CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
|
|
|
- Garry Payne
- 9 years ago
- Views:
Transcription
1 CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management
2 Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2
3 Acsys Solution Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 3
4 Acsys System Introduction The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro Din cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the Acsys Keys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 4
5 Acsys Mechatronic VS Traditional Mechanical Problems in Logistics Industry Mechanical keys are easy to copy Usually a mechanical key can only open one lock Once a key has been given to a user, it is impossible to know when that user is using the key and whether it is used outside working hours Impossible to know who opened what lock and at what time, also difficult to know who accessed a lock in case of a theft All mechanical locks can be picked and bumped without breaking the lock When a key is lost/stolen the locks need replacement Other systems require wiring and power No mechanical system can help control when the staff goes or finishes work If multiple locks need to be accessed a bundle of keys is required which if lost requires multiple lock changes Mechanical keys only work on mechanical locks and cannot incorporate other technologies Most padlocks are easy to pick/bump making them insecure and some shackles are easy to cut The Acsys Solution Acsys keys can not be copied One key can open 100,000 locks The Certifying Authority can decide in advance who can open which lock at what time or how many times they can open it Control and verify which locks were opened by downloading the information from the locks and keys (Last 1000 events-which door/which day/what time) High security locks and that cannot be picked, drilled or bumped Lost/stolen keys can easily be deleted from system Wire free! Easy installation! Time & Attendance function and you can control who goes where and when Program different keys to have access on various padlocks on different locations RFID capable keys that can be programmed to operate a Card System (RFID,POS,Mifare1) and; Acsys is the only company who can provide the most secure padlock in the World 5
6 The Monetary Benefits Of Implementing The Acsys Solution Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced/copied, a great amount of time, energy, and money are spent for changing the locks. With the Acsys CGS system, keys can only be activated through the software, meaning that if a key is lost/stolen/ unreturned, only the software is needed to be updated. Theft of assets is often an inside job as keys are copied and used to gain access to the sites and assets even after maintenances were completed. With Acsys CGS system, the access to every asset is now remotely controlled and monitored, we see a great reduction in theft. Since the locks are battery-free, thus require no maintenance, and the keys only need battery replacement every 1+ years, the operational expanse (OPEX) cost of running the Acsys system is minimal, meaning little or no recurrent expenditure after deployment. Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is also reduced. As every operation & maintenance (O&M) staff has his own key, they can now go directly to the site as needed and no more time, energy and money are wasted in collecting/returning/ managing keys. Thus, downtimes of towers is reduced. A win-win for both Operator/Tower companies and O&M suppliers. The control center now has control over which and when the sites need servicing and able to verify how much time was spent on site to conduct a specific maintenance. This allows the manager to set KPI s for certain tasks to increase operational efficiency. Through the AcsysMobile APP, the users time and location are logged and reported in real-time which allows the control center to increase the amounts of sites that can be serviced in one day. As the control center has the actuate records on time spent on site for a specific maintenance, it has a complete overview over billable hours. Through implementation of the Acsys access control solution on sites, it has not only simplified the site access authorization but also logged the access in real-time. That is, adherence to service license agreements (SLA) can now be verified. Good suppliers are rewarded and bad one are eliminated. As access to sites is controlled, the management of false and real alarms is properly handled. The activity reports allow the control center to detect abnormal patterns of user behavior and act upon them efficiently and effectively. Thus, collusion between employees to compromise the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump and hard to be vandalized, there is no more need to have security guards on site and unauthorized access is eliminated. As the system can automatically notify which site is being serviced, if the servicing time is abnormal, e.g. a servicing personal is injured and trapped on site, the control center will be informed which in some cases can save lives. 6
