Introduction to FDS Entry Management System

Size: px
Start display at page:

Download "Introduction to FDS Entry Management System"

Transcription

1 Introduction to FDS Entry Management System <Access Control System> January 2015 Fit Design System Co., Ltd.

2 : Feature and Function of Entry Management System Feature Wiring work is very simple. Function Almost all the functions conceivable in Entry/Exit Management are provided, and cooperation with another system is available. System configuration: A flexible and scalable system configuration from a small system to a large scale system is realized. Door locking/unlocking with External Signal With connection to an external device such as a fire alarm, doors are unlocked/locked when an emergency signal is input. Cooperation with security system A security signal can be sent to a security system connected by starting of security operation. Cooperation with Monitoring Camera Entry management information and Image recording function are uniformly managed by cooperation with Monitoring camera system. Standard Function ACS2 Mid-size Entry Management System Registered users : Up to 50,000 users Controlled doors : Up to 1,800 doors History Preservation : For 2 years Schedule : 2,000 kinds and up to 50,000 events Entry/Exit restriction function Various functions are available including route restriction, occupants limit control, tailgating prevention, antipassback (entered person is allowed for exit only), and interlocking (only one door is opened). History viewing and search function History is displayed with a PC in real time basis and past history is easily listed up by a search function. Administrator operation authority restricting function Operation authority is set for each administrator individually. Payroll accounting and attendance CSV format files are sent to external systems. management Data are sent to an external system for accurate management of even a complicated shiftworking arrangement. Cooperation with another system Import of externally created CSV format files Company staff directory/shift-work schedule/ Calendar Since existing data can be imported, a large volume of information is collectively registered. 1

3 Example of Security Measures Targeted Challenges Yes, FDS Entry Management System can solve the Challenges Who has entered/exited through which door, and when it is? Accurate attendance management of the company staff is desired. Enhancement of the security by preventing unauthorized intrusion of an outsider A scalable system is desired that can be expanded from a single site. Preventing theft of important documents and lead out of information Introduction of important documents and leak out of information History of when and who has entered/exited is checked with a PC in real time. Since the wiring work is quite simple and inexpensive, the introduction is ready at any time. Expansion is available flexibly. Users and utility time are meticulously assigned, consequently outsiders cannot enter the room, and theft and information leakage are prevented. 2

4 Example of Configuration-1 Example of Small System Configuration(ACS1) In a small business institution, a system can be configured with a management PC, one ACU 1, and a required number of DCs. DC #1 Ethernet Isolated Network RS-485 Lock RS-485 Lock DC #2 Hub ACU Hub Ethernet Card Lock RS-232C/485 Card DC #60 Management PC 3

5 Example of Configuration-2 Example of Mid-size System Configuration (ACS2) In a mid-size business institution, an ACS1 system is installed in each floor and the ACS1 systems are connected to each other with an SC. Lock DC #1800 Lock DC # th Floor Isolated network RS-485 Card RS-232C/485 Ethernet Card Hub ACU #30 Management PC#1 Ethernet Lock DC #60 Lock DC #1 1st Floor Hub SC Hub Card RS-232C/485 Card Hub Ethernet RS-485 ACU #1 Management PC#20 4

6 Example of Configuration-3 Example of Large System Configuration(ACS3) For multiple locations, each location has an ACS2 system connected by SC and WAN connection ACS2 system ACS2 system SC#1 SC#512 WAN ACS2 system SC#4 SC#2 ACS2 system SC#3 ACS2 system 5

7 Specifications Items ACS1system ACS2/3 system Number of controllable doors Number of registered users User classes 4 kinds of 999 classes 4 kinds of 999 classes User codes 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of scheduled items Date types of schedule Time zone in schedule 8 time zones per day 8 time zones per day Number of registered administrator Administrator code 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of connectable Number of preserved event logs (ACU) Preservation period of event logs (SC/PC) years 2years Number of connectable ACUs 1 30

8 Products for Entry management system RF Reader with Door Controller A door controller (DC) is not necessary for this reader. An RF reader supporting Mifare is prepared. FDV-1000 Vein Authentication + RF Reader + Key Board FDE-1010 RF Reader + Key Board Key board for operation and password input including an LCD An RF reader supporting Felica cards (EI-Wise) is available as an option (sold separately). Door Controller(DC) This door controller(dc)is used in combination with an RF reader. Access Control Unit(ACU) System Controller(SC) FDE When the number of doors is 60 or more, individual control for every floor is necessary, FDE For managing entry/exit of a door without using a vein authentication reader, this control unit is required. FDE RF Reader of Mifare FDE-MURF10 RF Reader An Access control unit is required for controlling a plurality of doors with group control method and can control up to 60 doors. RF Reader for Felica FDE-FRF or control through a WAN s necessary, a system controller is required. 7

9 Function of Each Device Management PC Retention of setting and registration information Retention of History Management Software facilitates setting of new user registration, modification of a registered content, history management, antipassback and escort function, etc. SC Setting and registration Information History ACU Retention of setting and registration information Retention of History in case of not connected with SC Vein Database Vein Data Application Authentication data Display of authentication result Administrator Setting, registration, and Viewing Security device Alarming device Fire alarm Unlocking switch Control lock User Authentication data input 8

10 Procedure of Authentication Card Authentication Authentication ACU Retention of card data Vein Authentication ACU Authentication Authentication data Authentication result User code Authentication result Control DCU Personal Identification lock Authentication data Display of authentication result Reader Authentication data input Control lock Retention of vein and card data Display of authentication result Authentication data input user user 9

11 Unlocking by other than Authentication By connecting an external switch, a door can be unlocked by pressing the switch without authentication. ( 1) ( 2) There are other functions to unlock the door without authentication. Remote Locking/Unlocking The door is locked/unlocked by an operation from the management PC. Pass Word The door is unlocked with input of a password for unlocking the door.( 5) とき.ドアの 退 室 側 は 認 証 する 必 要 がない Special wiring for unlocking switch DCU Unlocking switch 例 Eg., in case that authentication is not necessary for exit side of the door Thumb Turn By turning the key of the door, it is unlocked.( 3)( 4) Antipanic By means of a function of an electric lock, one side of the door is unlocked by turning a knob.( 6) 1 One unlock switch is necessary for every door that is unlocked by an unlocking switch. 2 Dedicated wiring is necessary for each of DCUs installed to doors that are unlocked by unlocking switches. 3 This function is available for only electric switches without thumb turn covers. 4 If Permission is not set, Unauthorized door open warning is issued. 5 This function is available for only readers including numerical key pads. 6 This function is available for only antipanic type electric locks. Door unlocking time, etc. after unlock by pressing the switch is the case as the case of ordinary authentication. 10

12 Interlocking With interlocking, when one of two doors in a room is operated, the other door is not allowed to open. ( 1)( 2) When one door is under authentication process, just being unlocked, or opened, the other door indicates Interlocked ( 3) and does not accept authentication request. During interlocking, unlocking is not conducted by not only authentication but also operation other than authentication including remote operation and switch operation. Interlocking Dedicated Wiring Room1 Room2 Vein authentication device Room3 Vein authentication device Under authentication process, just being unlocked, or opened Rejection of authentication request, door locked 1 Dedicated wiring between DCUs respectively installed to the two doors is necessary. 2 Unlocking by unlocking switch, All Rights cooperation Reserved, with Copyright(C) ,FIT security device, and connection Design System with Co.,Ltd alarm device are not implemented for doors that use interlocking function. 3 Available only in a reader including an LCD 11

13 Cooperation with Security Device By cooperation with a security device, the authentication device can be secured (Door is locked, authentication request is rejected.)( 1)( 2) ( 3) ( 4) By cooperation with a fire alarm, the door lock can be unlocked when a fire breads out. ( 1)( 5) ( 6) For both the cases, negotiation with managing companies of the other party devices. Be sure to consult us beforehand. There are cases requiring additional expenses. Managing PC LAN ACU LAN Entry/exit managing software Entry side finger vein authentication device lock Exit side finger vein authentication device 1 Dedicated wiring is necessary for each of authentication devices installed to doors to be cooperated. 2 In the doors that implement security start and release operations, interlocking function and connection to security devices are not available. 3 In a door that shifts to a secured state in connection with start of security operation, interlocking function and unlocking by unlocking switch are not available. 4 When security operation is started by an authentication device, checking of saying user and lock out checking are not conducted. 5 Only when the authentication device is energized, cooperation with a fire alarm is implemented. In case of power failure, the state of the lock is dependent on the function of the electric lock. 6 In an authentication device without dedicated wiring, ordinary operation (authentication to unlock) is implemented in case of fire break out. 12

