Step 1: Enter visitor information.
When people or vehicles visit, they use the "first-generation ID card, second-generation ID card, passport or other documents" provided by the other party to read the second-generation ID card and scan the ID card and passport. , and enter the visitor information.
Step 2: Check and save the visitor information.
After reading the guest information, check the guest identity information. After the information is accurate and safe, click the "Save" button on the right, and the system will prompt "Visitor information saved successfully". Click OK to enter the next operation.
Step 3: Select the interviewee.
After completing the "Basic Operation" setting, the guest will store the information of people inside the company for selection in this step. Click the "Select Respondents" button on the right, and a complete list of interviewees will pop up.
Step 4: Ask the interviewee's opinion.
As mentioned above, when the interviewee logs on the network, the computer operating system of the interviewee will pop up the interface as shown in the following figure. Respondents choose "agree" or "disagree". Or click "Call" directly, and the automatic dialing function will directly connect the doorman's phone to the company's telephone network and connect the interviewee's landline, which not only saves the time of the sorting machine, but also ensures the accuracy of the interviewee.
Step 5: Issue IC cards or print receipts.
After the visitor is allowed to enter, the visitor machine can record the visitor information by issuing IC cards or one-dimensional barcode receipts.
After the above operations are completed, visitors can enter.
Want to know more about the use of the guest machine, recommend JetTech. Jieyi Technology's guest machine supports nationwide health code verification, and you can verify the health code by swiping your ID card. It also supports binocular live broadcast anti-counterfeiting function to prevent cheating such as photos and videos. Automatically open the gate after face capture, comparison, temperature measurement and mask detection are normal; Support a variety of authentication methods such as face brushing and card swiping (ID card, ID card) to meet different needs.