7 Why Acsys? Office Home Gates Containers Car Park USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER 7
8 How to Program keys Acsys Software??? Ex : 08:30-18:30 Ex :Mon - Fri, from July - September? IP/USB Programmer Open Acsysware Management Software and decide WHERE the key can have access Program the key rights to be limited in time and duration Insert the key into programmer The Access Rights are downloaded to the key The Key can now ONLY open the locks for which it has received access for the period access was granted When the time (08:30-18:30) or when the length of the access rights (July- September)has passed, the key has no more access 8
9 Proposal for Securing and Controlling Access to Containers in Transit Main Project Requirement -A container with goods arrives in Turkey* and it needs to be secured with a padlock during its Transit presence on the Territory -We assume that there will be a human presence to ensure that the container is locked and secured at the port of entry -When leaving the Turkish* territory, the container needs the padlock to be removed -We assume that there will be a human presence to ensure that the lock is removed from the container Other requirements -System needs to be simple and easy to operate at both port of entry and port of departure -Goods need to be re-usable as much as possible without any need of re-programming -Container may need to be accessible during routine Police inspections whilst on the territory, notification of lock opening in real-time is desired -The solution may optionally also be fitted with a GPS or LBS location device to track the device in real-time Questions -Will there be a need for anyone to open the padlock during transit? (ex Customs/Police) -Does the key need to travel with driver or will key be used only at Entry/Exit? -Does the customer need to know when and where it was locked and by whom for both Entry and Exit? -Is internet stable and available at Port of Entry and Exit? -If not, is 3G available at those locations? -Is a padlock associated to a specific container or can it be used randomly? -Does any container ID/Truck ID/ Driver ID need to entered into a software? 9
10 Proposal to secure containers between Entry and Exit ports Goods Require to be Secured during TRANSIT Port of Entry Port of Exit Acsys IP Key Programmer Based on the project requirements, we propose several solutions which are simple to use, simple to install, requires minimal training and human intervention and secures the assets during their Transit. In order to quickly, securely and efficiently distribute Locking & Unlocking codes we suggest to use the Acsys IP Key Programmer which has the following advantages : -Easy to install and use -Has own IP address easy network detection -Doesn t require PC usage -Can be installed outdoors -Is a REAL-TIME data relay unit allowing to send information up/down quickly and securely -Allows control center to have detailled reports over who LOCKED/UNLOCKED which container at what location + date + time Alternatively, we suggest to use the advantages of the world-unique Acsys CGS solution, which reduces the need for hardware and utilises the users mobile phone/smartphone to LOCK/UNLOCK the padlock as well as to send critical information about the container (Container ID, Truck registration, Driver ID) to the control center in a simple and efficient way. The advantage of this solution is a reduced hardware, available anywhere where there is GSM coverage and very flexible in its usage. 10
11 Solution A : Lock/Unlock at Entry & Exit Port Activity Reports Customs HQ Ex : Ankara Real-Time IP/VPN connection (control who opened/closed what day/time/key ID) Activity Reports Acsys IP Programmer SECURED AND CONTROLLED TRANSPORTATION OF GOODS Acsys IP Programmer Cannot be Opened During Transit Port of Exit (ex Harran) CUSTOMS DRIVER Port of Entry (ex Istanbul) CUSTOMS Program key to Unlock the padlock Program key to Lock the padlock 11
12 Solution A Process : Lock/Unlock at Entry & Exit Port A. Container arrives at Port of Entry B. Customs official has a Key without access rights C. Customs selects random padlock to be affixed to container D. Customs insert key in Programmer, and uploads a LOCKING command E. Customs inserts key in padlock and LOCKS container L. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is UNLOCKED 2)by user Nr JKL 3)at 19:12 on xx/zz/yyyy 4)from Entry Port Nr Z Secured and Controlled Transportation of Goods F. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is LOCKED 2)by user Nr KPZ 3)at 13:40 on xx/zz/yyyy 4)from Entry Port Nr X K. Customs inserts key in padlock and UNLOCKS container J. Customs insert key in Programmer, and uploads an UNLOCKING command I. Customs official has a Key without access rights H. Container arrives at Port of EXIT G. Container is LOCKED and in Transit in Turkey* 12
