Comelit IPTHPAN02FA Manuale utente

Temperature Measurement &
Face Recognition Terminal
Art. IPTHPAN02FA
Please read this manual thoroughly before use and keep it for future
reference

Notes on Safet
This product is intended to be supplied by a Listed Power Unit, marked with
'Limited Power Source', 'LPS' on unit, output rated minimum 12V/1 A, no
more than 2000m altitude of operation and Tma=60 Deg.C.
Do not attempt to disassemble the device; in order to prevent electric shock, do
not remove screws or covers.
There are no user-serviceable parts inside. Please contact the nearest service
center as soon as possible if there is any failure.
Avoid from incorrect operation, shock vibration, heavy pressing which can cause
damage to product.
Do not use corrosive detergent to clean main body of the camera. If necessary,
please use soft dry cloth to wipe dirt; for hard contamination, use neutral
detergent. Any cleanser for high-grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as, sun,
as this may damage the image sensor.
Please follow the instructions to install the camera. Do not reverse the camera,
or the reversing image will be received.
Do not operate it in case temperature, humidity and power supply are beyond the
limited stipulations.
Keep away from heat sources such as radiators, heat registers, stove, etc.
Do not expose the product to the direct airflow from an air conditioner.
This manual is for using and managing the product. Wemay reserve the rights of
amending the typographical errors, inconsistencies with the latest version,
software upgrades and product improvements, interpretation and modification.
These changes will be published in the latest version without special notification.
All pictures, charts, images inthis manual are only for description and explanation
of our products. The ownerships of trademarks, logos and other intellectual
properties related to Microsoft, Apple and Google belong to the above-mentioned
companies.
This manual is suitable for face recognition network devices.

Disclaimer
With regard to the product with internet access, the use of product shall be wholly
at your own risks. Our company shall be irresponsible for abnormal operation,
privacy leakage or other damages resulting from cyber-attack, hacker attack,
virus inspection, or other internet security risks; however, our company will
provide timely technical support if necessary.
Surveillance laws vary from country to country.Check all laws in your local region
before using this product for surveillance purposes. We shall not take the
responsibility for any consequences resulting from illegal operations.
Regulatory Information
FCC Information
1.FCC compliance
The products have be tested and found in compliance with the council FCC rules
and regulations part 15 subpart B. These limits are designed to provide
reasonable protection against harmful interference. This equipment generates
uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio
communication. However, there is no guarantee that interference will not occur in
a particular installation. The user will be required to correct the interface at his
own expense in case the harmful interference occurs.
2. FCC conditions:
Operation of this product is subject the following two conditions: (1) this device
may not cause harmful interface, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
CE Information
The products have been manufactured to comply with the following
directives. EMC Directive 2014/30/EU
RoHS
The products have designed and manufactured in accordance with Directive EU
RoHS Directive 2011/65/EU and its amendment Directive EU 2015/863 on the
restriction of the use of certain hazardous substances in electrical and electronic
equipment.

2012/19/EU (WEEE directive): The Directive on waste electrical and
electronic equipment (WEEE Directive). To improve the environmental
management of WEEE, the improvement of collection, treatment and
recycling of electronics at the end of their life is essential. Therefore, the
product marked with this symbol must be disposed of in a responsible
manner.
Directive 94/62/EC: The Directive aims at the management of packaging and
packaging waste and environmental protection. The packaging and packaging waste
of the product in this manual refers to must be disposed of at designated collection
points for proper recycling and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization
and Restriction of Chemicals, which aims to ensure a high level of protection of human
health and the environment through better and earlier identification of the intrinsic
properties of chemical substances. The product in this manual refers to conforms to
the rules and regulations of REACH. For more information of REACH, please refer to
DG GROWTH or ECHA websites.

Table of Contents
1 Introduction ..........................................................................................................1
2 Network Connection.............................................................................................2
2.1LAN ……………………………………………………………………………..........2
2.1.1Access through IP-Tool................................................................................2
2.1.2Directly Access through IE...........................................................................4
2.2WAN ……………………………………………………………………….. .............5
3 Temperature Measurement & Face Recognition Configuration ............................9
3.1Temperature Measurement Settings................................................................9
3.2Face Match Configuration ..............................................................................10
3.3Face Database Management.........................................................................11
3.4Mask Detection...............................................................................................12
4 Live View.................................................................................................................14
4.1Temperature Measurement & Face Recognition View.....................................14
4.1.1Temperature Measurement Requirements.................................................14
4.1.2Temperature Measurement & Face Recognition View.................................15
4.2Live Viewvia Web..........................................................................................................16
5 Access Control Settings.....................................................................................19
5.1Door Lock Settings.........................................................................................19
5.2Wiegand Settings...........................................................................................19
5.3Tampering Alarm Settings...............................................................................20
6 Other Configurations..........................................................................................21
6.1System Settings .............................................................................................21
6.1.1Basic Information .......................................................................................21
6.1.2Date and Time ...........................................................................................21
6.1.3Local Config...............................................................................................22
6.1.4Storage ......................................................................................................22
6.2Image Configuration.......................................................................................25
6.2.1Display Configuration.................................................................................25
6.2.2Video / Audio Configuration .......................................................................27
6.2.3OSD Configuration.....................................................................................28
6.2.4Screen Brightness......................................................................................29
6.2.5White Light Control.....................................................................................29
6.2.6Face Exposure...........................................................................................30
6.3Alarm Configuration........................................................................................30
6.3.1Exception...................................................................................................30
6.3.2Micro-SD card Full .....................................................................................32
6.3.3Micro-SD card Error...................................................................................32
6.3.4IPAddress Conflict.....................................................................................33

