TTLOCK App Manual
App Manual - 181022
Introduction
The TTLOCK App is smart lock management software developed by Shenzhen Smarter Intelligent Control Technology Co., Ltd. It supports various types of locks, including door locks, parking locks, safe locks, bicycle locks, and more. The App communicates with the lock via Bluetooth BLE, enabling features such as unlocking, locking, firmware upgrades, and reading operation records. A Bluetooth key can also be used to open the door lock through a watch. The app supports multiple languages: Chinese, Traditional Chinese, English, Spanish, Portuguese, Russian, French, and Malay.
[QR code to download the App]
Please read the manual carefully before installation and keep this manual in a secure place.
Please refer to sales agents and professionals for information not included in this manual.
Contents
- 1. Registration and Login
- 2. Lock Management
- 3. Key Management
- 4. Passcode Management
- 5. Fingerprint Management
- 6. Unlock via Bluetooth
- 7. Attendance Management
- 8. System Setting
- 9. Gateway Management
1. Registration and Login
Users can register an account using a mobile phone number or email address, supporting over 200 countries and regions worldwide. A verification code will be sent to the user's mobile phone or email, and registration is successful after verification.
1.1 Security Question Settings
After successful registration, users will be directed to the security question settings page. When logging in on a new device, the user can authenticate themselves by answering these pre-set questions.
[Screenshot: Registration form showing fields for country/region, mobile phone/email, password, and verification code.]
[Screenshot: Security question settings page with options to choose questions and input answers.]
1.2 Login Authentication
Log in using your mobile phone number or email account on the login page. The system automatically recognizes the mobile phone number, eliminating the need to input the country code. If you forget your password, you can navigate to the password reset page and receive a verification code via mobile phone or email.
When an account is logged into a new mobile phone, verification is required. Once verified, you can log in to the new device, and all data will be accessible.
[Screenshot: Login page with fields for mobile phone/Email and passcode, and options for Login and Forgot Password.]
[Screenshot: Retrieve passcode page with fields for mobile phone/Email, verification code, and options to get code and reset passcode.]
[Screenshot: Verification prompt for logging into a new device.]
1.3 Ways of Identifying
There are two security verification methods: obtaining a verification code via the account number, or answering security questions. If the account is set up for "answer the question" verification, a "answer question verification" option will appear when logging in on a new device.
[Screenshot: Verification screen offering options to "Verify with verification code" or "Verify by answering questions".]
1.4 Login Successful
The first time you use the TTLOCK app, if there is no lock or key data in your account, the home page will display a button to add a lock. If a lock or key already exists, the lock information will be displayed.
[Screenshot: Home screen showing "no lock adding" with a '+' button.]
[Screenshot: Home screen showing "the account with lock" displaying lock management options.]
2. Lock Management
A lock must be added to the app before it can be used. Adding a lock involves initializing it through Bluetooth communication. Ensure you are near the lock during this process. Once successfully added, you can manage the lock via the app, including sending keys and passwords.
When a lock is added, the adder becomes its administrator. The lock cannot enter setup mode by touching the keyboard. To re-add the lock, the current administrator must first delete it from the app. This deletion process requires being near the lock via Bluetooth.
2.1 Lock Adding
The app supports various lock types: door locks, padlocks, safe locks, smart lock cylinders, parking locks, and bicycle locks. When adding a device, you must first select the lock type. The lock needs to be added to the app after entering its setting mode. A lock that has not been added will enter setting mode by simply touching the keyboard. A previously added lock must be deleted from the app first.
[Screenshot: Interface showing different lock types to select from: Door Lock, Padlock, Safe Lock, Lock Cylinder, Parking Lock, Bicycle Lock.]
[Screenshot: Interface showing nearby locks detected via Bluetooth.]
The initialization data of the lock needs to be uploaded to the network. This data upload is required when the network is available to complete the entire adding process.
[Screenshot: Data uploading status screen.]
