- 18 Feb 2025
- Print
- DarkLight
- PDF
Door-opening Configuration
- Updated on 18 Feb 2025
- Print
- DarkLight
- PDF
Unlock By Public PIN
There are two types of PIN codes for door access: public and private. A private PIN is unique to each user, while the public one is shared by residents in the same building or complex. You can create and modify both the public and private PIN codes.
To set up the public PIN code, go to Access Control > PIN Setting > Public PIN interface.
PIN Code: Set the 4-8 digits code without 9 as the start.
You can also set it up on the Setting > Security > Public PIN screen.
User-specific Access Methods
The private PIN code, RF card, Bkey, and facial recognition setting should be assigned to a particular user for door opening.
When adding a user, you can also customize settings such as defining the door access schedule to determine when the code is valid and specifying which relay to open. You can add up to 50,000 users.
To add a user, go to Directory > User interface and Click +Add. You can also add a user on the device Setting > User screen.
User ID: The unique identification number assigned to the user.
Name: The name of this user.
Unlock by Private PIN Code
On the Directory > User > +Add interface, find the Private PIN section.
Code: Set a 2-8 digit PIN code solely for the use of this user.
You can set the PIN mode on the Access Control > PIN Setting > Private PIN interface.
Display Mode:
Keyboard: Display the keyboard on the PIN screen.
QR Code: Display the QR code scanning box on the PIN screen.
Authorization PIN:
PIN: Solely enter the PIN code for door access.
APT#+PIN: Enter the Apartment Number first before entering the PIN code for the door access. Apartment Number can only be applicable when the device is connected to the Akuvox SmartPlus.
Unlock by RF Card/Bkey
On the Directory > User > +Add interface, find the RF Card & Bkey section.
Code: The card code or Bkey code the device reads.
Note
Click here to view the detailed steps of configuring Bkey.
RF cards operating at 13.56 MHz and 125 KHz frequencies are compatible with the device for access.
Each user can have a maximum of 5 cards added.
The device allows to add 50,000 users.
RF Card Code Format
To integrate the RF card door access with the third-party intercom system, you need to match the RF card code format with the one used by the third-party system.
To set it up, go to Access Control > Card Setting > RFID interface.
IC/ID Card Display Mode: Select the card number format from the provided options.
ID Card Order: Set the ID card reading mode between Normal and Reversed.
Unlock by Facial Recognition
On the Directory > User > +Add interface, find the Face section.
Photo: Max File Size: 2M; Format: .jpg/.png/.bmp.
Facial Recognition Settings
The door phone allows you to adjust facial recognition accuracy, recognition intervals, and more to enhance user experience.
Set it up on the Access Control > Face Settings interface.
Facial Recognition:
Disabled: Turn off the facial recognition function.
Auto: Display the facial recognition box on the home screen. The device starts recognition when it detects faces.
Manual: Display a prompt “Press to start face recognition.” Users need to tap on the home screen to start recognition.
Offline Learning Enabled: Facial recognition accuracy improves as the number of facial recognition increases.
Recognize Option: Determine how strict the facial recognition system is in comparing a person’s face with uploaded face data. Each level allows a different degree of difference or face covering (excluding the mouth area) to pass the recognition.
- Low: Allow slight differences from the uploaded face data, with little face coverage.
- Highest: Require the face to be identical to the uploaded one, with minimal or no covering.
- The other two levels are in between.
Antispoofing Option: Set how strict the system is in preventing fake faces.
- Close: Disable the facial anti-spoofing function. Facial verification can be passed using non-living substitutes for an authorized person's face, such as a photo.
- Highest: The system cannot be fooled by any non-living substitutes for an authorized person's face.
- The other three levels are in between.
Pose Detection Option: Set the pose detection level from Close, Low, Normal, and High. The higher the level is, the more accurate the detection is. Users will be prompted to “please face the camera directly” when they do not face the camera.
Facial Recognition Interval(Sec): Adjust the time interval between each facial recognition attempt, ranging from 1 to 8 seconds.
Access Setting
You can customize access settings such as defining the door access schedule to determine when the code is valid and specifying which relay to open.
On the Directory > User > +Add interface, scroll to the Access Setting section.
Allow To Open: Specify the relay that can be unlocked by the user’s credentials.
Web Relay: Specify the ID of web relay action commands that you’ve configured on the Web Relay interface. A default value of 0 indicates that the web relay will not be triggered.
Building: Specify the building the user lives in.
Floor No.: Specify the floor(s) that are accessible to the user via the elevator.
