The Horus E1-FP is an advanced facial recognition time attendance terminal developed by ZKTeco, renowned for its compact size and powerful biometric capabilities. Setting up your Horus E1-FP Facial Recognition Terminal is straightforward and ensures optimal performance for access control and time attendance applications.
The device features visible light facial recognition technology, enabling accurate identification from distances of up to 3 meters, with a ±30-degree pose angle tolerance. It also boasts high anti-spoofing capabilities, making it secure against various types of attacks, such as print, video, and 3D mask attempts.
Setting Up Your Horus E1-FP Facial Recognition Terminal
Step 01
When on home screen, select the menu button. If asked for a admin or to verify admin, select the card or password access and with the card scan close to fingerprint sensor to enter the menu, or enter 999999, press OK and input password 1435 and press OK.
Step 02
Select User management
Step 03
Start the wizard
Step 04
Select the green plus to add a new user
Step 05
Enter the user name and the clock code and select Next
Step 06
Select Next again
Step 07
A window will then show where you can select either fingerprint, card face or password. Select the fingerprint. The choose a finger and enroll the finger 3 times as instructed by scanner.
Step 08
Go back and select the card and scan the card to register.
Step 09
Go back and select the face, then enroll face as instructed by scanner
Step 10
Go back and select password, then enter the password twice and confirm / save
Horus E1-FP Enroll User
To contact Biosyn about Enrolling a User, call their sales team at the number provided on their website. Biosyn’s consultants can guide you through the setup process and explain how to configure the device for standalone or networked operations.
Biosyn’s experts specialize in optimizing device configurations for both standalone and networked environments, ensuring flawless integration. By providing step-by-step guidance through the often complex setup process, they address the specific demands of each business or application, enhancing productivity and reinforcing system security.