Jantech EP3000 Server User Manual

Transcription

Jantech EP3000 Server User Manual
J@NTECH - Access Control System
USER MANUAL
J@NTECH Access Control System
Table of Contents
Foreword
0
Part I Software License
3
Part II Introduction
7
1 Welcome topic
................................................................................................................................... 7
2 Installation Procedures
................................................................................................................................... 8
3 Starting up
................................................................................................................................... 9
Part III Pull Down Menu
11
1 File
................................................................................................................................... 12
2 Edit
................................................................................................................................... 13
3 View
................................................................................................................................... 15
4 Info
................................................................................................................................... 16
Part IV Menu Items
16
1 Command List
................................................................................................................................... 17
System Parameter
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Controller Setting
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Set Card Setting
. ... ....to...Controller
.... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Set Door Setting
. ... ....to...Controller
.... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Get Door Setting
. ... ....from
... .... ...
Controller
.... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Software User. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Menu Access. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Time Interval . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Time Zone . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Holiday
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Access Level. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Shift Setting . ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Department Setting
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Job Title Setting
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Card User DB. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
View Attendance
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Attendance Report
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Export Attendance
. ... .... ...Data
.... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
View Event Log
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Transaction Report
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Export Transaction
. ... .... ...Data
.... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Card User Report
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Reindex Database
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
Backup & Restore
. ... .... ... .... ... .... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... .... .... ... .... ... .... ... .... ... ...............
17
20
21
22
23
24
27
28
29
31
31
33
35
36
38
40
42
44
45
46
48
49
50
51
2 Controller List
................................................................................................................................... 53
3 Card Holder ...................................................................................................................................
List
54
4 Transaction List
................................................................................................................................... 55
© <2007-2010> .. . Jantech Technology Sdn Bhd
Contents
Part V Computer Specification
Index
© <2007-2010> ... Jantech Technology Sdn Bhd
II
57
0
J@NTECH Access Control System
1
Software License
J@NTECH User's License
Documentation version 4.0
Copyright Notice
Copyright © 2007-2010 Jantech Technology Sdn Bhd (Jantech)
All Rights Reserved.
Any technical documentation that is made available by Jantech is the
copyrighted work of Jantech and is owned by Jantech
NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Jantech makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors.
Jantech reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of
Jantech Technology Sdn Bhd
117, Block P/F,Jalan Durian 1,
Taman Cheras 56100 Kuala Lumpur,
Malaysia.
www.jantech.com.my
© <2007-2010> .. . Jantech Technology Sdn Bhd
4
Software License
IMPORTANT : PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE
AGREEMENT
CAREFULLY BEFORE USING THE SOFTWARE. Jantech Technology Sdn Bhd
("JANTECH") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE
INDIVIDUAL, THE COMPANY, OR THE
LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS
"YOU" OR
"YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF
THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT
BETWEEN YOU AND JANTECH. BY OPENING THIS PACKAGE, BREAKING THE SEAL,
CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING
ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU
AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT
AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE" OR
"NO" BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF
THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO
THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SEVEN (7) DAYS OF
PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the "Software") is the property of
Jantech or its
licensors and is protected by copyright law. While Jantech continues to own the Software, You will have certain
rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or
enhancements to the Software that Jantech may furnish to You. Except as may be modified by a Jantech
license certificate, license coupon, or license key (each a "License Module") which accompanies, precedes, or
follows this license, Your rights and obligations with respect to the use of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this
license, You may make that number of copies of the Software licensed to You by Jantech as provided in Your
License Module. Your License Module shall constitute proof of Your right to make such copies.
B. make one copy of the Software for archival purposes, or copy the Software onto the hard disk of Your
computer and retain the original for archival purposes;
C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that
can access the Software over that network; and
D. after written notice to Jantech , transfer the Software on a permanent basis to another person or entity,
provided that You retain no copies of the Software and the transferee agrees to the terms of this license.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software;
B. sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify,
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
translate, make any attempt to discover the source code of the Software, or create derivative works from the
Software;
C. use a previous version or copy of the Software after You have received a disk replacement set or an upgraded
version. Upon upgrading the Software, all copies of the prior version must be destroyed;
D. use, if You received the software distributed on media containing multiple Jantech products, any
software on the media for which You have not received a permission in a License Module; nor
Jantech
E. use the Software in any manner not authorized by this license.
2. CONTENT UPDATES:
Certain Jantech software products utilize content that is updated from time to time. You may obtain Content
Updates for any period from our URL : www.jantech.com.my .
3. LIMITED WARRANTY:
Jantech
warrants that the media on which the Software is distributed will be free from defects for a period of
seven (7) days from the date of delivery of the Software to You. Your sole remedy in the event of a breach of this
warranty will be that Jantech will, at its option, replace any defective media returned to
warranty period or refund the money You paid for the Software.
Jantech
within the
Jantech
does not warrant that the Software will meet Your requirements or that operation of the Software will
be uninterrupted or that the Software will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESS OR
IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS,
WHICH VARY FROM COUNTRY TO COUNTRY.
4. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO
NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES
SO THE BELOW LIMITATION OR EXCLUSION
MAY NOT APPLY TO YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF
WHETHER ANY REMEDY
SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL ENTRYPASS OR ITS LICENSORS BE
LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL,INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF ENTRYPASS
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO CASE SHALL ENTRYPASS'S OR ITS
LICENSORS' LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE.
The disclaimers and limitations set forth above will apply regardless of whether You accept the Software.
5. GENERAL
This Agreement will be governed by the laws of Malaysia. This Agreement and any related License Module is the
entire agreement between You and Jantech relating to the Software and:
(i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with
© <2007-2010> .. . Jantech Technology Sdn Bhd
6
Software License
respect to its subject matter; and
(ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar
communications between the parties. This Agreement shall terminate upon Your breach of any term contained
herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and
damages and limitations on liability shall survive termination. This Agreement may only be modified by a License
Module which accompanies this license or by a written document which has been signed by both You and
Jantech . Should You have any questions concerning this Agreement, or if You desire to contact Jantech for
any reason, please write to:
(i) Jantech Customer Service,
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
2
Introduction
2.1
Welcome topic
Thank you for purchasing the J@TECH Access Control System. You will find your decision to invest in
the system to be value for money as we are confident it will deliver consistent superior performance
and reliability.
Many system aren't successful because of constant changes in technology infrastructure, integrations
that must be redone, scalability when put into system, etc. From our pass experience, we have cater
for all these. J@NTECH system is designed in such a way that you can easily integrate with other
system such as payroll system and etc. It is also designed with the open architecture which can accept
most of the reader formats available in the market.
The system is designed to manage up to 64 controllers, which mean it can control up to maximum of
64 doors. It offers a powerful access control solution. We have included features such as antipassback, card expiry checking and many more that is usually found in the more expensive systems to
add value to the system.
Using this system is unbelievably easy. Familiar Windows environment make it very user-friendly.
The system can function in both on-line and off-line conditions. This means the host computer is not
required to be online all the time for the system to work. When the computer is off-line, the events
would be kept in the controller's memory. How many transactions would be stored rely on the
controller model that you own. Our basis controller specification can cater for 5000 events memory,
recorded on a first in first out basis at the controller's local memory. When communications is reestablished, the software will automatically upload all the events.
J@NTECH offer you practical reports that can print out such as absentees and late comers reports to
help you in analyzing your staff's attendance.
Our development does not stop here; in fact if your business expands and you require integration to
the access control system, we will be able to upgrade the system for you. Like what we state in our
brochure, we make access more affordable for you.
Again, thank you for choosing J@NTECH.
© <2007-2010> .. . Jantech Technology Sdn Bhd
8
Introduction
2.2
Installation Procedures
Compatible OS: Window ME, Window XP Home/Professional Edition, Window 2000
When installing, using , or uninstalling J@NTECH access control system, log on as the "Computer
administrator" or "Administrator"
1) Turn on the computer and wait for Windows to start up.
2) Ensure the PC have at least a serial port.
This section will guide you step by step on the installation process of the J@NTECH access control
system.
1.
2.
3.
4.
5.
6.
7.
Insert the CD into CD-ROM drive.
The system shall autorun the installation process
Go to My Computer and double click on the CD-ROM drive.
Double click at the icon Software, look for JTsetup.exe.
Double click at the JTsetup.exe.
The software would, then, set up automatically as seen below.
Follow the instructions on the window. The software would run the installation procedure by itself
and allocate it to the default folder. To go back to the previous procedure or cancel the
installation process, just click on the button Next or Exit.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
8.
Now that the program is installed, you can run the program anytime by clicking the J@NTECH
from the Start Menu.