14 Alarm When an alarm is generate, an alarm sound is issued from an authentication device and alarm issue log is recorded.( 1) Door Open Warning When the door is kept opened for a prescribed period or more, this warning is issued. Unauthorized Door Open Warning When the door is opened illicitly, this warning is issued. When an alarm is generated, an alarm signal may be outputted to the outside.( 2) ( 3) ( 4) ( 5) Tamper Alarm When an authentication device is illicitly disassembled, this alarm is issued.( 6) Threatened Authentication Alarm When a person who is forced to make an unwanted authentication performs the threatened authentication, this alarm is issued. 1 At threatened authentication alarm, the alarm sound is not emitted from the authentication device. 2 Be sure to consult us beforehand. 3 There are cases requiring additional expenses. 4 Dedicated wiring is necessary for each of doors that issue alarms. 5 Cooperation with a security device and Interlocking are not implemented for doors that output alarms. 6 One unit of separately sold Tamper switch is required for one authentication device. An example of event log screen 13

15 User Registration, Schedule User Registration 1 2 Registration Registration of user information of veins and cards Example of monitor Schedule Calendar settings of holidays, an anniversary of foundation, summer holiday, etc. are implemented. Example of monitor Hourly operation of each door can be set from six kinds of operations. Up to 2,000 patterns of a user schedule in a user available time periods are registered. 1Open 2Close 3Entry 4Exit 5Entry/Exit 6Toggle 14

16 Usage Restriction Function User Usage Term Restriction Function By setting usage term of a user beforehand, the user is not authenticated except in the usage period. Eg. When usage term is predetermined such as for a temporary staff or a student, this function is used. Antipassback Function A user without an entry log is not allowed to exit, and a user without an exit log is not allowed to enter, thus a user is urged to surely conduct authentication at entry/exit. Number of Staying User Control Function This function controls the number of staying users in a room. Eg. This function is used for a room in which the number of containable people is fixed. Route Restriction Function A user who has not followed a predetermined sequence is not allowed to enter a further inner room. Eg. A user who has not entered the room through a predetermined door is not allowed to enter a further inner area. Escort Function Eg. For preventing tailgating and borrowing/lending authentication data, and checking of staying users, this function is used. A user required to be escorted by someone to enter can be registered. Eg. A user such as a visitor or trainee is made not allowed to enter inside the building by this function. Gender Restriction Function A door that restricts its usage according to the gender can be set. Eg. Doors of a Locker room, Bathing facility, etc. can be set. 15

17 Monitoring, History An event occurred in the system is displayed in real time. Monitoring A person and a room where the person is present are displayed in real time. An event (history) is retrieved by designating a condition, and the retrieval result and monthly events can be backed up as CSV files. Operation state of each door is displayed in real time. A CSV file opened by Excel is shown. History The retrieval and back up are conducted by referring to system logs preserved in a PC. Logs preserved in the PC is automatically deleted after two years has elapsed. 16

18 Backup & Restore, Administrator Authority Backup & Restore Setting information and registration information are collectively stored in a back up file of jip file format. Administrator Authority A piece of information to be restored is selected from the backed up information, thus restoration can be made. System administrator All the operations are allowed. Reception Only viewing of stay state information and user information is allowed. Security staff Viewing of event status and remote locking/unlocking are allowed. User registration dedicated terminals Registration of user information and card, and registration/edition of vein can be implemented. Up to ten codes and pass words to log in to an application can be registered. Operation rights and usage terms can be set for each of registered codes. 17

CipherLab 5100 Time Attendance Utility Manual

CipherLab 5100 Time Attendance Utility Manual CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

PoE-Touch Fingerprint and RFID Access Control

PoE-Touch Fingerprint and RFID Access Control -Touch Fingerprint and RFID Access Control Intelligent Security -Touch Fingerprint and RFID Access Control is a new generation access control device of Anviz. The adopts touch activation technologies in

More information

USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT

USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT CONTENTS Page INTRODUCTION... 2 Security conditions... 3 Full Set (Fully armed)... 3 Part Set (Partially armed)... 3 Unset (Disarmed)...

