View all the identification records on the device, which can be grouped and filtered by device. The data body temperature value is greater than or equal to 37.3 degrees to display red font, less than 37.3 degrees to display green font, no temperature data display "none". There are three Accessage states: normal body temperature, abnormal body temperature and no mask.
The system
will record the operation of each export Access record and generate an export
record. If the export succeeds, the export status will be recorded as
"completed", and if the export is canceled, the export status will be
recorded as "canceled". The export record in the completed state
allows downloading the exported excel file again, and all export records are
allowed to be deleted.
Steps: Enter the [Access permission] page and click the "Employee Access Authorization" button.
1) Select personnel, devices, Access permission and permanent effective time, and click "Save" button to start Access permission. After the device is successfully authorized, the person can Access the gate and the validity period is permanent.
2) Select personnel, devices, Access permission and temporary effective time, and click "Save" button to start Access permission. After the device is successfully authorized, the person can Access through the gate within the time range set by the validity period. If the validity period is exceeded, the recognition fails.
· Click the Save button to start the Access permission. Present the current synchronization status, authorization progress, number of successes and failures of each device in the form of a list, and display device names.
· The person who failed the authorization is recorded in the "Verification Failure Description" table. You can click "Export Settings Failed Number" to export and view the authorization failure information.
· The person who fails the authorization, after modifying the corresponding failure information, can re-authorize until the authorization is successful.
Select a person, select a device, de-authorize, and click the "Save" button to start revoking the permission. The de-authorization is the same as the "Access permission" logic, except that the selected person is removed from the selected device.
Steps: On the [Access permission] page, click the "Visitor Access permission" button.
Select the visitor, select the device, Access permission and valid time range, and click the "Save" button to start the Access permission. After successful authorization on the device side, the visitor can Access the gate to be valid within the set effective time range.
· Click the Save button to start the Access permission. Present the current synchronization status of each device in the form of a list, showing the device name, synchronization Access permission, number of successful and failed. The person who failed the permission is recorded in the "Verification Failure Description" table. You can click "Export Settings Failed Number" to export and view the permission failure information.
Visitors who have failed authorization can revise the authorization after revising· the corresponding failure information until the authorization is successful.
Select personnel and equipment and revoke the permission. Click the "Save" button to start. Revoke permission is the same as "Access permission", except that the reassigned personnel are removed from the original equipment.
On the [Access permission] page, click the "Refresh" button to refresh all authorized information in the list to the latest state.
Steps: Enter the [Blacklist monitoring] page and click the "Blacklist monitoring settings" button.
1. Select the blacklist and device and snap to report. Click the "Save" button to start the blacklist monitoring. After the device is successfully monitored, the person will be recognized and captured when reporting through the gate.
1. Click the Sure to start the blacklist monitoring. Present the current synchronization status of each device in the form of a list, display the device name, synchronization monitoring progress, the number of successful and the number of failed. The monitoring failures are recorded in the "Export Blacklist Monitoring Failure Information" table. You can click the export table to view the monitoring failure information.
2. Blacklist personnel who failed to monitor, after modifying the corresponding failure information, can re-monitor the settings until the monitoring registration is successful.
Select blacklist and device, and release blacklist monitoring. Click the "Save" button to start the release.
Enter the [Blacklist monitoring] page, click the "Identify Record Inquiry" button to enter the [Identify record inquiry] page, and display the identification records of all blacklist personnel. Blacklist identification records can be selected according to grouping, device, and date range inquiries.
In the blacklist monitoring personnel list, you can click the "remove monitoring" button behind the list record to release monitoring. After the removal is successful, the blacklist removes the snapshot monitoring or alarm from the selected device. You can also check the personnel record and click "remove monitoring" to perform batch operations.
Permission details are as follow: