In the TTLock Bluetooth Access Control system, you can change the password and other unlocking methods in the following ways:


TTLock Bluetooth Access Control

Changing the Password

  1. Using the TTLock App: Open the TTLock app and make sure your phone is connected to the lock via Bluetooth. Find the "Device Management" section in the app and select your lock, then tap "Reset Password" or "Change Password". Follow the prompts to enter the current password and then set a new password. Confirm the new password and save the settings.

  2. Using the Lock Keypad: Some TTLock models allow you to change the password directly on the lock keypad. Usually, you need to enter the current password first, then enter the setting mode, and find the option to change the password. Follow the on-screen prompts to enter the new password and confirm the change.


Changing Fingerprint Unlocking

  1. Adding a New Fingerprint: Open the TTLock app and connect to the lock via Bluetooth. Enter the user management interface and select the user for whom you want to add a fingerprint. Then, follow the prompts to place your finger on the fingerprint sensor of the lock multiple times until the fingerprint is successfully added.

  2. Deleting a Fingerprint: In the TTLock app, find the fingerprint management option in the user management interface. Select the fingerprint you want to delete and click the "Delete" button to remove the fingerprint.


 Changing RFID Card Unlocking

  1. Adding an RFID Card: Open the TTLock app and connect to the lock via Bluetooth. Enter the user management interface and select the user for whom you want to add an RFID card. Then, use the card reader of the lock to read the RFID card that needs to be added. The app will prompt you to complete the addition process.

  2. Deleting an RFID Card: In the TTLock app, find the RFID card management option in the user management interface. Select the RFID card you want to delete and click the "Delete" button to revoke the card's access permission.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A

The following is a general guide for installing the TTLock standalone access control system by yourself:


TTLock standalone access control


Installation Steps

  1. Prepare the Tools: You need a screwdriver and other basic tools, and make sure you have the TTLock smart lock and its accessories.

  2. Remove the Old Lock: Use a screwdriver to remove the old lock on the door, including the latch and striker plate, and clean the door surface.

  3. Install the Latch and Striker Plate: Install the latch and striker plate of the TTLock on the door and the door frame respectively, and make sure they are installed in the correct position and can work properly.

  4. Install the Lock Body: Align the lock body with the latch and install it on the door, and use screws to fix it.

  5. Install the Battery: Open the battery compartment of the lock and install the battery according to the polarity mark. Usually, the TTLock uses alkaline batteries or lithium batteries.

  6. Connect to the Mobile App: Download the TTLock app from the App Store or Google Play, open the app and register an account. Then turn on the Bluetooth of your mobile phone, stand next to the lock, and add the lock in the app. The app will search for nearby TTLock devices and complete the pairing and initialization settings.


Installation Guides and Video Tutorials

S4A factory can provide the corresponding installation video with detailed installation steps in English. If you need relevant information, please contact our sales at anytime...


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A

The battery life of the TTLock App standalone access control system is a crucial aspect that users often pay close attention to. Under normal circumstances, it can typically endure around 10,000 times of standard unlocking operations. This translates to an approximate lifespan of 10 - 12 months, providing reliable service for an extended period. However, it's important to note that several variables can influence this duration. The type of battery employed plays a significant role. Different battery chemistries offer varying power capacities and discharge rates. For instance, lithium-ion batteries might have a different performance profile compared to alkaline ones. Additionally, the connection technology utilized by the access control system can impact battery consumption. If the lock relies on a power-hungry wireless protocol, it could drain the battery more quickly. The frequency of usage is another obvious factor. A high-traffic door that requires frequent unlocking and locking will naturally deplete the battery at a faster rate than a seldom-used entryway. Environmental conditions also come into play. Extreme temperatures, whether hot or cold, can reduce battery efficiency and overall lifespan.


Fortunately, most TTLock smart locks are equipped with a convenient low battery reminder function. This acts as an early warning system to ensure that you're never caught off guard by a dead battery. When the battery power dips to a critical level, you'll receive timely notifications. These can come in the form of alerts directly within the TTLock mobile app, which you can access on your smartphone. Additionally, the lock itself may emit audible alerts, providing an immediate auditory cue that it's time to replace the battery.


