SmartPSSLite - VideoIntercom Manual - Eng
SmartPSSLite - VideoIntercom Manual - Eng
Solution
User's Manual
V1.1.0
Foreword
General
This manual introduces the functions and operations of the video intercom solution of the
SmartPSS Lite (hereinafter referred to as "the Platform"). Read carefully before using the platform,
and keep the manual safe for future reference.
Safety Instructions
Revision History
I
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their
face, audio, fingerprints, and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Table of Contents
Foreword.............................................................................................................................................................. I
1 Person Management....................................................................................................................................... 1
1.1 Adding Company................................................................................................................................... 1
1.2 Adding Person........................................................................................................................................1
1.2.1 Adding Departments...................................................................................................................1
1.2.2 Setting Card Type........................................................................................................................ 2
1.2.3 Adding Personnel One by One................................................................................................... 3
1.2.4 Adding Personnel in Batches......................................................................................................5
1.2.5 Other Operations.........................................................................................................................6
1.3 Person Collection................................................................................................................................. 11
2 Permission Configuration............................................................................................................................. 14
2.1 Adding Permission Areas.................................................................................................................... 14
2.2 Assigning Permissions.........................................................................................................................15
2.3 Viewing Authorization Progress........................................................................................................ 16
3 Intercom Configuration.................................................................................................................................18
3.1 Building Management.........................................................................................................................18
3.2 Dial Management................................................................................................................................ 20
3.3 Configuring Unlocking Through Password....................................................................................... 23
3.4 Call Group.............................................................................................................................................25
3.5 Information Release............................................................................................................................ 26
4 Intercom Management..................................................................................................................................28
5 Intercom Records...........................................................................................................................................32
Appendix 1 Security Recommendation........................................................................................................ 33
III
1 Person Management
1.1 Adding Company
Procedure
Step 1 Select Person > Company.
Step 2 Configure the company information.
Step 3 Upload the company logo, and then click OK.
Figure 1-1 Add company
1
Figure 1-2 Add departments
Related Operations
● Click to delete the department.
● Click to rename the department.
2
1.2.3 Adding Personnel One by One
Procedure
Step 1 Select Person > Person Management, and then click Add.
Step 2 Enter the basic information of personnel.
1. Click Basic Info tab.
2. Add the basic information of personnel.
3. Click Take Snapshot or Upload Picture to set the profile picture.
4. Configure identity verifications.
● Set password.
Click Add to add the password.
For second-generation devices, set the personal password; while for non-
second-generation devices, set the card password.
The new password must consist of 6–8 digits.
● Configure the cards.
a. Click to select Device or Card Issuer as the card reader, and then click OK.
If the card type is set as DESFire, the card reader here you can select must
support DESFire card to read and write.
b. Click Add to add cards, and then click OK.
If the card type is set as DESFire, place the card on the device for 5 seconds, and
then the device will write the card number.
c. Operate the cards.
Only 8-digit card number in hexadecimal mode can display the QR code of
the card.
● Configure the fingerprints.
3
Figure 1-4 Add basic information
Step 3 Click More Info tab to add more information of the personnel.
4
Figure 1-5 Add more information
If the card type is set as DESFire, the card reader here you can select must support
DESFire card to read and write.
Step 4 Set the department, the validity time, and the expiration time of cards.
Step 5 Click Read Card No..
5
Step 6 Place cards on the card issuer or the card reader.
The card numbers will be read or filled in automatically.
Step 7 Click OK.
Figure 1-6 Add personnel in batches
If the card type is set as DESFire, the card reader here you can select must support
DESFire card to read and write.
6
2. According to the order list, put the cards of the corresponding personnel on the
card swiping area in sequence, and then the system will automatically read and fill
in the card number.
Figure 1-7 Read automatically
● Enter manually
1. Select the personnel in card list, and then enter the corresponding card number.
2. Press the Enter key.
7
Figure 1-8 Enter card number manually
8
Step 2 Select a device, and then click OK.
You can extract users of All , Succeed or failed from the drop-down list next to Extract.
Step 3 Select personnel, and then click Extract to extract the users on the device to the
platform.
Figure 1-9 Extract users
Results
The users that are successfully extracted from devices will be displayed on the Person
Management page.
9
1.2.5.4 Exporting Personnel Information
Select Person > Person Management, select personnel, and then click Export to export
personnel information to your computer.
You can also view the number of each verification method in the list.
Figure 1-12 Display in list
Procedure
Step 1 Select Person > Person Management.
10
Step 2 Select personnel, and then select Batch Update > Batch Edit to edit department and
effective time in batches.
Figure 1-14 Batch edit
Procedure
Step 1 Select Person > Person Collection.
Step 2 Enable Subscribe. If you have added new users or modified user's information on the
access control device, the user will be automatically pushed to the management
platform.