More information

BUILDING SECURITY & ACCESS CONTROL

BUILDING SECURITY & ACCESS CONTROL Department of Facilities Management BUILDING SECURITY & ACCESS CONTROL OBJECTIVE: PERFORMANCE GUIDELINES AUGUST 19, 2011 The objective of this guideline is to limit the probability that, as a result of

More information

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n A convenient, new way Since the launch of Keyscan s Centrally Managed Access Control (CMAC), access control

More information

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Security Service de Services sécurité. Security Alarm Monitoring Protocol Security Service de Services sécurité TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings

More information

SECURITY SYSTEM NOTES SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES

SECURITY SYSTEM NOTES SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES SECURITY SYSTEM NOTES Installing/Service Company For Service Call SPECIAL CODES "Chime" Digit 1 "Partial Arm" Digit 2 "Quick Arm" Digit 3 ENTRY / EXIT DELAY TIMES Exit Delay Time Entry Delay Time Secondary

More information

$FFHVV&RQWURO6WDUWHU.LW

$FFHVV&RQWURO6WDUWHU.LW 9LVWD.H\6. $FFHVV&RQWURO6WDUWHU.LW 8VHU*XLGH CARD READER DOOR STRIKE REQUEST TO EXIT VistaKey-SK ALARM SYSTEM CONTROL PANEL DOOR STATUS MONITOR K5398 6/00 TABLE OF CONTENTS OVERVIEW...4 INTRODUCTION...4

More information

IP Access Control Management System

IP Access Control Management System 04 BioStar IP Access Control Management System BioStar is a comprehensive access control management software featuring efficient TCP/IP based system architecture with intelligent IP readers. It supports

More information

2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x)

2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x) 2012 November AxTraxNG Access Control Management Software Software Manual (Version 21.x) Copyright 2012 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary

More information

Security Alarm Monitoring Protocol

Security Alarm Monitoring Protocol Security Protocol TABLE OF CONTENTS 1.0 PURPOSE. Page 1 2.0 SCOPE.. Page 1 3.0 DEFINITIONS... Page 1 4.0 PROTOCOL 4.1 General.. Page 4 4.2 of Buildings Perimeter Page 5 4.3 of Buildings Interior Room or

More information

NetworX NX-6V2. LED Keypad User Manual

NetworX NX-6V2. LED Keypad User Manual NetworX NX-6V2 LED Keypad User Manual POWER Light is on when AC power is present; flashes to indicate a low battery condition. ARMED Light is on when armed; off when disarmed; flashes to indicate a previous

More information

AXS Biometric Security System

AXS Biometric Security System AXS Biometric Security System The SECU-AXS biometric security system components may be customized and used in numerous configurations to provide a full scale security and access control system to both

More information

SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS

SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS SECURITY SYSTEM NOTES Installing/Service Company For Service Call Installation Date / / Central Station Duress Code EMERGENCY ACTIVATION KEYS (check if enabled) Fire Auxiliary Emergency Police PROGRAMMED

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,

More information

Understanding Access Control

Understanding Access Control Understanding Access Control To understand access control, we must understand the language of the industry. Terms like alarm inputs, relays, timezones, anti-passback, shunt, and access levels are commonly

More information

HARDWIRED CONTROL PANELS

HARDWIRED CONTROL PANELS USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting

More information

AS-525. AxTrax Access Control Management Software. Software Manual

AS-525. AxTrax Access Control Management Software. Software Manual AS-525 AxTrax Access Control Management Software Software Manual August 2010 Table of Contents Table of Contents 1. Introduction... 5 1.1 System Features... 5 1.1.1. Access Control... 6 1.1.2. Access

More information

F11 User Manual. Version:1.0 Date:Jul. 2010

F11 User Manual. Version:1.0 Date:Jul. 2010 F11 User Manual Version:1.0 Date:Jul. 2010 Introduction: This document mainly introduces the user s operation of F11. About the device installation please refer to F11 Installation Guide. F11 User Manual

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Application Notes. 1.21 Partition Programming (PC1616/1832/1864 V4.2) Page 42. Panels: POWER SERIES (PC1616/1832/1864 V4.