TTLock App standalone access control

access control system


When it's time to replace the battery, the process is straightforward and user-friendly. Here are the detailed steps:

  1. Locate the battery compartment: In most cases, you'll find this compartment on the interior side of the door. This strategic placement is designed to make it accessible while maintaining security. Depending on the specific model of your TTLock access control system, you might need to use a screwdriver to open the compartment. Some models feature a simple latch or snap-on design, while others require the use of a tool to remove a cover plate.

  2. Remove the old batteries: Once you've gained access to the battery compartment, carefully extract the old batteries. It's important to handle them with care, especially if they're leaking or damaged. In some instances, you may notice signs of corrosion on the battery terminals. If so, it's advisable to clean the terminals gently with a cloth or a small amount of baking soda solution before proceeding.

  3. Insert new batteries: Select the appropriate replacement batteries. As mentioned earlier, alkaline batteries are often recommended due to their good performance and relatively long lifespan. When inserting the new batteries, pay close attention to the correct polarity. The positive (+) and negative (-) terminals must align with the markings inside the compartment. Incorrect polarity can lead to malfunction or damage to the lock.

  4. Close the compartment: After successfully inserting the new batteries, securely close the battery compartment. If your model requires a screwdriver, make sure to tighten the screws evenly to ensure a proper seal. This not only protects the batteries from external elements but also ensures the continued reliable operation of the access control system.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED

S4A

Access control electric strike locks are relatively secure and can resist a certain degree of tampering and forced entry. The specific analysis is as follows:


Anti-tampering Capability

Complex Locking Mechanism: The locking mechanism of the electric strike lock is more concealed and complex than traditional mechanical locks. It uses an electronic control system to manage the locking and unlocking of the door latch, and the striker plate is usually made of high-strength metal materials, which makes it difficult for thieves to directly pry open or damage the lock through simple tools.

Electronic Encryption Technology: Many access control electric strike locks have advanced electronic encryption technology. The access control system and the lock communicate through encrypted signals, and the authorization information is encrypted and stored, which can effectively prevent the lock from being unlocked by illegal means such as signal interception and password cracking.

Tamper Alarm Function: Some electric strike locks are equipped with a tamper alarm function. Once the lock is detected to be pried, disassembled or other abnormal opening attempts, the alarm device on the lock will be triggered immediately, sending out an alarm sound or sending an alarm message to the management center or the user's mobile phone, so that the relevant personnel can take measures in time.


Access control electric strike locks


Anti-forced Entry Capability

Strong Locking Force: The electric strike lock can provide a relatively strong locking force when locked, and the striker plate and the latch bolt are closely matched to ensure that the door is firmly locked. Even if the outsider tries to force the door open by means of impact or pushing and pulling, it is difficult to break through the lock's defense in a short time.

Power-off Protection: Most access control electric strike locks are of the fail-secure type, that is, the door remains locked when the power is off. This design can prevent criminals from taking advantage of the power outage to open the door, and ensure the safety of the door in special circumstances such as power outages and emergencies.

Reinforced Door Frame and Door Structure: To better play the role of the electric strike lock, the door frame and door installed with the lock are usually reinforced to improve the overall strength and stability of the door. For example, using thicker metal door frames or solid wood doors, and adding anti-theft reinforcement plates at the lock installation position, etc., which can enhance the ability of the door to resist forced entry.


S4A

The security of TTLock Waterproof Access Control is relatively high, but like any smart lock, it is not completely without potential security vulnerabilities or risks. The details are as follows:


TTLock Waterproof Access Control


Security Level of TTLock Waterproof Access Control

  1. Multiple Encryption and Protection: TTLock Waterproof Access Control usually adopts advanced encryption technology to protect the communication between the lock and the mobile app, as well as the data transmission and storage process. This makes it difficult for hackers to intercept and crack the data in the transmission process.

  2. Diverse Unlocking Modes: It has a variety of unlocking methods, such as fingerprint recognition, password unlocking, RFID card unlocking and mobile app unlocking. Each unlocking method has its own security mechanism. For example, fingerprint recognition uses biometric technology to ensure the uniqueness and accuracy of identity verification; password unlocking can set complex passwords and support anti-peeping password function.

  3. Tamper Alarm and Real-time Monitoring: When the lock is tampered with or unlocked abnormally, the system will send out an alarm and push real-time notifications to the user's mobile phone, so that the user can know the situation of the lock in time and take corresponding measures.