Figure 1-15 Subscribe users
11
Figure 1-16 Person ID conflict
12
Figure 1-18 Person ID and card number conflict
Related Operations
● Synchronize users in batches: Select users, and then click Sync , the selected users will be
automatically synchronized to Person Management page.
● Automatically synchronize users: Enable Auto Sync , if users that are pushed to the platform do
not have the same person ID or same card with any existing users in the Person Management
page, they will be automatically synchronized to Person Management page.
● Refresh: Refresh users with conflict information.
13
2 Permission Configuration
2.1 Adding Permission Areas
An area is a collection of door access permissions. Create an area, and then link users to the area so
that they can gain access permissions set for the area.
Procedure
Step 1 Select Permission > Area Config.
Step 2 Click to add a permission area.
Related Operations
● : Delete the permission area.
● : Modify the area information.
14
2.2 Assigning Permissions
The method of configuring permissions for department and for personnel is similar, and here takes
department as an example.
Procedure
Step 1 Select Access Control Config > Permission Settings.
Step 2 Click to add new permission rules.
● Weekly Plan/Holiday Plan: Select plans to be sent to the device, and then personnel
can open the door during the selected plans. For more information about configuring
plans, see SmartPSS Lite Access Control Solution User's Manual.
● Select Data to be Sent: The permission data include card, fingerprint, password, face,
and palm vein, which can be sent to the device only when they are selected. After that,
personnel can open the door through these verifications.
Step 3 Enter the name of the permission rule, select the time plan and unlock methods.
Step 4 In the Person Info area, click or Add to select personnel, and then click OK.
You can select personnel on the department or individual users.
● Department: All personnel in the department will be assigned with access
permissions.
● Persons: Only selected users will be assigned with access permissions.
15
When you want to assign permissions to a new person or change access permissions
for an existing person, you can simply add the user in an existing department or link
them with an existing role, they will be automatically assigned access permissions set
for the department or role.
Figure 2-3 Add users
Step 5 In the Area Info , click or Add to select an area, and then click OK.
16
Step 3 (Optional) If authorization failed, You can click to view details on the failed
authorization tasks and resend.
17
3 Intercom Configuration
You can manage organizations and phone numbers, configure call settings and release
information.
Click Devices on the home page, and then add video intercom devices to the Platform. For details,
see SmartPSS Lite General User's Manual.
● Enabling the Building or Unit here, you can create buildings or units in Building Management
of video intercom.
● The compound organization can be set as Building , or Building and Unit.
● If you want to change the compound organization, clear the organizations first.
Procedure
Step 1 Select Intercom Config > Building Management.
Step 2 Add buildings under the compound level.
18
Figure 3-2 Add units
Results
The organization is created.
● Organization: Displays the exact organization level of the room. For example, 01#01#302 means
building 01, unit 01 and room 302.
● Sending Status: If an unlock password is added for a room, the password will be sent to the VTO
and VTH automatically, and the sending status will be displayed.
19
● : Synchronize the passwords to the devices.
Figure 3-4 Created organization
Related Operations
● Create organizations in batches.
Only when no organizations are created, you can add organizations in batches.
1. Select the root node, and then click Batch Add.
Figure 3-5 Add organizations in batches
20
Procedure
Step 1 Click Intercom Config > Dial Management.
Step 2 Add registration number for VTH.
1. Click Add.
2. Select a VTH from the drop-down list.
3. Select the organization.
If you have added units to the organization, you can only select a unit.
4. Select a room from the list, and then enter the number of the extension if there are
more than one VTH in the room.
5. Click Add.
The registration number is automatically generated based on the number of building,
unit, room and extension (if any). For example, 11#01#11#5 means building 11, unit
01, room 11 and extension No.5.
Figure 3-6 Add registration number for VTH
If you have added units in the organization, you can only select a unit.
4. Enter a 2-digit number.
The 2-digit number must be same to the last two digits of the number of VTO. For
example, if the number of VTO is 8055, the 2-digit number must be 55.
5. Click Add.
The registration number is automatically generated. For example, 1#01#8055 means
building 1, unit 01 and the number of VTO is 8055.
21
Figure 3-7 Add registration number for VTO
Related Operations
● Import devices through SmartPSS Lite.
1. Click Export to export devices from the platform.
2. Save the exported file to your local computer.
3. Log in to the another platform, click Import > Import SmartPSS Lite to upload the
exported file to another platform.
● Import devices through ConfigTool.
1. Select Import > Create ConfigTool Template to download a template.
2. Fill the information of devices in the template, and then save it to your local computer.
3. Click Import ConfigTool, and then import the file to the platform.
22
3.3 Configuring Unlocking Through Password
If the VTO is wired to door locks, you can control access by setting unlock password.
Prerequisites
● Rooms were added. For details, see"3.1 Building Management".