Application Notes. 1.21 Partition Programming (PC1616/1832/1864 V4.2) Page 42. Panels: POWER SERIES (PC1616/1832/1864 V4. Application Notes 1.21 Partition Programming (PC1616/1832/1864 V4.2) Panels: POWER SERIES (PC1616/1832/1864 V4.2) Overview: The PC1616 supports 2 true partitions. The PC1832 supports 4 true partitions.

More information

Security System User Guide

Security System User Guide Security System User Guide Contents 1. Introduction... 1 Controls and Displays... 3 Displays... 3 Controls:... 4 2. Everyday Operation... 5 Access to the System... 5 Entering and Leaving the Protected

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

WITURA CORPORATION SDN BHD

WITURA CORPORATION SDN BHD WT 1010SA Stand Alone GSM Alarm System User Manual and Installation Instructions Version: 1.2 Updated: 4 JAN 2012 WITURA CORPORATION SDN BHD Stand Alone GSM Alarm System Instruction Manual 1 Introduction:

More information

FALCO IP: The True Network Access Control Solution. Building Our Future On IP

FALCO IP: The True Network Access Control Solution. Building Our Future On IP FALCO IP: The True Network Access Control Solution Building Our Future On IP FALCO Integrated Security Access Control System The Falco IP System is a premier integrated security management system for your

More information

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...

More information

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control Software Guide KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control For Keyscan, Aurora is the dawn of a new age for access control. It is the culmination of over 25

More information

SECURITY SYSTEM NOTES

SECURITY SYSTEM NOTES SECURITY SYSTEM NOTES Installing/Service Company For Service Call Central Station Duress Code FUNCTION CODES Function Code Controls Function EMERGENCY ACTIVATION KEYS (check if enabled) Fire Auxiliary

More information

Volume. EverAccess. User s Manual

Volume. EverAccess. User s Manual Volume 1 EverAccess User s Manual FLEX Series Access Control Management Software Flex1.0 EVERFOCUS ELECTRONICS CORPORATION Flex1.0 Instruction Guide 2004 Everfocus Electronics Corp 1801 Highland Ave Duarte

More information

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training) TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Edge Metrics Data Center User Manual

Edge Metrics Data Center User Manual Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,

More information

PC4020 v3.3 Instruction Manual

PC4020 v3.3 Instruction Manual PC4020 v3.3 Instruction Manual WARNING: This manual contains information on limitations regarding product use and function and information on the limitations as to liability of the manufacturer. The entire

More information

V2.0 Attendance System Hardware Suite Guide Instructions Manual

V2.0 Attendance System Hardware Suite Guide Instructions Manual CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Integrated Security System

Integrated Security System Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Accenta/Optima. User Guide. Servicing Organisation (Installer) name: Telephone Number: Date of Installation: Account Number: Honeywell Security

Accenta/Optima. User Guide. Servicing Organisation (Installer) name: Telephone Number: Date of Installation: Account Number: Honeywell Security Accenta/Optima User Guide ZONE 1 2 3 4 5 6 7 8 9 Chime Omit Prog PA 0 1 2 3 4 5 6 7 8 9 CHIME OMIT RESET PROG SET Accenta + TA PA DAY POWER PA! " # $ % & 0 1 2 3 5 6 7 8 Chime Omit Reset Prog 4 9 Set PA

More information

Solution Ultima ICP-CC488 Home security you can rely on

Solution Ultima ICP-CC488 Home security you can rely on Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is

More information

Access Control Management System User s Manual

Access Control Management System User s Manual Access Control Management System User s Manual V1.0.0 Table of Contents 1 Product Overview... 3 1.1 Overview... 3 1.2 System Requirement... 3 2 Client Installation... 4 3 Login System... 7 3.1 Login...

