Biometrics Door Lock Step by Step Installation

The invention of biometrics led for several transactions and activities to be secured and easier. Attendance of employees, registering as a voter, access to different premises of an office, even lock for your home – all of these can be done through biometrics.

In installing your biometrics, you have to familiarize yourself with the following components” documentation and software, terminal, mounting plate and hardware, ethernet, cable, and power cord. Most of fingerprint door locks have the same way of installation and operation, but it is advisable that you read your manual thoroughly to ensure that you’re using the biometrics with little to no concerns.

Step 1 – Connection

There are two options in creating a connection to your computer from your PC. The first one is connecting via ethernet to the LAN. For this to happen, all you have to do is obtain the IP Address of the terminal and default gateway. The other one is connection directly to your PC com port which can be done by connecting it to the COM port of your PC. After choosing your desired connection you must save this for this is a perquisite for the setup of the hardware and software.

Step 2 – Configuration of Hardware – Device ID

A. Open the hardware by clicking the power ON. Press MENU and scroll down until you see the word SETUP. After clicking it scroll down until you see the word COMMUNICATION.  On Communication, select the Device ID and input the unique ID number assigned for your hardware.

Step 3 – Configuration of Hardware – Ethernet/LAN

B. If you desire to connect the terminal to LAN, enter the provided port number to you and then press okay. Scrolling down you will see the IP Address. Click it so you change your IP Address. After which, you may click esc and proceed to Default Gateway.

C. On Default Gateway, input the first three digit of the gateway address provided to you until you’ve finished filling out all the required numbers. After that, scroll down to RS485 and select YES. Same also goes for Ethernet. You may now save these changes.

Step 4 – Configuration of Hardware – Com Port

E. If you desire to connect the terminal directly to PC com port, all you have to do is scroll down to Baud Rate from Communication. This should be coordinated with the com port of your PC. Pressing OK, you can change to com port flash in the screen.

F. After that, proceed to RS485 and click NO if you are configuring for RS232 and yes for RS48. You may now scroll down to Ethernet then select NO if the screen says yes. You may now save this by click ESC and choosing OK once prompt message shows.

Step 5 – Installation of Software

Insert the CD included in the package and follow the steps that will prompt before you restart your computer. When you’ve reached the Settings of the Biometrics, choose both Ethernet and Com Port then click Next. Supply all necessary information and after which you’ll be directed to the recording off employees’ data. After which, you can now enroll names of the employees into the system where their time log will be recorded.

Step 6 – Registration of Employees

After registering all employees, from the biometrics itself you must register their fingerprints and/or passcodes. These will serve as their ‘tags’ to login the time they have clock in/out or break in/out. Some biometrics has the ability to take pictures of the employees so that every time they log their time, their faces will appear on the screen. Since employees will have their own unique identification through their fingerprints (even eye scan for some), it is impossible for anyone to forge their time logs.

Tip: In cases that your biometrics will encounter some errors, it is best to keep a manual login sheet beside the biometrics so you’ll still have a hard copy of their logs.

It is believed that use of biometrics lowers administrative expenses, prevents fraud and abuse, as well as reduces password reset costs. That is why in some countries they use biometrics not only for time log purposes, but also in accessing ATMs, PCs, computer networks and of course, even on cellphones.