13 Solution B : Lock/Unlock at Entry & Exit Port and optional remote-controlled opening by driver Control Center Server Activity Reports NOTE: Keypad Key Cannot be used. Unless correct password is entered DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer RANDOM PASSWORD KEY = MAXIMUM SECURITY Loading Area Unloading Area DRIVER DRIVER REAL-TIME REAL-TIME Driver has key but NO password SINGLE USAGE in LIMITED TIME with RANDOM CODE Driver has a CGS KEY can requesting access and gets a code in ANYTIME 13
14 Solution B. Acsys CGS Process Illustration OPERATOR Code Generating System Need Access Get Code REAL-TIME REAL-TIME SMS The CGS concept is similar to code creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the control center. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the control center (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, such as 5 minutes for example,to allow for access to the job site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG. Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple job sites and is especially useful when a user needs to access remote job sites where there might not be any coverage. At any time, all of the key s access logs can be downloaded (using the USB/IP Programmer or the MoPro) to give the control center a complete overview of the following : -Access Request Time -Access Request Location (job site/asset) -Time of Entry -Time of Exit -Attempted access to other job sites/assets without authorization Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at anytime without prior approval of the control center. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entry of a special software generated code. 14
15 Solution B. Acsys CGS Process Illustration CALL SMS CODE CODE 1. The user has a password key and needs access to some locks 2. The user calls the operator, gives his password, and receives a code to use the key 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 15
16 Solution C : Lock/Unlock at Entry & Exit Port using CGS and adding additional INFO Activity Reports Control Center Server DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer NO KEY = MAXIMUM SECURITY Loading Area Unloading Area MANAGER DRIVER DRIVER MANAGER Lock the truck with PASSWORD KEY Hand the key to the driver Driver has a keypad KEY WITHOUT PASSWORD DRIVER calls the MANAGER to get the PASSWORD to OPEN the lock NOTE: Password Key Cannot be used unless correct password is entered 16
17 Solution C. Process : Lock/Unlock at Entry & Exit Port AND add ASSET Data A. Container arrives at Port of Entry B. Customs official has a Key without access rights L. Control Center now knows that 1)Customs Officer Nr KBL 2)Has UNLOCKED Container nr XXR and Truck Nr DLL675 at 3)Entry Point ZLR 4)On TT/HH/yyyy at 21:54 K. Customs receives code, enters it on key UNLOCKS the padlock J. Customs sends SMS to software asking for a UNLOCKING code, and adds Container/Truck info in message C. Customs selects random padlock to be affixed to container I. Container arrives at Port of EXIT D. Customs sends SMS to software asking for a LOCKING code, and adds Container/Truck info in message E. Customs receives code, enters it on key and now key can be used Secured and Controlled Transportation of Goods F. Customs inserts key in padlock and LOCKS container H. Container is LOCKED and in Transit in Turkey* G. Control Center now knows that 1)Customs Officer Nr KBL 2)Has locked Container nr XXR and Truck Nr DLL675 at 3)Entry Point XYZ 4)On xx/tt/yyyy at 13:45 17
18 Advantages of CGS solution The advantage of using the CGS platform are the following : 1.Low cost, very easy/fast to deploy, no maintenance 2.Fully redundant solution works even if NO power 3.Customs can have access to ALL of the padlocks but ONLY after requesting a code from the control center giving it a good control + overview of openings/lockings 4.The codes issued by control center can be issued manually (over the phone) or automatically using an SMS Gateway (reducing workload) 5.The codes that are issued by CGS can be used once only and always for a fixed time 6.If key is lost/stolen NO risk as key needs a 10 digit RANDOM code issued by the software to be activated (= over 1 Billion combinations) 7.Issuance of codes is Max 1 Minute in either direction and can be easily scaled for users 8.Every issued CODE and additional info to/from a specific phone Number is stored in the database giving control center a CLEAR OVERVIEW of : WHO LOCKED/UNLOCKED WHEN (Time + Date) WHERE (Point of Entry/Exit) WHAT container WHAT truck/trailer licence plate Nr WHO driver information USE ANY PHONE! Data Explanation 5469 : is the user personal PIN code 5m : is a code that will be valid for 5 minutes which is enough to LOCK/UNLOCK the padlock C : is for example the Container Nr T45M3443 : is for example the license plate of the trailer/truck where the container is placed 18