More information

[FAQ] Troubleshooting Access Control Issues

[FAQ] Troubleshooting Access Control Issues [FAQ] Troubleshooting Access Control Issues Article ID: GV4-14-06-16-t Release Date: 06/16/2014 Applied to GV-ASManager GV-AS Controller GV-Reader Summary When you encounter problems with GV-ASManager,

More information

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring Access Control Intrusion Alarms Elevator Control CCTV & DVR Photo ID SECURITY MANAGEMENT SYSTEM Building Automation Visitor Management On & Offsite Monitoring BUILDING SECURITY WORLDWIDE Our Corporate

More information

User s Guide. Security Operations. 2013. 5 Ver. 1.02

User s Guide. Security Operations. 2013. 5 Ver. 1.02 User s Guide Security Operations 013. 5 Ver. 1.0 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security

More information

SECURITY SYSTEM NOTES

SECURITY SYSTEM NOTES SECURITY SYSTEM NOTES Installing/Service Company For Service Call Central Station Duress Code FUNCTION CODES Function Code Controls Function This system is is not partitioned. EMERGENCY ACTIVATION KEYS

More information

Information Systems Security Assessment

Information Systems Security Assessment Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect

More information

VR8. User Guide Intruder Alarm System

VR8. User Guide Intruder Alarm System VR8 EN User Guide Intruder Alarm System VR8 User Guide Notices EN 2 Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems Pty Ltd ( Bosch ). All rights

More information

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control. Kaba Electronic Access Control Keyscan Aurora Software Guide Powering the future of access control. Keyscan Aurora Access Control Management Software Powering the future of access control For Kaba EAC,

More information

User s Guide [Security Operations]

User s Guide [Security Operations] User s Guide [Security Operations] 010. 6 Ver. 1.01 Contents 1 Security 1.1 Introduction... 1- Compliance with the ISO15408 Standard... 1- Operating Precautions... 1- INSTALLATION CHECKLIST... 1-3 1. Security

More information

Solution 144 The Integrated Access Control & Alarm System made for your business

Solution 144 The Integrated Access Control & Alarm System made for your business Solution 144 Access Control & Alarm System 1 Solution 144 The Integrated Access Control & Alarm System made for your business The Solution 144 Integrated Access Control & Alarm System offers an extensive

More information

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM

CONSULTANT PROCEDURES & DESIGN GUIDELINES 28 13 00 ACCESS CONTROL SYSTEM GENERAL: To provide minimum standards for Access Control Systems. PART 1 Common Work Results for Access Control System 1.1 Owner will provide server and software for connecting control panels through the

More information

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL Integra32 Integrated Alarm Monitoring and Access Control USER MANUAL C o p y r i g h t N o t i c e Copyright 1995 2010 by All rights reserved Worldwide. Printed in Canada. This publication has been provided

More information

SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS

SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS SECURITY SYSTEM NOTES Installing/Service Company For Service Call Area 1 Area 2 Area 3 AREA LISTINGS SPECIAL CODES "Quick Arm" Digit "Partial Arm" Digit "Chime" Digit ENTRY / EXIT DELAY TIMES Exit Delay

More information

Software License Registration Guide

Software License Registration Guide Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to

More information

F454. Web Server. User Manual 05/12-01 PC

F454. Web Server. User Manual 05/12-01 PC F454 Web Server User Manual 05/2-0 PC 2 Web Server Contents Introduction and basic functions 5. Connection modes 6.. Connection to the data network 6..2 Remote connection 6.2 Using the Web Server with

More information

Solution Ultima ICP-CC488 Home security you can rely on

Solution Ultima ICP-CC488 Home security you can rely on Solution Ultima ICP-CC488 Home security you can rely on Keeping your home and family safe doesn t need to be complicated. That s why we ve made the Ultima security system so easy to use all it takes is

More information

Introducing Your Cisco IP Phone

Introducing Your Cisco IP Phone CHAPTER 1 A Cisco IP Phone is a full-feature telephone that provides voice communication over the same data network that your computer uses. This phone functions much like a traditional analog phone, allowing

More information

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP

More information

FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual

FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual P/N 315-049403-1 Siemens Building Technologies Fire Safety Table Of Contents Introduction...1 The Access levels...1 User Level...1 Maintenance

More information

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

Access Control Management Software

Access Control Management Software ACCESS CONTROL MANAGEMENT SOFTWARE Access Control Management Software System VII - meeting today s demands and tomorrow s challenges. Supports multiple-monitor workstations Compatible with Microsoft s