● VTH and VTO were registered. For details, see "3.1 Building Management".
Procedure
Step 1 Click Intercom Config > Building Management.
Step 2 Select a room, and then click to add a unlock password.
1. Click Add.
2. Enter and confirm the password.
3. Click OK.
23
Figure 3-9 Configure unlock password
The password will be sent to the VTO and VTH automatically, and the sending status will
be displayed.
Step 3 You can click to manually send the unlock passwords that were set to the devices.
Results
Enter room number + unlock password in the VTO, and door will be unlocked. For example, if the
room number is 11, and the unlock password is set as 888888, enter 000011888888 in the VTO to
unlock the door.
24
3.4 Call Group
The call group function groups the VTS and the manager client, and then assigns them to the
corresponding buildings, so that the buildings can call the corresponding VTS and manager client
in sequence.
Procedure
Step 1 Open the Video Intercom solution.
Step 2 Select Intercom Config > Call Group, and then click Add.
Figure 3-10 Priority manager page
Step 3 Enter the Group Name, and then select the building from the drop-down list.
Step 4 Select the manager client you need to add, click Select , and then the device displays on
the List of Selected Devices.
When no group is added to the building, the Platform will uniformly answer the call from
the device under the building; the call from the fence station can only be answered by the
Platform; the VTS cannot make calls.
25
Figure 3-11 List of selected devices
This function is only supported by the devices whose device type is VTO or VTH and whose
numbers are bound to the Platform.
Procedure
Step 1 Select Intercom Config > Information Release.
Step 2 Click Add to add the subject.
Step 3 Enter the text, and then set the Start Time.
Step 4 Select the device from the drop-down list, and then click OK.
26
Figure 3-12 Add topic
Related Operations
● Click to modify the subject.
● Click to delete the subject.
● Click to view the details of the subject.
27
4 Intercom Management
You can make video calls with VTO, fence station, VTS, villa door station, VTH and the Platform. You
can also perform remote unlock, view recent records and make quick calls.
Prerequisites
● VTH and VTO were added to the platform.
● VTH and VTO were registered. For details, see "3.1 Building Management".
Procedure
Step 1 Click Intercom Management on the home page, and then select the intercom device in
the organization tree.
● : Displays the number of doors. It means the device is connected to 2 doors. You
can also click the door to unlock the door.
28
Click to display the dial page, and then enter a number to call the
corresponding intercom device.
The dial page only supports full number calls, and the room number calls are not
supported; if you want to call VTH, you need to enter the number and the extension
number.
Figure 4-2 Dial page
29
Figure 4-3 Missed video intercom call
When there is a missed or rejected call records, you can click to call back.
Step 2 Perform operations during a video intercom calling according to actual needs.
The Platform automatically records the switch status, and it will take effect in the next
intercom.
30
Figure 4-4 Video intercom page
Parameter Description
Open the door of the device.
After enabling, every time the device connects to the video intercom, the
Auto Capture Platform will capture a snapshot of the call and save it to the video
intercom record.
After enabling, every time the device connects to the video intercom, the
Platform will record the call video and save it to the video intercom record.
Auto Recording
Step 3 Click on the upper-right corner to close the video intercom page and terminate the
call.
Related Operations
● Click on the call record page to view the pictures and videos saved during the video
intercom call.
● Call event, access event and alarm events will be recorded in real time in the record list on the
bottom of the page.
The record list only displays the latest 100 call records, access control records and alarm records.
Click History to go to the Intercom Records page to view all records.
● Always Open: All doors remain open.
● Restore: Restore door status back to normal.
31
5 Intercom Records
You can view and export call records, access control records or alarm events.
Procedure
Step 1 Click Intercom Records.
Step 2 Select the type of records.
● Intercom records
● Access control records
● Alarm event
Step 3 Select the device in the organization tree, and then set the time and status.
Step 4 Click Search.
Figure 5-1 View call records
Step 5 (Optional) You can click Export to export all the records to your computer.
32
Appendix 1 Security Recommendation
1. Account Management
a. Use Strong Passwords
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols.
● Do not contain the account name or the account name in reverse order.
33
The network should be isolated by partitioning the video monitoring network and the office
network on the switch and router to different VLANs. This prevents attackers from using the
office network to launch Pivoting attacks on the video monitoring network.
4. Security Auditing
a. Check Online Users
It is recommended to check online users irregularly to identify whether there are illegal users
logging in.
b. View the Platform Log
By viewing the log, you can get the IP information of the attempt to log in to the platform
and the key operation information of the logged-in user.
5. Physical Protection
It is suggested to perform physical protection to the device that has installed the platform. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware.
6. Perimeter Security
It is suggested to deploy perimeter security products and take necessary measures such as
authorized access, access control, and intrusion prevention to protect the software platform
security.
34