9) System adminstrator can also click a short cut at the deskstop so that easier to access the
J@NTECH access control software. This can be done by
rigt click at the mouse to the following file :
C:\Program Files\J@NTECH - Access Control System\Jantech.exe
2.3
Starting up
When you first time running the software, you are requiring login to the application system and then configure a
PC communication port that is being used to communicate with hardware control panel.
© <2007-2010> .. . Jantech Technology Sdn Bhd
10
Introduction
1.
Click at 'Login' button to start up application login session
2.
3.
4.
Key in defaut system user id and password to gain access
Default system user id is 'Admin' and password is 'Admin'
Click at 'System Parameter' to configure communication port setting.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
3
Pull Down Menu
Pull Down Menu is formed by 4 main menu
1) File
2) Edit
3) View
4) Info
© <2007-2010> .. . Jantech Technology Sdn Bhd
12
Pull Down Menu
3.1
File
There are 4 functions in this pull down menu,
i) Login
This software function allows system operator login to the J@NTECH system. the software prompt you
to key in the user name and password. The manufacturer default user name and password are
J@NTECH. After keying in the user name and password, click OK.
Note. Both the User Name and Password are case sensitive.
ii) Log Out
This software function allows system user log out from J@NTECH system and yet still on-line the
system without shutting down the application. All incoming transaction will still be shown at the
computer console.
To log out, the system user is require to input the logged on system password.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
iii) Edit Password
This system function allow logged on user to edit their own user password.
iv) Close
This is to shut down the software. Bear in mind that when the software is shut down, or offline, all the
transaction records will store at the local controller memory. The software will automatically retrieve
the records once it is online again. User are require to key in their password, or else the system will
not permit the user to shut down the software. This is to ensure the software is shut down by the
authorise user only.
3.2
Edit
Here are the editing function that designed to assist the user on maintaining the system databases. As
seen on the below listed, there are 4 main menu and submenus.
System Setup
© <2007-2010> .. . Jantech Technology Sdn Bhd
14
Pull Down Menu
User Setup
Viewing & Reporting
System Utilities
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
3.3
View
There are 4 menu items under this menu section. System user can either click at the menu tab to
access on Command List, Transaction List, Controller List or Card Holder List.
© <2007-2010> .. . Jantech Technology Sdn Bhd
16
Pull Down Menu
3.4
Info
This button allows system user to verify an information of the installed software. The display
information indicated the software version no.
4
Menu Items
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
4.1
Command List
This is a main command centre of J@NTECH access control system. System user can simply click at
the command button to launch an application function.
4.1.1
System Parameter
System Parameter allow the system user to configure their company logo, company name, default
startup screen, card user database user define fields and communication port setting for controller
connection.
© <2007-2010> .. . Jantech Technology Sdn Bhd
18
Menu Items
Data Fields
Company name & Logo
This information would be display at the header of each and every reports.
The report is being personalise with user's own identify. To capture a report logo image first of all,
the system operator is require
to select Capture button and then follow by assigning the location of pre-recorded BMP image file.
The suggested logo image resolution is 100x100 pixel..
Start Screen
This system setting allow system user to configure J@NTECH access control software default start up
screen.
System user can assign whether they want the application to be start up on 'Command List',
'Transaction List',
'Controller List' or 'Card Holder List'
User Define #1, #2, #3
By default, system will provide users data field as shown below,
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Users can add another 3 self define field. To add, just key in the desire field in the User define #1,
#2, #3 data fields
Example of additional field that added are handphone number, IC/Passport number, car number adn
etc...
Bus 0 Comm Port, Bus 1 Comm Port, Bus 2 Comm Port and Bus 3 Comm Port.
This setting information is to configure the PC communication port that is being connected with
hardware controller.
The J@NTECH system software is supported up to 4 data buses.
This setting is to identify the PC communication port that is used to communicates with the Door
Controllers.
Only filled in the Comm Port that in used, select Not USED for those unused communication electrical
bus.
Command Actions
Capture
This command action is allow system user to browse the pre-recorded report LOGO image file from
computer hard disk.
Clear
This command action is to reset the report logo.
Change
© <2007-2010> .. . Jantech Technology Sdn Bhd
20
Menu Items
This command action is to save all parameter setting into system database.
Close
This command action is to close the parameter setting function and return to main menu screen
4.1.2
Controller Setting
In order for the software to manage and monitor a door, system user need to defined and include a
door. The software identifies the installed door through the identifier of the a controller. The identifier
is unique for every controller. (Unit no)
To add new door controller, system user can select a 'Insert' button.