Room: Enter the user’s room number.
Schedule: Grant the user access to open designated doors during preset periods by relocating the desired schedule(s) from the left box to the right one. Besides custom schedules, there are 2 default options:
Always: Allows door opening without limitations on door open counts during the valid period.
Never: Prohibits door opening.
Access Authentication
You can set up multiple access authentication modes, and set up authentication security as needed.
Set it up on the Settings> Key/Display > Access Authentication Mode interface. This feature applies to the Multi-factor Authentication theme.
Authentication Mode: Determine how to unlock the door using different methods. Please note that the order of the two-factor authentication matters.
Any Method: Allows all access methods.
Face + PIN: Scan the face first, then enter the PIN code.
Face + Card: Scan the face first, then swipe the RF card.
Card + PIN: Swipe the RF card first, then enter the PIN code.
Inactivity (Sec): Set the authentication timeout for the second authentication. For example, in Face+PIN authentication, if you set the authentication timeout as 10 seconds, then users have to enter the PIN code in ten seconds after they go through the face recognition, otherwise, the screen will return to the home screen.
Blocked Duration (Sec): Set the block time for the first authentication. For example, if you set the number of attempts as 3, and users fail to pass the second authentication three times, then users will be temporarily blocked from the first authentication according to the block time.
Number of Attempts: The number of attempts users are allowed for the second authentication.
To set up authentication mode on the device, go to Setting > Security > Authentication Mode.
Import/Export User Data
The door phone supports User Data of access control to be shared among Akuvox door phones through import and export while you can also export the facial data out of the door phone and then import it to a third-party device.
Click here to view how to import and export user data between Akuvox door phones.
Navigate to the web Directory > User > Import/Export User interface.
Note
The imported/exported file is in TGZ format.
Unlock by Bluetooth
The Bluetooth-enabled SmartPlus app enables users to enter the door hands-free. They can either open the door with the app in their pockets or wave their phones towards the door phone as they get closer to the door.
Set it up on the web Access Control > BLE interface.
RSSI Threshold: Set the received signal strength. Higher values indicate stronger signal strength, making it easier to receive the Bluetooth signal.
Bkey Trigger Signal: There are three ranges that determine the Bkey trigger distance.
Unlock Interval For Same User(Sec): Set the time interval between consecutive Bluetooth door access attempts for the same user.
Unlock Interval For Different Users(Sec): Set the time interval between consecutive Bluetooth door access attempts for different users.
Note
To learn about detailed configuration steps of different Bluetooth-based access methods, you can click the following articles.
Unlock by HTTP Command
You can unlock the door remotely without approaching the device physically for door entry by typing in the created HTTP command (URL) on the web browser to trigger the relay when you are not available by the door for door entry.
Set it up on the web Access Control > Relay > Open Relay via HTTP interface.
Session Check: When enabled, the HTTP unlock requires logging into the device’s web interface. Or, the door opening may fail.
Username: Set a username for authentication in HTTP command URLs.
Password: Set a password for authentication in HTTP command URLs.
Tip
Here is an HTTP command URL example:
Unlock by DTMF Code
Set it up on the Access Control > Relay interface.
DTMF Mode: Set the number of digits for the DTMF code.
1 Digit DTMF: Define the 1-digit DTMF code within the range (0-9 and *,#) when the DTMF Mode is set to 1-digit.
2-4 Digit DTMF: Set the DTMF code based on the number of digits selected in the DTMF Mode.
DTMF Data Transmission
In order to achieve door access via DTMF code or some other applications, you are required to properly configure DTMF in order to establish a DTMF-based data transmission between the door phone and other intercom devices for third-party integration.
DTMF Type Differences:
Inband | DTMF signals are transmitted within the same audio channel as voice data. Simple implementation but signal distortion may occur with highly compressed codecs (e.g., G.729). |
RFC2833 | Transmits DTMF as special event packets over RTP (Real-Time Transport Protocol), known as out-of-band transmission. Reliable and unaffected by codecs. |
Info | Sends DTMF signals via SIP (Session Initiation Protocol) signaling channel. Separate from voice transmission, ensuring audio quality. |
Info+Inband | Combines Info and Inband methods. |
Info+RFC2833 | Combines both Info and RFC2833 methods. |
Info+Inband+RFC2833 | All three methods are used simultaneously. |
Set it up on the Account > Advanced > DTMF interface.
Type: Select from the available options based on the specific DTMF transmission type of the third-party device to be matched with as the party for receiving signal data.