Potential Security Vulnerabilities and Risks

  1. Historical Vulnerabilities: In 2019, TTLock devices had some security vulnerabilities, such as not properly restricting password-reset attempts, which could lead to incorrect access control and disclosure of sensitive information about valid account names, and not properly blocking guest access in certain situations where the network connection to the cloud was unavailable.

  2. Bluetooth and Network Risks: If the Bluetooth connection is not encrypted properly or the network security configuration of the lock is insufficient, there may be risks of Bluetooth eavesdropping and network attacks. Hackers may try to intercept the Bluetooth signal to crack the unlocking password or gain unauthorized access to the lock through network vulnerabilities.

  3. Weak Passwords and Shared Accounts: If users set simple passwords or share accounts and passwords with others, it will increase the risk of unauthorized access. In addition, if the password is not changed regularly, the risk of being cracked will also increase.


Protection Methods Against Hacking and Unauthorized Access

  1. Regularly Update the Firmware and App: The manufacturer will continuously update and improve the security of the lock firmware and mobile app. Users should enable automatic updates or regularly check for updates to ensure that the system has the latest security patches and features.

  2. Set Complex and Unique Passwords: Avoid using simple and easy-to-guess passwords, such as birthdays, phone numbers, etc. It is recommended to use a combination of letters, numbers and special characters, and set a different password for each lock.

  3. Enable Two-factor Authentication: If the TTLock system supports two-factor authentication, it is recommended to enable this function. Usually, in addition to entering the password, a verification code sent to the mobile phone or other authentication methods is also required, which can further enhance the security.

  4. Strengthen Network Security: If the lock is connected to the network, make sure that the network environment is secure, such as using a secure Wi-Fi network, enabling network encryption and firewalls, and regularly changing the Wi-Fi password.

  5. Limit User Permissions: In the process of adding and managing users, carefully set the access permissions and time periods of each user according to the actual situation, and avoid granting excessive permissions to unnecessary people.

  6. Monitor and Audit Access Logs: Regularly check the access logs of the lock to understand who has accessed the lock and when, and check for any abnormal access records in time. If any suspicious activity is found, take immediate measures to change the password or restrict access.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A

Tuya APP Standalone Access Control System: User Capacity and Permission Details


Maximum Number of Users in Tuya APP Standalone Access Control System

The maximum number of users that can be added to the Tuya APP standalone access control system can vary depending on the specific device model. Here are some common capacities seen in different models:

Some models: Support up to 100 app users. This typically includes a combination of 255 fingerprint/card/pin users within this 100 - user limit. For example, the S4A Access Control's HF2 - BT model, which is a bluetooth - enabled waterproof touch keypad + fingerprint + RFID access controller integrated with Tuya, has this capacity. It also has a hardware user capacity of 1000. In this case, the breakdown for common users is 988 (100 fingerprint users + 888 pin/card users), with 10 visitor users and 2 panic users.


Wireless WiFi TUYA Access Control SystemIndependent access control system


Other models:There are devices like the Tuya Mobile APP, WiFi Touch Screen Standalone Access Controller (model T12 wifi em/mf) which can support up to 2000 users. And certain Amazon - listed models, such as the Wireless WiFi TUYA Access Control System, claim to have a capacity of 10000 users.


It's important to note that these capacities are designed to meet different usage scenarios. Small - scale applications like a home or a small office may find the 100 - user limit sufficient, while larger commercial or industrial settings might require models with a higher user capacity like 2000 or 10000 users.


Differences in Permissions Among Different Types of Users


Touch screen all-in-one machine


1. Administrators:

User Management: Administrators have the power to add, delete, and modify all types of users in the system. This includes adding new fingerprint, card, or pin - based users as well as app - based users. They can also assign different access levels to other users. For example, they can decide whether a new user will be a regular user or have some additional privileges.

System Settings: They can adjust various system - level settings. This may include setting the relay output time (which controls how long the door remains open after being unlocked), configuring access modes (such as enabling or disabling specific combinations of fingerprint + card or card + pin access), and changing network - related settings if the device is connected via WiFi or Bluetooth.