To change the existing door setting , system user can select 'Modify' button.
To edit controller tagname, system user can select 'Edit Tag' button
To remove unwanted record, system user can select 'Delete' button.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
The tagname is a keyfield for controller definition, system user require to specify an unique name as
an identifier. J@NTECH access control system support up to 2 controller settings. Which are:= Door
Access and Barrier Access.
Both of these settings are similar except under the case of Barrier Access panel type. The control
panel will activate 2 relays output instead of 1 relay output. (Relay-1 is for IN barrier, Relay-2 is for
OUT barrier).
The Busno and Unitno is hardware physical address, it must be unique.
The door release time is a timing value for indicating how long you want a relay to be activated.
The door open time is a timing value for indicating how long you want a relay to be remained open
until an alert warning is enable.
Beside door open time and release time. System user can also configure the card + pin time schedule
as well as lock release schedule. Once, this setting information is assigned, the operation mode will be
activated, if the time schedule is reach.
4.1.3
Set Card Setting to Controller
This system command allow system user to update card holder information from PC database on to
control panel.
The card updates command are:=
(1) Update Card - Insert/Modify card record from control panel
(2) Delete Card - Remove unwanted card record from control panel
(3) Block Card - Temporary disable card usage at control panel
(4) Unblock Card - Reset card blocking flag back to normal
© <2007-2010> .. . Jantech Technology Sdn Bhd
22
Menu Items
(5)
(6)
(7)
(8)
(9)
4.1.4
Clear Antipassback - Reset card antipassback flag
Enable Antipassback - Activate card antipassback mode
Disable Antipassback - Deactivate card antipassback mode
Enable Card Pin - Activate card pin mode
Disable Card Pin - Deactive card pin mode
Set Door Setting to Controller
This system command allow system user to update door setting information for PC database to
hardware control panel. The send information consist of time set, time zone, holiday list, door setting
and PC date time.
To send setting to control panel, first of all, system user must select the destinated controller from the
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
pick list and then follow by a 'Send' command to activate the command sending.
4.1.5
Get Door Setting from Controller
This system command allow system user to retrieve control panel setting information.
The avaliable command actions are:=
(1) Holiday List
(2) Time Set
(3) Time Zone
(4) Controller Setting
© <2007-2010> .. . Jantech Technology Sdn Bhd
24
Menu Items
To retrieve controller setting, first of all, system user require to highlight the controller that he/she
want to retrieve from and then follow by the command action.
The retrieve information will be presented under 'Retrieve Data' tab.
4.1.6
Software User
This function defines the authority given to users to login into this software. An User ID and password
is required to access to this software. Once the Software User is created, the default login password is
identical to the User ID. This password can be changed in the System User settings – Change
Password. Each user can be assign to a individual pre-defined menu access level.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
To Add, click on Insert command,
By clicking at the Menu Access, system adminstrator can select the appropriate access level for the
software users by scrolling through the arrow button as seen in the below.
© <2007-2010> .. . Jantech Technology Sdn Bhd
26
Menu Items
Data Fields Information
===============
User ID
- this field defines identifier for the system operator
User Name
- this field defines detail description of the system operator
Menu Access
- this field defines the menu access permission right of the system operator.
Action Button
========
1. Insert
Insert the software user record into system table
2. Edit
Modify the previously saved record
3. Delete
Remove the unwanted record information from software user table
4. Close
To close the software user setting form and return to the main screen.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
4.1.7
Menu Access
This menu defines the accessibility of the software user to select each menu and change any
configuration in this software. A menu access level is created to assign different authority level so that
you can have a list of software user with different authority level.
Action Button
========
1. Insert
Insert the user definable record into system table
2. Modify
Modify the previously saved record
3. Delete
Remove the unwanted record information from system table
4. Save
Store the edited record setting into the system table
© <2007-2010> .. . Jantech Technology Sdn Bhd
28
Menu Items
5. Cancel/Close
To close the menu access setting form and return to the main screen.
4.1.8
Time Interval
There are 24 Time Set records available of which 22 records are programmable. The software selfgenerates 2 Time Set records by default. Time Set 000, which is No Access Time Set and Time Set
001, which is Free Access Time Set. The Time Set 000 disables the feature at all times and Time
Set 001 enables the feature at all times. There are 4 intervals in the time schedule. These interval
durations define the activation times of the feature.