19 Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Grant and Program Access Rights Authorize Access GPS Control Center Upload and Send Access Logs Verify Access 1. The Acsys App (for Android) is an extension of the CGS solutions 2. The codes are sent/received using the App instead of using SMS 3. The app also records the GPS coordinates of the phone and user and only allows code creation/code receiving on certain locations based on the Geo-fencing principles 4. Also allows user to take pictures (with location/date/time stamp) of the container, the locked lock and any other details (nr plate etc) 5. App also has a reporting suite allowing the user to fill in free or preset fields (such as Container nr, truck license plate nr and driver ID nr) to allow the control center to have a good overview of the actions of the user 19
20 Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Activity Reports Send UNLOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION Customs HQ (control who opened/closed what day/time/key ID) Activity Reports Send LOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION SECURED AND CONTROLLED TRANSPORTATION OF GOODS Cannot be Opened During Transit PORT OF EXIT(EX-HARRAN) CUSTOMS DRIVER PORT OF EXIT(EX-ISTANBUL) CUSTOMS Get CODE to Unlock the padlock Driver has KEY but can not get CODE Get CODE to lock the padlock 20
21 Acsys Key Specifications CGS AKEY OPTIONAL USE YOUR KEY AS A BADGE PASSWORD AKEY Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10C to +65C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) FINGERPRINT KEY Acsys Key = Acsys ProxKey Proximity/RFID PASSWORD IKEY PASSWORD AKEY WITH LCD CGS IKEY 21
22 Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 22
23 Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations 23
24 Other Products Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by DC Power supply Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by Micro USB Optional Belt-Clip 24
25 Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 25
26 It s All About Security & Productivity REAL TIME WORLD UNIQUE WIRE FREE PREVENT THEFT SMS KEY 26
TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics
TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics
TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management
TELECOM SECURITY & USER MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics access
SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com [email protected]
SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com [email protected] COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader
AC-115 Compact Networked Single Door Controller. Installation and User Manual
AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.
USER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
WIFI OBD GPS Tracker T356 User Manual
WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this
FLASH USB 2. 0. Introduction ENGLISH
ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB
VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X
GPS Vehicle Tracker User Manual V5.4 VT600X 1 Preface VT600X USER MANUAL Thank you for purchasing our products. This deliberately edited manual is to introduce the tracker with the complete technical data
EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE
EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE You can program online 24/7 giving you the freedom to work when and where you want. From remote bookkeeping and access, to security control on the ground
Business/Home GSM Alarm System. Installation and User Manual
Business/Home GSM Alarm System Installation and User Manual Brief Introduction: GSM 900/1800/1900 bands, can be used in most parts of the world Full duplex communication with the host Monitor the scene
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
Car Alarm Tracker Manual-20150814
CCTR-922 Car Alarm Tracker Manual-20150814 Welcome to use this GSM car alarm with tracker function CCTR-922. this product use 2G GSM network (LBS locate) to locate the car, it has many new and unique functions,
Intelligent Wireless Tracking & Asset/Fleet Management Solution. Overview
Intelligent Wireless Tracking & Asset/Fleet Management Solution Overview Intelligent Wireless Tracking & Asset/Fleet Management Solution We take this opportunity to introduce our product SmartTrace Intelligent
1. Vehicle Security/Tracking Device
GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and
User's Guide. [Home Network] app. Model No.
