I
Table of Contents
1 Instruction for Use.................................................................................. 1
1.1 Introduction to Fingerprint Lock Functions ...................................... 1
1.2 List of Installation Accessories......................................................... 2
1.3 Installation Requirements ................................................................ 4
1.4 Front and Rear Views ..................................................................... . 7
1.5 Precautions................................................................................... . 10
1.6 User Privileges .............................................................................. 11
1.7 Set Time....................................................................................... . 11
2. Enrollment and Verification ................................................................. 13
2.1 Enroll an Administrator ................................................................. 13
2.1.1 Enroll a Fingerprint ................................................................ 14
2.1.2 Enroll a Password ................................................................... 15
2.1.3 Enroll an RF ID Card.............................................................. 16
2.2 Enroll an Ordinary User ................................................................. 18
2.3 Backup Enrollment........................................................................ 20
2.4 Set User Verification and NO Status............................................... 21
2.5 FP Card Management * ................................................................. 22
2.5.1 Create a PIN Card................................................................... 23
2.5.2 Enroll an FP Card ................................................................... 25
2.5.3 Create an FP Card................................................................... 27
2.5.4 Purge an FP Card .................................................................... 28
2.6 Delete User Data .......................................................................... . 29
3. Lock Function Information and Settings............................................... 32
3.1 Operation Settings ......................................................................... 32