To add a new time set, simply click on the ADD icon and define the interval/s set of time. To do
modification of existing time set, click on Edit then do the modification. To delete a time set, highlight
the time set and then click at the delete button. Download icon allows you to send the configuration to
the controller.
The defined time set will be used in the time zone setting at the later section. Besides configuring the
timer set, the software default has two pre-assigned timer set which are Free Access For All timer set
and No Access timer set.
For example:
========
You may specify the time set for office staff as follows:
Time Set 02
Interval #1 09:00 to 12.00
Interval #2 13:00 to 17:00
Interval #3 00:00 to 00:00
Interval #4 00:00 to 00:00
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
This allows the office staff accesses the system from 9:00am to 12:00 noon and from 1:00pm to
5:00pm. In other words, if the office staff accessed the system within these periods of time, he/she
will be granted access. If it is outside these periods of time, he/she will not be granted access.
4.1.9
Time Zone
Time Zone is the parameter that schedule the activation or execution time of each of the functions by
defining the activation time set per day plus the activation time set during the holidays.
By defining a time set for each of the day and holiday, we can define the activation time of each
feature. The software will self generate Time Zone 000 for No Access – this will disable the selected
feature at all times and Time Zone 001 for Free Access – this will enable the selected feature at all
times. As in the Time Set Menu, you can add, edit, delete and download the time zones to the
controller.
Time Zone
000
001
Description
No Access
Free Access
Time zone setting is made up of Timer set. You specify 7 time set in each time zone setting. (One for
each day of the week plus a holiday). By specifying the time zone setting a card, the controller can
then automatically control the different accessibility of the card from Sunday to Saturday and holiday.
The example below shows the use of time zone and time set to control the accessibility of the card.
© <2007-2010> .. . Jantech Technology Sdn Bhd
30
Menu Items
Time Set Setting
Time Set #1 (Interval #1 08:00 to
Interval #4 00:00 to 00:00)
Time Set #2 (Interval #1 09:00 to
Interval #4 00:00 to 00:00)
Time Set #3 (Interval #1 08:00 to
Interval #4 00:00 to 00:00)
Time Set #4 (Interval #1 00:00 to
Interval #4 00:00 to 00:00)
Time Set #5 (Interval #1 00:00 to
Interval #4 00:00 to 00:00)
Example:
Time Zone
Time Zone
Time Zone
Time Zone
#
#1
#2
#3
Sun
05
04
04
Mon
05
01
01
12:30; Interval #2 13:30 to 18:00; Interval #3 00:00 to 00:00;
12:00; Interval #2 13:00 to 17:00; Interval #3 00:00 to 00:00;
13:30; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00;
00:00; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00;
23:59; Interval #2 00:00 to 00:00; Interval #3 00:00 to 00:00;
Tue Wed Thu
05 05
05
01 01
01
04 01
04
Fri
05
02
02
Sat
05
03
04
Hol
05
04
04
Each entry in the time zone setting above refers to the time set no. In the table above,
1. The Time Zone #1 specifies that the card will use Time Set #5 everyday where Time Set #5 is
00:00 to 23:59 (24 hours access)
2. The Time Zone #2 specifies that the card will use Time Set #4 on Sunday and holiday (No access at
all),
Time Set #1 on Monday till Thursday, Time Set #2 on Friday and Time Set on Saturday
3. The Time Zone #3 specific that the card will use Time Set #4 on Sunday, Tuesday, Thursday,
Saturday
and Holiday (No Access at all) and Time Set 1 on Monday, Wednesday and Saturday
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
4.1.10 Holiday
User can key in all the holidays at the beginning of the year or after the installation of this system so
that this system can determine holidays and give the correct attendance report. This system allows
the operator to define up to 50 days of holiday. After key in all the holidays, Edit the new settings and
then Close this window.
User can set the year and months of the holidays by clicking on the arrow keys. High light the day of
holiday at the below listed screen and key in the description. Press Ok to store the setting.
4.1.11 Access Level
This menu determines the authority given to the access of each door/floor. Different levels can be
defined so that different cards with different authority can access to specific area/s. The default level
© <2007-2010> .. . Jantech Technology Sdn Bhd
32
Menu Items
000 will deny access to all doors whereas level 001 permits the 24 hours access to all doors.