User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it
User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd
User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today
CCTR-800 Portable Real Time GPS Tracker
CCTR-800 Portable Real Time GPS Tracker Welcome to use Real Time GPS tracker CCTR-800, This product is with GPS module and GSM module, It has many new and unique functions, such as real time uploading
User Guide for the Volvo On Call mobile application
User Guide for the Volvo On Call mobile application This document provides basic information on the pre-requisites, functionalities and limitations of the Volvo On Call mobile application. General Information
LA-9011 GSM/GPS Tracker User Manual
LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device
Real-Time Vehicle Tracking System [RKI-1660]
Real-Time Vehicle Tracking System [RKI-1660] User Manual Robokits India [email protected] http://www.robokitsworld.com Page 1 Robokits India has partnered with Vehicleonmap.com to bring a Real-Time Vehicle
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
999GPS Tracking Platform Operation Guide
999GPS Tracking Platform Operation Guide Welcome to use this Real Time GPS tracking platform, This software is web based system, it is not necessary to download any software or any plug-in software, just
Basic Software Setup Guide. www.easyclocking.com
1 Basic Software Setup Guide www.easyclocking.com 2 Table of Contents Software registration 3 How to connect the time clock.. 5 How to turn the time clock on 5 Defining the type of connection... 5 TCP/IP
User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies
Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Gallagher Command Centre
DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)
CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
Fingerprint Time Attendance Terminal. Hardware Manual Rev: 1.01
Hardware Manual Rev: 1.01 Content I. NOTICE FOR USING... 4 1.1 OPERATING ENVIRONMENT... 4 1.2 ABOUT THE SYSTEM... 4 1.3 PRESSING METHOD... 5 1.4 QUICK GUIDE... 6 1.4.1 Turning on... 6 1.4.2 Accessing management
A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications
RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support
Vehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
Crow Limited Warranty. Print Version 017
Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose
PROGRAMMING & OPERATING INSTRUCTIONS CL5000 AUDIT TRAIL
PROGRAMMING & OPERATING INSTRUCTIONS CL5000 AUDIT TRAIL 1 CODES AND OPERATION CODES The factory set Master Code is #1234. This should be changed immediately after installation (see Program 10). The Master
P10 - Standalone Access Controller and Reader
www.quantek.co.uk T: 01246 417113 P10 - Standalone Access Controller and Reader 1 Description & Features: P10 is a waterproof standalone access control, reading EM&HID card, it uses advanced Microprocessor,
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
Aegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
User Manual. Wireless Alarm System. PIEZO WARNING: This wireless alarm system contains a 100dBA siren, please be aware of this after activation.
User Manual Wireless Alarm System PIEZO WARNING: This wireless alarm system contains a 100dBA siren, please be aware of this after activation. EN50131-1:2006+A1:2009 EN50131-3:2009 EN50131-6:2008 EN50131-5-3:2005+A1:2008
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.
SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU
How GPS works? WHAT IS GPS? HOW TRACKING WORKS?
WHAT IS GPS? The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense. GPS was originally intended
CCTR-800 Portable Real Time GPS Tracker
CCTR-800 Portable Real Time GPS Tracker Welcome to use this Real Time GPS tracker CCTR-800, This product is with GPS module and GSM module, It has many new and unique functions, such as real time uploading
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM
RUSSIAN DESIGN CAR SECURITY SYSTEMS YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM Welcome to your guide for Pandora car security systems. This guide is mainly focused on our flagman Pandora 5OOO product
Alliance System Ordering Guide
Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers
BIOMETRIC SOLUTIONS 2013 ISSUE
BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One
Precise innovation presents: USer manual
Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much
DC-8706K Auto Dial Alarm System
DC-8706K Auto Dial Alarm System User Guide Basic Contents: 1x the host unit; 1x wireless door (window) magnet; 1x wireless infrared detector; 2x remote control; 1x siren; 1x phone core; 1x AC to DC power
System Integration Software
System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G
How To Program An Autodialer
GJD HYL005 GSM Autodialer Instruction Manual Please read these instructions before you start the installation Features: LCD display. Programmable 9 x 32 digit phone numbers for each trigger. 10 second
GPS Vehicle and personal location tracker. User manual
GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...
INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK
Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: [email protected] INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP
MANUAL Remote Programmer XM3
MANUAL Remote Programmer XM3 Conditions Transactions, deliveries et cetera will be according to the general terms of delivery as deposited at the Chamber of Commerce at Meppel, The Netherlands. Registration
Real-time Vehicle Tracking System
DEVICE USER MANUAL v2 http; WEB BASED TRACKING PORTAL INDEX Overview What s in the Box? Pin-out Interface LED Status Information SIM Card and Cellular Data Requirements Usage Steps Service and Support
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
Emerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
Administrator User Instructions- Master PIN Usage
Administrator User Instructions- Master PIN Usage LOK-IT USB Drives are supplied by the University as a method to safely transport data. They are not intended to be used for primary data storage. The LOK-IT
Operating Instructions. Keypad 2605..
Operating Instructions Keypad 605.. Contents Device description...4 Device presentation...5 Areas of application...6 Operation...8 Acknowledgement signals... 10 Start-up sequence... 11 Connection terminals...1
Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.
P CCTV rk Camera UAE Smart Office ameras oke Detectors Surveillance Camera Distribution Exper Budget-friendly Advanced IP CCTV NVR Fire Detectors Maintenance Smart Office IP Cam Plug N Play Remote Monitors
Apps for Android. Apps for iphone & ipad INS584-3
Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,
Monnit Wi-Fi Sensors. Quick Start Guide
Monnit Wi-Fi Sensors Quick Start Guide Inside the Box You should find the following items in the box: Monnit Wi-Fi (MoWi ) Sensors 2 x AA Batteries for Each MoWi Sensor Quick Start Guide Note: A MoWi USB
868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms
DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential
GPS Vehicle Tracker USER MANUAL VT-108
GPS Vehicle Tracker USER MANUAL VT-108 VT-108 is a GPS/GSM/GPRS tracking device which is specially developed and designed for vehicle Real-time tracking and security. With superior GPS and GPRS modules,
Product Overview. For a more detailed overview of the SafeTime system please view our video via our website: www.safe-time.co.uk
Presentation for Product Overview The SafeTime inspection device has been designed with collaboration in mind, ensuring that everyone has access to the latest inspection information. This critical information
User Manual Wireless Alarm System RINS1548-4. PIEZO WARNING The wireless system contains a loud siren, please be aware of this after an activation
EN50131-1:2006+A1:2009 EN50131-3:2009 EN50131-6:2008 EN50131-5-3:2005+A1:2008 PD6662:2010 Security Grade 2 Environmental Class II Software Version >9.13 User Manual Wireless Alarm System RINS1548-4 PIEZO
Business/Home GSM. Alarm System(III) Installation and Users guide
Business/Home GSM Alarm System(III) Installation and Users guide I. General information: GSM 900/1800/1900 bands, can be used all over the world. Full duplex communication with the base. Monitor environment
CCTR-811 Vehicle GPS Tracker
CCTR-811 Vehicle GPS Tracker Welcome to use Real Time GPS tracker CCTR-811, This product is with u-blox GPS module and GSM module, it can upload current location to website, display history tracking on
Iphone & Android App Smart GSM Home Alarm System
Iphone & Android App Smart GSM Home Alarm System PST-GA242Q User Guide Version V14.3 Dear User, Thanks for selecting the intelligent alarm system. Please read through this guide before installation so
Installation and Operating Instructions Audit Trail Software for 6126/6127/6128/6129 Series
Installation and Operating Instructions Audit Trail Software for 6126/6127/6128/6129 Series General Notes These instructions are for installing S&G Audit Software (and all associated software components)
PERSONAL GPS TRACKING SOLUTION TL206
PERSONAL GPS TRACKING SOLUTION TL206 Contents Tables 1. Introduction-----------------------------------------------------------------------------------------------------------------------1 2. What s new?
Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by
Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by providing quality, innovative products and solutions to the
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
LAND ROVER INCONtROL
LAND ROVER InControl USER GUIDE Welcome to Land Rover InControl This guide assists you in activating your Land Rover InControl account as well as providing information on the InControl products below:
Access Control Buyers Guide Need an Access Control System to protect your business premises?