More information

Access Professional Edition Selection Guide

Access Professional Edition Selection Guide Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base

More information

K1 Access Control Management System User s Manual

K1 Access Control Management System User s Manual Table of contents K1 Access Control Management System User s Manual Aug 2010 1 Table of contents Table of Contents Chapter 1 System Installation and Configuration 1.1 System Operation Flow Chart... 1 1.2

More information

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Table Of Contents. System Monitoring... 14 System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display... Quick Start Table Of Contents Getting Started... 2 NEware Editions...2 Installing NEware...3 Installing Languages...3 Connecting to NEware...3 Changing Your IP100 Password...4 User Codes... 5 Master Feature...5

More information

Remote Client Program... 3. Web Client... 39

Remote Client Program... 3. Web Client... 39 Remote Client / Web Client USER MANUAL T Series Digital Video Recorder Remote Client Program... 3 Remote Client Program Installation... 4 Remote Client... 6 Main Window... 6 Site Registration... 7 Group

More information

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION 281300 SECTION 281300 INTEGRATED SECURITY MANAGEMENT SYSTEM PART 1 GENERAL 1.1 SECTION INCLUDES A. Provide a modular and network enabled access control system for security management, including engineering, supply,

More information

VOICE PROCESSING SYSTEM KX-TVM50AL KX-TVM200AL. the voice of business

VOICE PROCESSING SYSTEM KX-TVM50AL KX-TVM200AL. the voice of business VOICE PROCESSING SYSTEM the voice of business SYSTEM HIGHLIGHTS The human voice is still the best way to communicate. With the Panasonic and KX- TVM200AL, Panasonic introduces two feature-packed Voice

More information

Access Easy Controller 2.1

Access Easy Controller 2.1 Systems Access Easy Controller 2.1 Access Easy Controller 2.1 4 readers expandable to 32 readers Supports up to 20,480 card holders and 100,000 transactions Classify cardholders based on 254 access groups

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide If this panel is to be added to an existing loop, then all panels need to be upgraded. Please see www.honeywellaccess.com. April 2009 2009 Honeywell. All rights

More information

32 Transferring Projects and Data

32 Transferring Projects and Data 32 Transferring Projects and Data This Chapter explains how to transfer GP-Pro EX project files to the GP and how to transfer the project files stored on the GP to your PC. Please start by reading 32.1

More information

AxTraxNG Access Control Management Software

AxTraxNG Access Control Management Software AxTraxNG Access Control Management Software ARCHITECTURAL AND ENGINEERING SPECIFICATIONS April 2013 Experience the Difference www.rosslaresecurity.com 5505-0228701-00 Table of Contents 1. General... 4

More information

Service Manual Advantage Access Systems

Service Manual Advantage Access Systems Service Manual Advantage Access Systems [AAM4-A and AAM4C-A] May 1996 P/N 09830003 Revision B Advantor Corporation 6101 Lake Ellenor Drive Orlando, FL 32809 Copyright Notice and Software License Copyright

More information

Access Control System Document Number: 620-100240, Rev. D. User Programming Guide. Essential Essential Plus Elite

Access Control System Document Number: 620-100240, Rev. D. User Programming Guide. Essential Essential Plus Elite Essential Essential Plus Elite Access Control System Document Number: 620-100240, Rev. D User Programming Guide USA & Canada (800) 421-1587 & (800) 392-0123 (760) 438-7000 - Toll Free FAX (800) 468-1340

More information

Access control designed simply for you

Access control designed simply for you TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.

More information

OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates

OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates Automatic Number Plate Recognition that works worldwide including Egypt Number plates Free subscription lane, ticket dispenser for nonmembers, ticket readers, e- payment with NFC OPEN PARK INTEGRATED PARKING

More information

Access Control Software Manual

Access Control Software Manual CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12 Product Guide 2014 Product Guide 2014 EMKA, Inc. Page 1 of 12 Digitus BIOMETRIC ACCESS CONTROL Secure every access point EMKA's proven manufacturing process and Digitus Biometric's Superior Engineering