2.2 Lock Upgrading
Users can upgrade the lock hardware through the app via Bluetooth. After a successful upgrade, the original key, password, IC card, and fingerprint can continue to be used.
[Screenshot: Lock upgrading progress screen showing "upgrading 75%".]
[Screenshot: Lock upgrading status screen showing "restoring".]
2.3 Error Diagnosis and Time Calibration
Error diagnosis helps analyze system problems and is performed via Bluetooth near the lock. If a gateway is present, the clock is calibrated through the gateway. If no gateway is available, calibration is done via mobile phone Bluetooth.
[Screenshot: Troubleshooting screen prompting user to be near the lock.]
[Screenshot: Lock clock calibration screen showing current time and a "calibrate the time" button.]
2.4 Authorized Administrator
Only the administrator can authorize keys. Upon successful authorization, the authorized key mirrors the administrator's interface. The administrator can send keys, passwords, and more. However, an authorized administrator cannot authorize others.
[Screenshot: Key details screen showing recipient, validity period, sender, and options to delete, freeze, or authorize.]
[Screenshot: Key details screen showing specific key information.]
3. Key Management
After successfully adding a lock, the administrator gains the highest administrative rights. They can send keys to others and manage keys nearing expiration.
[Screenshot: Interface for sending an eKey, showing options for type (time-limited, permanent, single), account, and name.]
Clicking the lock type will display options for time-limited, one-time, and permanent eKeys.
- Time-limited eKey: Valid for a specified duration.
- Permanent eKey: Can be used permanently.
- One-time eKey: Automatically deleted after a single use.
3.1 Key Management
Managers can delete, reset, send, and adjust eKeys. They can also search lock records.
[Screenshot: Key management interface showing a list of keys with validity periods and status.]
3.2 Deadline Warning
The system displays two colors for deadline warnings: yellow indicates nearing expiration, and red indicates expiration.
[Screenshot: List of keys showing expiry dates and status indicators (e.g., "Expiring").]
3.3 Search Lock Record
The administrator can query the unlock record for each key.
[Screenshot: Lock record list showing timestamps, unlock method (APP, Passcode), and success/failure status.]
4. Passcode Management
After entering a passcode on the lock's keyboard, press the unlock button. Passcodes are categorized as permanent, time-limited, one-time, empty, loop, custom, etc.
4.1 Permanent Passcode
A permanent passcode must be used within 24 hours of generation; otherwise, it will automatically expire.
[Screenshot: Passcode generation interface with options for permanent passcode.]
4.2 Time-limited Passcode
Time-limited passcodes have an expiration date, with a minimum validity of one hour and a maximum of three years. If the validity period is within one year, the time can be accurate to the hour; if it exceeds one year, accuracy is by month. The passcode must be used within 24 hours of validity, or it will expire.
[Screenshot: Passcode generation interface for time-limited passcodes, showing beginning and deadline times.]
4.3 One-time Passcode
A one-time passcode can only be used once and is available for 6 hours.
[Screenshot: Passcode generation interface for one-time passcodes.]
4.4 Clear Code
The "Clear Code" function deletes all passcodes set for the lock and is available for 24 hours.
[Screenshot: Passcode generation interface with a "clear" option.]
4.5 Cyclic Passcode
Cyclic passcodes can be reused within specified time periods, such as daily, weekday, or weekend types.
[Screenshot: Passcode generation interface for cyclic passcodes, showing options like "working day" and time ranges.]
4.6 Custom Passcode
Users can set custom passcodes and define their validity periods as needed.
[Screenshot: Passcode generation interface for custom passcodes, showing beginning and deadline times.]
4.7 Passcode Sharing
The system supports sharing passcodes via new communication methods like Facebook Messenger and WhatsApp.
[Screenshot: Passcode sharing interface showing options for WeChat, SMS, Wallbox, Messenger, Whatsapp.]