Access Control Buyers Guide Need an Access Control System to protect your business premises? 12 critical things you must know about Access Control Systems in order to avoid expensive mistakes and ensure
"#$%&'#!()*&+%,-! ./01#2! 3"4!5!677!! 3,!89#)9%#:!!! 3;;'%#<!='#&1)>!?*-,#1%&0!@91A!41<A!!!
"#$%&'#()*&+%,-./01#2 3"45677 3,89#)9%#: 3;;'%#
User Guide. Vehicle Diagnostics by Delphi
User Guide Vehicle Diagnostics by Delphi Table Of Contents Welcome...9 Is My Vehicle Compatible?...9 Equipment Overview...10 Package Contents...10 System Requirements...11 Installation Requirements...11
Key Control Management and Guard Tour Solutions. think inside the box.
Key Control Management and Guard Tour Solutions think inside the box. think inside the box. KeyWatcher Touch and KeyWatcher Illuminated Systems are the modular, scalable solutions designed for interoperability
Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
Quick Start Guide. Rev. 1.0
Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your
USER MANUAL V5.0 VT300
GPS Vehicle Tracker USER MANUAL V5.0 VT300 Updated on 26/12/2008 Contents 1 Product Overview 3 2 For Your Safety 3 3 VT300 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2 Light and
Operating Manual QUESTOR
QUESTOR AS 273 Management Software Document: KSW3s527.0004 / en 2010.08 Edition: August 2010 QUESTOR TABLE OF CONTENT 1 Product description EN-4 1.1 Purpose... EN-4 1.2 System components... EN-4 1.2.1
TX GSM SMS Auto-dial Alarm System. Installation and User Manual
TX GSM SMS Auto-dial Alarm System Installation and User Manual Product Features: 1. 16 wireless zones, 3 wired zones alarm system, suitable for small to medium size offices and homes. 2. The system uses
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
Intelligent GSM Auto-Dial Alarm System
Auto-dial Alarm System Intelligent GSM Auto-Dial Alarm System Profile For a better understanding of this product, please read this user manual thoroughly before using it. 2013.2.V1.0 Auto-dial Alarm System
HyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
ACCESS CONTROL SYSTEMS USER MANUAL
Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic
V2.0 Attendance System Hardware Suite Guide Instructions Manual
CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..
SAMA Tracking Solutions
SAMA Tracking Solutions Vehicle Tracking System VTS SAMA Telecom 1 About SAMA Telecom SAMA TELECOM, is a leading company in telecommunication services, software application and system implementation. We
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)
TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:
Electronic Cargo Tracking System (ECT-1)
A D VA N C E D F L E E T M A N A G E M E N T S Y S T E M S Electronic Cargo Tracking System (ECT-1) The UTrack ECT-1 system is ideal for monitoring and managing any fleet size of Tankers or Cargo Trucks
Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE
Total Security Surveillance Ltd Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd. Mucai Drive, Off Ngong Road, P.O Box 4243 00506 Nairobi. Tel: 020-2721218, 2017911/2, 020-6750440, Fax:
Portions of the lockbox software are copyright (c) 1993-2005 Chad Z. Hower (Kudzu) and the Indy Pit Crew http://www.nevrona.
SentriLock FAQ SentriLock FAQ By SentriLock, LLC Published by: SentriLock, LLC Copyright 2013 by SentriLock, LLC Portions of the lockbox software are copyright (c) 1993-2005 Chad Z. Hower (Kudzu) and the
NortechCommander Software Operating Manual MAN-00004 R6
NortechCommander Software Operating Manual MAN-00004 R6 If the equipment described herein bears the symbol, the said equipment complies with the applicable European Union Directive and Standards mentioned
K300/S300 User Manual. K300/S300 ID User Guide
K300/S300 ID User Guide TABLE OF CONTENTS I. Before Installation II. K300/S300/S300 Management A. Enrollment Procedure a. User Enrollment i. ID Enrollment ii. Password Enrollment B. User Verification a.