Accessibility function will allow the user to maintain and control a card user access privileges for each
door installed. With this function, you can control whether a person can access to certain door or at
what time he/she can access the door. The user is required to assign an unique access number and
followed by a meaningful description.
For a better control, the user must assign a door access time zone for certain access level, Firstly, the
user is required to select the desire access level, the software application will automatically display all
doors setting of the selected access level on the screen. The user can configure an individual door
setting by placing the mouse pointer at the record and then double click on it. The time zone selection
pop up screen will appear. At this point, the user can select the time zone set and assign to it to the
door accordingly. If the user decided not to permit an access at this door for a particular access level,
then the user is recommended to choose NO Free Time Zone.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Action Button
========
1. Insert
Insert the user definable record into system table
2. Modify
Modify the previously saved record
3. Delete
Remove the unwanted record information from system table
4. Close
To close the door access area form and return to the main screen.
4.1.12 Shift Setting
This is where you define the working hour shift where mainly used in time attendance reports. Every
© <2007-2010> .. . Jantech Technology Sdn Bhd
34
Menu Items
organisation member can have the different working hour as long as the working hour is predefined
here. They can also have the same scheduled time by using the same working hour set. The operator
can define different working hour for different day.
By comparing the capture card reading time with time defined here, the system will automatic
calculate for the overtime, early out, late in and etc for the install card holder.
The OT Claims field is use to determine whether the selected work shift is qualified for over time
processing or not. A Yes setting will trigger an overtime calculation.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Adding A New Shift Data
To add a new job title, click on the Add button. At the Add Shift Data screen, enter the Tag Name,
and the Description of the job title. Click OK to add the job title or Cancel to discard the actions.
Editing An Existing Shift Data
To change the Shift Data description, click the Edit button. The form below will be shown and the
description can, now, be changed.
Deleting An Existing Shift Data
To delete an existing Shift Data, click the Delete button. At the confirmation dialog below, click Yes.
4.1.13 Department Setting
User can key in all department available in their organisation here. The database here is used to
defined the department of the organisation member.
Below will show the process of adding, deleting or editing the database here.
© <2007-2010> .. . Jantech Technology Sdn Bhd
36
Menu Items
Adding A New Depatment dB
To add a new department, click on the Add button. At the Add Department Record screen, enter the
Tag Name,
and the Description of the department. Click OK to add the department or Cancel to discard the
actions.
Editing An Existing Depatment dB
To change the department description, click the Edit button. The form below will be shown and the
description can, now, be changed.
Deleting An Existing Depatment dB
To delete an existing department, click the Delete button. At the confirmation dialog below, click Yes.
4.1.14 Job Title Setting
This button allows you to enter different job titles available in your company. The job title is then
selectable in the card database
Upon clicking the Job Title dB, the following screen will be shown.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Adding A New Job Title dB
To add a new job title, click on the Add button. At the Add Job Record screen, enter the Tag Name,
and the Description of the job title. Click OK to add the job title or Cancel to discard the actions.
Editing An Existing Job Title dB
To change the job title description, click the Edit button. The form below will be shown and the
description can, now, be changed.
Deleting An Existing Job Title dB
To delete an existing job title, click the Delete button. At the confirmation dialog below, click Yes.
© <2007-2010> .. . Jantech Technology Sdn Bhd
38
Menu Items
4.1.15 Card User DB
This window allow you to manage the card holder database by inputting or inter-relate the card holder
with department, job title or shift data. User can add the new card holder by key in the card number
printed on the proximity card. The staff number, card holder name, department and job title are fields
that are use for reporting. The card holder's photo can be captured into card holder database from
previous scanned photo. This is useful for visual verification purpose.
Please note that the photo must be in bmp format and with attribute of 100x100pixel.
Upon clicking the Insert button, the following form will be shown.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Data Fields Information
===============
Card No
- the 6 digit number printed on access card, which is the card ID.
Staff No
- you are able to key in you're your company staff number, which may use for report
filtering.
Name
- the name of the card holder.
Department - this field selects the department that was keyed in the Depart DB, it defined the
department card holder belongs to.
Job Title
- this field selects the job title that was keyed in the Job Title DB, it defined the job title of
the individual card holder.
Access level - the door access define the accessibility of the card holder to all doors.
Active Flag - this field blocks or unblocks this card. 'No' means the card is blocked, the card cannot be
used to access the door until
this flag is being enable.
Expiry Date - this field identifies the expire date of this card, together with start date, it defined the
period that this card can be used
Shift code - this time attendance shift settings defined the working hours of the card holder, mainly
used for attendance reports.