How to Notify DTMF: Select Disabled, DTMF, DTMF-Relay, or Telephone-Event according to the specific type adopted by the third-party device. You are required to set it up only when the third-party device to be matched with adopts Info mode.
Payload: Set the payload according to the specific data transmission payload agreed on between the sender and receiver during the data transmission.
Note
To open the door with DTMF, the intercom devices that send and receive the unlock command must use the same mode and code. Otherwise, the DTMF unlock may fail. See here for the detailed DTMF configuration steps.
DTMF Whitelist
To secure door access via DTMF codes, you can set up the DTMF whitelist on the device web Access Control > Relay > Open Relay Via DTMF interface so that only the caller numbers you designated in the door phone can use the DTMF code to gain door access.
Assigned The Authority For: Specify the contacts authorized to open doors via DTMF:
- None: No numbers can unlock doors using DTMF.
- Only Contacts List: Only numbers added to the door phone's contact list can unlock via DTMF.
- All Numbers: Any numbers can unlock using DTMF.
Unlock by QR Code
You can use a QR code to unlock the door with the door phone. This method requires the Akuvox SmartPlus cloud service. You have to activate this feature before using it.
Set it up on the Access Control > Relay > Open Relay via QR Code interface.
Note
The function should work with the Akuvox SmartPlus cloud. Please click here to view the configuration details.
Unlock by Exit Button
When users need to open the door from inside by pressing the Exit button, you need to set up the Input terminal that matches the Exit button to activate the relay for the door access.
Click here to watch the instruction video.
Set it up on the web Access Control > Input > Input interface.
Enabled: To use a specific input interface.
Trigger Electrical Level: Set the input interface to trigger at low or high electrical level.
Action To Execute: Set the desired actions that occur when the specific Input interface is triggered.
FTP: Send a screenshot to the preconfigured FTP server.
Email: Send a screenshot to the preconfigured Email address.
SIP Call: Call the preset number upon trigger.
HTTP: When triggered, the HTTP message can be captured and displayed in the corresponding packets. To utilize this feature, enable the HTTP server and enter the message content in the designated box below.
TFTP: Send a screenshot to the preconfigured TFTP server.
HTTP URL: Enter the HTTP message if selecting HTTP as the action to execute. The format is http://HTTP server’s IP/Message content.
Action Delay: Specify how many seconds to delay executing the preconfigured actions.
Action Delay Mode:
Unconditional Execution: The action will be carried out when the input is triggered.
Execute If Input Still Triggered: The action will be carried out when the input stays triggered. For example, if the door stays open after triggering input, an action such as an email will be sent to notify the receiver.
Execute Relay: Specify the relay to be triggered by the actions.
Alarm Door Opened: If enabled, when the door-opening time exceeds a limit, the alarm will be triggered.
Door Opened Timeout: The door-opening time limit.
Break-in Intrusion: Activate an alarm when the door is forcibly or illegally opened. Only by checking off this option can the alarm be turned off once triggered. This feature is NOT compatible with the Execute Relay feature.
Door Status: Display the status of the input signal.
Super Mode: When enabled, the administrator will be able to open the door using an RF card even when the door phone breaks down or malfunctions.
Mifare Card Encryption
The device can encrypt Mifare cards for greater security. When this feature is enabled, it reads the data in the cards’ designated sectors and blocks, not the UID.
Set it up on the Access Control > Card Setting > Mifare Card Encryption interface.
Classis:
Sector/Block: Specify the location where encrypted card data is stored. A Mifare card has 16 sectors (numbered 0 to 15), and each sector has 4 blocks (numbered 0 to 3).
Block Key: Set a password to access the data stored in the predefined sector/block.
Code Length: Select the code length between Auto and 7 Bytes to 4.
Code Order: Select the code order between Normal and Reversed.
DESFire:
App ID: A 6-digit hexadecimal number
File ID: The ID of the encrypted file of the app, which can be a number from 0 to 31.
Crypto: The encryption method, either AES or DES.
Key: The file key.
Key Index: The index number for the key, which can be a number from 0 to 11.
Plus: You can set up three choices. This means you can use three types of Mifare Plus cards. When swiping a card, as long as one of the choices matches its SL key, the card code in the block you specified will be output.
Block: Specify the block(s) to be read.
SL3: The key number within 32 bits.
Contactless Smart Card
You can select an NFC card or Felica card for contactless access. For example, if you enable both NFC and Felica cards, you can gain contactless entry with the two types of cards.
Enable the use of NFC and/or Felica cards on the Access Control > Card Setting > Contactless Smart Card interface.