View All Records: Administrators can view all access records. This is crucial for security auditing. They can see who accessed the door, at what time, and using which method (fingerprint, card, pin, or app). This helps in tracking any suspicious activities or in case of any security incidents.

2. Normal Users:

Access Rights: Normal users are mainly restricted to using the access control system for entry. They can use their assigned access methods, such as their fingerprint, card, or pin (if provided) to unlock the door. They may also be able to use the Tuya APP to unlock the door if they have been set up as app - based users.

Limited Settings: In some cases, normal users may have a very limited ability to change their own personal settings. For example, they might be able to change their own pin code if the system allows it, but they cannot modify system - wide settings or manage other users.

View Own Records: Some systems may allow normal users to view their own access records. This gives them a way to track when they accessed the premises, which can be useful for personal reference.


In summary, the Tuya APP standalone access control system offers flexibility in user capacity based on different models, and a clear distinction in permissions between administrators and normal users to ensure security and proper management of access. 


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED

Anna Zhang

Electric strike locks are generally safe and offer a high level of security, but their safety also depends on proper installation, usage, and maintenance. Whether to choose fail-safe or fail-secure depends on your specific needs and usage scenarios:


Safety of Electric Strike Locks

  1. Mechanical Robustness: Electric strike locks are often made of durable materials such as metal alloys, which can withstand a certain amount of physical force. The latch and striker plate are designed to provide a reliable locking mechanism, preventing unauthorized access even under normal circumstances.

  2. Electrical Safety: Electric strike locks are designed with electrical safety in mind. They typically operate at low voltages, such as 12V or 24V, reducing the risk of electrocution. The electrical components are also insulated and protected to prevent short circuits and other electrical hazards.

  3. Compatibility with Access Control Systems: Electric strike locks can be integrated with various access control systems, such as card readers, keypads, and biometric scanners. This allows for more advanced security features, such as user authentication and access logging, enhancing the overall safety of the premises.


Electric strike locks


Fail-Safe vs. Fail-Secure

Fail-Safe:

  1. Power Outage Behavior: In a fail-safe configuration, the lock will unlock when power is lost. This is useful in applications where immediate egress is required during a power outage, such as in emergency exits or in facilities where people need to be able to exit quickly at all times.

  2. Suitable Scenarios: It is often preferred in commercial buildings, hospitals, schools, and other public places where the safety of occupants is of utmost importance and quick evacuation is necessary. For example, in a hospital, if the power goes out, patients and staff need to be able to exit the building without delay.

Fail-Secure:

  1. Power Outage Behavior: In a fail-secure configuration, the lock remains locked when power is lost. This provides maximum security during a power outage, as it prevents unauthorized entry even when the power supply is interrupted.

  2. Suitable Scenarios: It is commonly used in high-security facilities such as banks, government buildings, and data centers where the protection of assets and information is critical. For instance, in a bank vault, it is essential that the lock remains locked even if there is a power failure to prevent unauthorized access to valuables.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A

The TTLock Password Access Control System is compatible with some other smart home devices and security systems. It works with every major brand of intelligent home systems, including Nest, Google Assistant, and Alexa. However, its direct integration with smart cameras or alarm systems may be limited and may require additional setup or third-party integration platforms. Here are the specific situations:


Integration with Some Smart Home Systems

  1. Voice Control Platforms: TTLock can integrate with popular voice control platforms like Amazon Alexa and Google Assistant. This allows you to control the lock using voice commands through devices like Amazon Echo or Google Home, providing a more convenient way to lock and unlock the door without directly operating the lock or the mobile app.

  2. IFTTT Platform: TTLock is also compatible with the IFTTT (If This Then That) platform. Users can create custom automation scenarios. For example, you can set it up so that when the TTLock is unlocked, the IFTTT platform sends a notification to your phone or triggers other connected smart devices to perform specific actions.


Integration with Smart Cameras and Alarm Systems

  1. Limited Direct Integration: TTLock may not have direct built-in integration with most smart cameras and alarm systems. Usually, it cannot directly communicate and interact with these devices in a seamless way.