Pin mode - this field to set card + pin mode of a card user. A 'Yes' is to activate a card+pin mode
and 'No' is to disable the function.
Antipassback - this field to set antipassback mode of a card user. A 'Yes' is to activate the function
mode and 'No' is to disable.
© <2007-2010> .. . Jantech Technology Sdn Bhd
40
Menu Items
4.1.16 View Attendance
This screen will display the most recent posted time attendance records.
As seen in the above, this screen will display the attendance report in 2 colors, black represent the
staff that attence to works whereas the red represent the staff that offended, it can be absent, late or
etc...
At the lower part of the screen, there are
1) Attendance Data
The highlighted staff's clocking information will be show here. system will calculate the work hour of
the day, overtime and lunch time information
2) Attendance Flag
The highlighted staff's attendance status will be show here. early in, late in, early out and other status
will be shown with the tick in the small box.
3) Extra Info
This is to show the highlighted staff's additional information.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
Command Actions
To process time attendance data
To process time attendance data, click on the POST button. At the attendance posting screen, select a
require process start date and end date.
Beside that, system user require to specify the attendance records is to be fetch from In-Reader or In
& Out-Reader. When you select In- Reader only , the posting process will locate first Valid In record
from In-reader as IN record and Last in from In-Reader as OUT.
On the otherhand, if you select In & Out Reader selection, posting process will locate first Valid In
from In-Reader as IN and Last Valid Out record from Out-Reader as OUT.
Click OK to start the posting process or Cancel to discard the actions.
To Clear posted time attendance records.
To initialize and delete all time attendance records, system user can simply click at CLEAR commands
to begin clearing process. A confirmation dialog screen will be prompt. He/She must choose a 'Yes'
selection to confirm record deletion and 'No' selection for discard the operation.
Attendance Record Editing
© <2007-2010> .. . Jantech Technology Sdn Bhd
42
Menu Items
J@NTECH access control software come with a time attendance record editing function for authorized
system user to amend a staff attendance record.
System user is allow to modify a staff attendance records for their clock in time, clock out time, lunch
in time, lunch out time as well as inputting a remark statement to indicate the reason of modification.
4.1.17 Attendance Report
J@NTECH access control system come with a non-overnight time attendance features. It allow system
user to generate various time attendance reports.
The supported reports are as:(1) Daily Summary
(2) Absentee Listing
(3) Early In Listing
(4) Ealry Out Listing
(5) Late In Listing
(6) Late Out Listing
(7) InComplete Listing
(8) Over time Listing
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
The system user can filter the attendance data either by date, time or card no.
REMARKS
System user require to perform a time attendance posting process before he/she can
generate the attendance reports.
© <2007-2010> .. . Jantech Technology Sdn Bhd
44
Menu Items
4.1.18 Export Attendance Data
J@NTECH system software comes with flexible and powerful data exporting engine. It is useful for 3rd
party data integration.
This system tool provide an interface to save the posted time attendance record onto MS-EXCEL
format or delimiter ASCII text file.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
System user can select the require export fields, field positioning, date format, delimiter as well as
record filtering date.
REMARKS
System user require to perform a time attendance posting process before he/she can
export an attendance records.
4.1.19 View Event Log
This command action allow the system user to open the saved log file and preview it.
© <2007-2010> .. . Jantech Technology Sdn Bhd
46
Menu Items
4.1.20 Transaction Report
This system command allow system user to generate transaction event listing. J@NTECH system event
reporting comes with various report filtering option. Which are:=
The supported filters are:(1) Date
(2) Time
(3) Card number
(4) Department
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
A 'Preview' button will start the report generation. A 'Close' button is to return the screen control back
to the main menu.
A softcopy report will be displayed at computer system for system user to review. Once system user
has confirmed on the report contents, he/she can select a print button to generate a hardcopy report.
© <2007-2010> .. . Jantech Technology Sdn Bhd
48
Menu Items
4.1.21 Export Transaction Data
J@NTECH system software comes with flexible and powerful data exporting engine. It is useful for 3rd
party data integration.
This system tool provide an interface to save the transaction event record onto MS-EXCEL format or
delimiter ASCII text file.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
System user can select the require export fields, field positioning, date format, delimiter as well as
record filtering date.
4.1.22 Card User Report
This command action allow system user to generate a listing of installed card holder information.