More information

DSX-Soft I/O Integration Software

DSX-Soft I/O Integration Software DSX Access Systems, Inc. DSX-Soft I/O Integration Software DSX now has the ability to integrate with various different external devices through serial data streams. This integration allows other systems

More information

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases Use Case Diagram: Home Security System Alarm System Use Case #1: Issue Smoke Alarm Primary Actor: Smoke detector Goal in Context: Smoke detector detects

More information

Data Security Kit (E) Operation Guide (for Printer)

Data Security Kit (E) Operation Guide (for Printer) Data Security Kit (E) Operation Guide (for Printer) Introduction This Operation Guide explains the procedures for installing and operating the optional Data Security Kit (E) (hereinafter called Security

More information

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS APPLICATION NOTE Contents The DMP Software Family... 1 Stand-Alone Link Software... 1 Add-on Modules for Link Software... 1 System Link End-User Panel Management Software... 2 Simple Registration and Activation...

More information

Galaxy 2 Series. User Guide. Honeywell Security

Galaxy 2 Series. User Guide. Honeywell Security Galaxy 2 Series User Guide Honeywell Security Table of Contents Table of Contents... iii Introduction...1 Controlling Your Alarm System...2 Users... 2 Groups... 2 Keypads...3 Prox Tags/Cards... 3 Wireless

More information

Physical Security for Companies that Maintain Social Infrastructure

Physical Security for Companies that Maintain Social Infrastructure 249 Hitachi Review Vol. 63 (2014), No. 5 Featured Articles Physical Security for Companies that Maintain Social Infrastructure Shinsuke Kanai Kenji Nakamoto Akio Takemoto Masatoshi Furuya OVERVIEW: While

More information

The Challenger Version 8 User Guide

The Challenger Version 8 User Guide Issue III : October 1997 The Challenger Version 8 User Guide CONTENTS Introduction... 3 Glossary... 4 The Challenger Console.. Liquid Crystal Display... 6 Keypad... 7 Indicator Lights... 8 User Identification...PIN...

More information

GV-AS/EV Controller. User s Manual

GV-AS/EV Controller. User s Manual GV-AS/EV Controller User s Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. AS100.110.120.210.400.410.810-EV48-A

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

3 Specification. Master Chip Broadcom 1190. Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice

3 Specification. Master Chip Broadcom 1190. Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice I20-T Door Phone 1 Description I20-T Voice Access control is a digital IP door phone with Fanvil Voip Solutions (Broadcom chip 1190), stable and reliable. FDSP ensure voice loud and clear. Good looking,

More information

ZKAccess User Manual. Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011

ZKAccess User Manual. Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011 ZKAccess User Manual Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011 About This Manual This document introduces the main functions, the user interface and operations

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

How To Get A Cell Phone With A Video Camera And A Speaker Phone (For A Premium) For A Small Price (For An Extra $100) (For The Premium) ( For A Long Time) (With A Long Distance) (To

How To Get A Cell Phone With A Video Camera And A Speaker Phone (For A Premium) For A Small Price (For An Extra $100) (For The Premium) ( For A Long Time) (With A Long Distance) (To IP Video Door Phone Solution AP-VP280 AP-ACS1000 (Door Access Control Server) AddPac Technology 2011, Sales and Marketing AP-VAC20 AP-VAC50 AP-VAC100 AP-VAC200 www.addpac.com Contents IP Video Door Phone

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system Solution guide for SMS-based remote access control and intrusion detection system Contents Application: Remote access control and intrusion detection Page 1 Solution: SMS Relay control cabinet Page 2 System

More information

National Security Systems Inc (800)457-1999. Security System User's Guide

National Security Systems Inc (800)457-1999. Security System User's Guide National Security Systems Inc (800)457-1999 Security System User's Guide Security System Glossary As security system technology has evolved, a special jargon has developed. Some terms widely used within

More information

Export of audit trail events from Salto software. Version 2.0

Export of audit trail events from Salto software. Version 2.0 Export of audit trail events from Salto software Version 2.0 Historic of changes Version Status Date Author Change description 1.0 Stable 20/12/2011 Mikel Larreategi First version of the specs. 2.0 Stable

More information

Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data.

Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data. LIFT DATA MENU How to access the Lift Data menu: Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data. 1. The display will show: Program Door Data Enter Door No. (17-64):?

More information