6.3.5Cable Disconnection..................................................................................33
6.3.6Alarm In ……………………………………………………………… ...............33
6.3.7Alarm Out………. .......................................................................................34
6.4Network Configuration....................................................................................35
6.4.1TCP/IP……………......................................................................................35
6.4.2Port ………… .............................................................................................37
6.4.3Server Configuration..................................................................................37
6.4.4DDNS…………. .........................................................................................37
6.4.5RTSP..…… ................................................................................................39
6.4.6UPnP………...............................................................................................40
6.4.7Email…..….................................................................................................40
6.4.8FTP…..…… ...............................................................................................41
6.4.9HTTPS……. ...............................................................................................41
6.5Security Configuration....................................................................................43
6.5.1User Configuration.....................................................................................43
6.5.2Online User................................................................................................45
6.5.3Block and Allow Lists..................................................................................45
6.5.4Security Management ................................................................................45
6.6Maintenance Configuration ............................................................................46
6.6.1Backup and Restore ..................................................................................46
6.6.2Reboot……….............................................................................................47
6.6.3Upgrade………. .........................................................................................47
6.6.4Operation Log............................................................................................48
7 Search................................................................................................................49
7.1Image Search.................................................................................................49
7.2Video Search..................................................................................................51
7.2.1Local Video Search....................................................................................51
7.2.2Micro-SD card Video Search......................................................................52
8 Face Match Result Search.................................................................................55
Appendix Troubleshooting......................................................................................56

1 Introduction
This series of product is specially designed and developed for face recognition and
temperature measurement applications, featuring non-contract temperature
measurement, high performance and reliability, faster recognition and higher accuracy
rate. Based on deep-learning algorithm, it combines temperature measurement,
identity authorization and access control.
It can be widely used in the entrances and exits of community, schools, hospitals,
scenicareas, hotels, shopping malls, office buildings, public services and construction
sites for body temperature measurement, identity authorization and access control.
Main Features
8 inch LCD screen
High-accuracy IR wrist temperature measurement
Non-contact body temperature measurement
Human-sounding voice prompt
Real-time face mask detection
Face liveness detection technology distinguishing real faces from non-real face
spoof attacks
Highly accurate face recognition using deep learning algorithm
Stand-alone device, ready for networking
1

Connect IP-Cam via LAN or WAN. The details are as follows:
1.1
LAN
In LAN, there are two ways to access: 1. access through IP-Tool; 2. directly access
through Internet Explorer browser.
1.1.1 Access through IP-Tool
Network connection:
①Make sure the PC and the device are connected to the LAN and the IP-Tool is
installed in the PC.
②Double click the IP-Tool icon on the desktop to run this software as shown below:
③Modify the IP address. The default IP address of this camera is 192.168.1.150.
Click the information of the camera listed in the above table to show the network
information on the right hand. Modify the IP address and gateway of the camera and
make sure its network address is in the same local network segment as the computer’s.
Please modify the IP address of your device according to the practical situation.
Network
Connection

For example, the IP address of your computer is 192.168.1.4. So the IP address of the
camera shall be changed to 192.168.1.X. After modification, please enter the password
of the administrator and click the “Modify” button to modify the setting.
④Double click the IP address and then the system will pop up the IE browser to
connect IP-CAM. Follow directions to download, install and run the Active X control.
Enter the username and password in the login window to log in.
The
default Password of the administrator is admin.
The default Username
is
admin
; the
default Password
is
admin
.

The system will pop up the above-mentioned textbox to ask you to change the default
password. It is strongly recommended to change the default password for account
security. If “Do not show again” is checked, the textbox will not appear next time.
1.1.2 Directly Access through Internet Explorer
The default network settings are as shown
below: IP address: 192.168.1.150
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port:
Use the above default settings when logging in the camera for the first time. Directly
connect the camera to the computer through network cable.
①Manually set the IP address of the PC and the network segment should be as the
same as the default settings of the IP camera. Open the network and share center.
Click “Local Area Connection” to pop up the following window.
9008
Altri manuali per IPTHPAN02FA
1
Indice

