System user is allow to filter the records by card number.
© <2007-2010> .. . Jantech Technology Sdn Bhd
50
Menu Items
The listed information consist of :=
(1) Card number
(2) Staff number
(3) Staff name
(4) Department code
(5) Job Title code
(6) Shift code
(7) Access level
(8) Antipassback Flag
(9) Card Expiry Date
(10) Active Flag
(11) Access Pin number
4.1.23 Reindex Database
Reindex Database gives the operator options of update the index files. It is generally use for
maintaining and correcting the damaged files.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
4.1.24 Backup & Restore
There are basically 2 types of files that can be backup, ie : System Files (which contains the software
settings, card user lists, etc) and the Transaction Files (which is the transaction log files).
Users are advised to perform the backup of all their files, be it System Files or Transactions Files
monthly. This can be done by going into the backup window, click on Add File To Back Up List and
choose type of files to be backup. Then click on the icon Create Back Up Archive, the window will
prompt you to locate the back up file.
To backup
Step 1.
Click Add Item To Backup List button to select the backup file.
Step 2.
Please specify what type of files to be backup.
Step 3.
© <2007-2010> .. . Jantech Technology Sdn Bhd
52
Menu Items
Click Backup button to start data backing process by specifying the destination of the backup process.
The backup function will compress and merge multiple data file into a single filename compress file.
Step 4.
After the system successfully back up, click 'OK'
To restore
After backing-up the files, and, for some reason, the files might need to be restored. To restore files,
go to the Restore Tab.
Step 1.
Select the previously backup back files.
Select the backup file to be restored. Notice that the Content list box is now filled with the files from
the backup file.
Step 2.
Select Restore path setting for the data restore process. If you are wish to restore other folder then
the runtime folder, please input at the pathname edit box,
Step 3.
Press Restore Backup File button to begin data restoring process. Once you have completed the
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
restoring process, Please re index system database, this is to ensure that all database indexes are up
to date.
4.2
Controller List
Click on this, screen that display the total door available in the system will be display as below,
All the doors and their configuration will be shown. Due the system can support 4 buses, system
adminstrator can choose which ever bus they want to view. System will only display bus by bus. Some
basic action command can be perform through this screen.
(1)
(2)
(3)
(4)
(5)
(6)
Send setting to Panel - Send PC database setting to control panel
Get setting from Panel - Retrieve setting from control panel
Pulse Door open - Remote pulse open a door
Security ON - Enable security mode of a control panel
Security OFF - Disable security mode of a control panel
Cold Start - Reset control panel setting back to factory default.
© <2007-2010> .. . Jantech Technology Sdn Bhd
54
Menu Items
4.3
Card Holder List
This screen will list out all the card holder records inside the system.
The card holder listing screen equipped with various operating function for managing control panel
card operation. The supported card operations are:=
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
Insert Card - Insert new card user information onto control panel
Remove Card - Delete unwanted card user information from control panel
Clear AntiPB - Clear card user information antipassback flag
Block Card - Suspend card user information
Unblock Card - Reset card blocking status
Enable Pin - Activate card pin feature
Disable Pin - Deactivate card pin feature
Enable AntiPB - Activate card user antipassback function
Disable AntiPB - Deactivate card user antipassback function
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
4.4
Transaction List
This screen will display all the transaction events which include user command and physical door
events of J@NTECH access control system.
The displayed information consist of event date, event time, card no, card holder name, location,
transaction code, transaction description and control panel physical address.
This lastest transaction is a FIFO message queue. It keeps up to 500 records, the oldest record
information will be replaced with new transaction record in the event of message queue is full.
In additional, J@NTECH software system come with an online card user photo popup display. It allow
system user to have visual verification on card user swipe transactions. Detail information of card
swiped transaction will be listed, if this command action is activated.
© <2007-2010> .. . Jantech Technology Sdn Bhd
56
Menu Items
Beside the card user photo popup function, J@NTECH access control system allow system user to
enrol card record in a quicker way.
© <2007-2010> ... Jantech Technology Sdn Bhd
J@NTECH Access Control System
5
Computer Specification
Software
Operating System Processor
Monitor resolution Minimum RAM
J@NTECH access
control system
Windows 2000, NT, Pentium IV 1 Ghz
XP
800 X 600
256 MB
The above listed is the min. specification of running J@NTECH access control system.
© <2007-2010> .. . Jantech Technology Sdn Bhd
THANK YOU