4.8 Passcode Management
All generated passcodes can be viewed and managed within the password management module. This includes the ability to change, delete, reset, and unlock passcodes.
[Screenshot: Passcode management list showing receiver, type, and validity period.]
5. Fingerprint Management
Fingerprint management is similar to IC card management. After adding a fingerprint, users can utilize it to unlock the door.
6. Unlock via Bluetooth
App users can lock or unlock the door via Bluetooth and can also send Bluetooth eKeys to others.
Unlock by App: Click the round button at the top of the page to unlock the door. Ensure you are within the Bluetooth signal's coverage area.
[Screenshot: Lock management interface showing an unlock button.]
7. Attendance Management
The TTLOCK App functions as an access control system, suitable for company attendance management. It includes features for employee management and attendance statistics.
All TTLOCK 3.0 door locks have attendance functions. This feature is turned off by default for standard door locks and can be enabled or disabled in the lock settings.
[Screenshot: App interface showing attendance management options.]
[Screenshot: Lock settings interface showing options for attendance.]
8. System Setting
The system settings menu includes options for touch unlock switch, group management, gateway management, security settings, reminders, and transferring smart locks. The touch unlock setting determines if the door can be opened by simply touching the lock.
[Screenshot: System settings menu with various options.]
8.1 User Management
User names and phone numbers are visible in the user list. Click on a customer to view their specific door lock information.
[Screenshot: User management list showing names and phone numbers.]
[Screenshot: User details screen showing associated keys and their status.]
8.2 Key Groups Management
For managing a large number of keys, the group management module can be utilized to organize them.
[Screenshot: Group management interface showing creation of groups.]
8.3 Transfer Admin Rights
An administrator can transfer lock ownership to other users or to the apartment (Room Master user). Only the account currently managing the lock has the authority to perform this transfer. After entering the recipient's account, a verification code will be sent. Entering the correct code completes the transfer. The apartment transfer recipient must be an administrator account.
[Screenshot: Interface for choosing the lock to transfer.]
[Screenshot: Interface for entering the recipient's account details.]
[Screenshot: Transfer confirmation screen showing details and requiring verification code.]
8.4 Lock Recycling Station
If a lock is damaged or cannot be deleted normally, it can be removed by moving it to the recycling station. Locks moved to the recycling station cannot be restored.
[Screenshot: Recycling station interface with options to transfer or cancel.]
8.5 Customer Service
Users can consult and provide feedback through the AI customer service feature. This includes sections for FAQ, Feedback, and Introduction. The contact email is contact@ttlock.com.cn.
[Screenshot: Customer service interface showing FAQ and feedback options.]
8.6 About
This module allows users to check the app version number.
[Screenshot: About screen displaying "TTLock 4.8.1".]
9. Gateway Management
The smart lock connects directly via Bluetooth, making it secure from network attacks. The gateway acts as a bridge between smart locks and home Wi-Fi networks. Through the gateway, users can remotely view and calibrate the lock clock, read unlock records, and remotely delete or modify passwords.
[Image of a TTLOCK gateway device]
9.1 Gateway Adding
To add a gateway via the app:
- Connect your phone to the same Wi-Fi network the gateway will use.
- Click the plus icon in the upper right corner, then input the Wi-Fi passcode and gateway name.
- Click OK and enter the passcode for authentication.
- Press and hold the setting button on the gateway for 5 seconds. A green light indicates it has entered add-on mode.
[Screenshot: Gateway setup screen showing Wi-Fi name, Wi-Fi password, and Gateway Name fields.]
9.2 Manual
After a short period, the app will display locks within the gateway's coverage. Once a lock is bound to the gateway, it can be managed through the gateway.
[Screenshot: Gateway adding interface.]
[Screenshot: Gateway status screen indicating "Gateway Added Successfully" and listing detected locks.]
FCC Warning
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
Caution: Any changes or modifications to this device not explicitly approved by the manufacturer could void your authority to operate this equipment.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 0cm between the radiator and your body.