  2. Possible Third-Party Solutions: Some third-party smart home integration platforms or hubs might support connecting TTLock with certain smart cameras and alarm systems. For example, if you are using a smart home hub that has support for multiple device protocols and APIs, it may be possible to create custom integration rules or use the hub's programming interface to achieve some level of interaction. But this requires a certain level of technical knowledge and additional configuration work.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A

Infrared switches offer numerous advantages in various applications. Some of the main advantages are as follows:


Infrared Sensor Switches


   Convenience

  1. Hands-free Operation: Infrared switches enable hands-free control, which is especially useful in situations where people's hands are full or when maintaining hygiene is crucial. For example, in public restrooms, infrared sensor faucets and soap dispensers allow users to access water and soap without touching the fixtures, reducing the spread of germs.

  2. Automatic Activation: They can be set to automatically turn on or off devices or systems based on the detection of infrared radiation from a human body or other heat sources. In households, infrared motion sensors can be used to automatically turn on lights when someone enters a room and turn them off when the room is vacated, providing convenience and energy savings.


   Energy Efficiency

  1. Optimal Power Management: By detecting occupancy, infrared switches can ensure that devices such as lights, air conditioners, and fans are only operational when needed. In office buildings, infrared sensors can be installed in conference rooms and corridors to automatically control lighting and ventilation systems, reducing energy consumption during unoccupied periods.

  2. Reduced Standby Power: Since infrared switches can precisely control the activation and deactivation of devices, they help to minimize standby power consumption. This is particularly beneficial for electronic devices that are often left in standby mode, as it can lead to significant energy savings over time.


   Safety

  1. Enhanced Visibility: In dark environments, infrared switches can be used to trigger the activation of lights, improving visibility and reducing the risk of accidents. In stairwells or parking lots, infrared motion - activated lights can provide better illumination when people are present, enhancing safety for pedestrians and drivers.

  2. Preventing Electrical Hazards: Some infrared switches are designed to cut off power in the event of a short circuit or other electrical faults. This helps to prevent electrical fires and other hazards, protecting both people and property.


   Versatility

  1. Wide Range of Applications: Infrared switches can be used in a variety of settings, including residential, commercial, and industrial environments. They can be applied to control doors, gates, elevators, security systems, and many other devices, making them a versatile solution for different access control and automation needs.

  2. Compatibility with Other Systems: Infrared switches can often be integrated with other smart home or building management systems. For example, they can be connected to a central control panel or a smartphone app, allowing users to remotely monitor and control the devices connected to the infrared switches.


   Durability

  1. No Mechanical Wear: Unlike traditional mechanical switches that rely on physical contact and may experience wear and tear over time, infrared switches operate based on infrared sensing technology, which has no moving parts. This makes them more durable and less prone to mechanical failures, resulting in a longer lifespan.

  2. Resistant to Environmental Factors: Infrared switches are generally more resistant to dust, moisture, and other environmental factors compared to some other types of switches. They can function properly in a wide range of temperatures and weather conditions, making them suitable for both indoor and outdoor applications.




Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED

Anna Zhang


The Facility codes in the access control IC card usually range from 1 to 255 in the standard 26-bit Wiegand format. However, the values and meanings of the Facility codes may vary for different access control systems and card formats:


card

Wiegand format

  1. Standard 26-bit Wiegand format: This is a widely used industrial standard. In this format, the facility code (Facility codes) occupies 8 bits, the maximum facility code is 255, and each facility code can have a card ID number from 1 to 65,535, up to 65,535.

  2. 34-bit Wiegand format: The length and position of the facility code may vary. For example, some 34-bit formats may have an 8-bit facility code starting from Bit#2; while another 34-bit facility code may be 12-bit, starting from Bit#21.


Other formats

  1. M1 card: The M1 card is a common access control IC card type. Its data structure does not directly correspond to the clear Facility codes field in the Wiegand format. The first 4 bytes of sector 0, block 0 are the card number, the 5th byte is the check bit, the 6th to 8th bytes are the card type, and the last 8 bits are the manufacturer code. The card's permission management and other functions are mainly achieved through the read and write control of sectors and blocks.

  2. CPU card: CPU card has higher security and more complex instruction system and data structure. It is usually used in access control systems with extremely high security requirements. Its permission management is often achieved through internal operating systems and applications. Different from the traditional concept of Facility codes, it may involve more key management, identity authentication and other mechanisms.


Author: Written by Ms.Anna Zhang from S4A INDUSTRIAL CO., LIMITED


S4A