantly more expensive.
Vein: Unsurpassed performance with highly accurate finger vein recognition technology
Palm: Its infra red rays illuminates the vein pattern which is then converted into a biometric template
Access Modes
There are a few options of access modes available:
• T&A only: Usually just one reader, just clocking personnel No lock
connection needed. Hence the cheaper T&A units usually do not have a
relay to control a lock
• Reader in, NTTE (No-Touch-To-Exit) out: Fine for most applications,
where out times need not be recorded for reporting
• Reader in, Slave Out: Slightly more secure as the NTTE’s can be easily
fooled by other devices. NOTE however that most reader/slave
combinations do NOT record which one tagged the finger, and hence will
not say if the person punched IN or OUT
• Reader In/Out: Required if detailed reports on movements are required,
but of course more expensive due to doubling of readers required
Locks
There are also 2 main types of locks available:
• Fail SAFE: This is a lock that RELEASES if the power supply fails. This is
done so that in case of fire or other emergencies people can escape the
danger. This is usually a magnetic lock (Mag-lock)
• Fail SECURE: This is a lock that REMAINS LOCKED if the power supply
fails. This is only used where extremely valuable equipment is kept, and
must have a bypass mechanism for persons inside. This is usually a
striker lock
Many other devices can also be opened: boom gates, garage doors,
turnstiles, all they usually require is an output on the reader to trigger
them
Operational options
Stand-alone: 1 reader is used on its own. Requires every person to be programmed
separately but very quick and very easy to install. Ideal for single access points.
Networked: All readers connected on standard LAN. More installation but allows users to be
enrolled from a single point and reports to be pulled online. Requires PC for software
management.
Cloud: Allows remote sites to connect via Internet. More complex but very useful for
dispersed roll-outs, such as large companies.
Controller based: Will always be PC based. Good for large sites but not recommended for
Payroll software.
Software
4 Software Packages are available, to suit the needs of all 3 Tiers:
• ZKAccess 3.5: basic free package
• BioTime 8: more advanced package with WDMS and complete
Time & attendance functionality
• ZKBioSecurity: Ultimate security package for fully secured buildings
ZKAccess 3.5
• Free, easy to use software
• Reports available for security purposes and T&A (but limited
to daily shifts)
• Allows configuration of inBio controllers
BioTime 8
• Allows for shifts across 24-hours
• WDMS allows seamless shift checking over internet
connection
ZKBioSecurity
• Allows integration of Green Label controllers, allowing up to
20 000 users per door
• Dahua Camera system fully supported
Time and Attendance Units
AC-ZKD1
Usually just one reader, just clocking personnel. No lock connection
needed. Hence the cheaper T&A units usually do not have a relay to
control a lock.
Access Control Units
Can be used to open a door. They have a built-in relay to open
and close the lock.
Take-on Readers
Plug and Play USB devices used to program fingerprints or
cards/tags.
Biometric Take-on Reader Card/Tag Take-on Reader
Controllers
Door Controllers can be used to connect readers to open and close
multiple doors. 1, 2 and 4 door models available.
AC-ZKF3200 / AC-ZK6400
• Lite controllers for slave tag readers
AC-ZKMA300
• Controllers for biometric or card slave readers
Slave Readers
Slave readers can be used in conjunction with Access Control units
as a cheaper option.
AC-ZKKR300
• Slave Tag Reader for Controllers
• No on-board relay or intelligence
AC-ZKF12/ID
• Slave fingerprint reader for Controllers
• No on-board relay or intelligence
Components
Green Label
Design
Face/Finger/PIN,
all-in-one units
Up to 20 000
Fingerprints on
controllers
Also Available
Tripod
Turnstiles
Barriers
Metal
Detectors