CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

Size: px
Start display at page:

Download "CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management"

Transcription

1 CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management

2 Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2

3 Acsys Solution Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 3

4 Acsys System Introduction The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro Din cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the Acsys Keys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 4

5 Acsys Mechatronic VS Traditional Mechanical Problems in Logistics Industry Mechanical keys are easy to copy Usually a mechanical key can only open one lock Once a key has been given to a user, it is impossible to know when that user is using the key and whether it is used outside working hours Impossible to know who opened what lock and at what time, also difficult to know who accessed a lock in case of a theft All mechanical locks can be picked and bumped without breaking the lock When a key is lost/stolen the locks need replacement Other systems require wiring and power No mechanical system can help control when the staff goes or finishes work If multiple locks need to be accessed a bundle of keys is required which if lost requires multiple lock changes Mechanical keys only work on mechanical locks and cannot incorporate other technologies Most padlocks are easy to pick/bump making them insecure and some shackles are easy to cut The Acsys Solution Acsys keys can not be copied One key can open 100,000 locks The Certifying Authority can decide in advance who can open which lock at what time or how many times they can open it Control and verify which locks were opened by downloading the information from the locks and keys (Last 1000 events-which door/which day/what time) High security locks and that cannot be picked, drilled or bumped Lost/stolen keys can easily be deleted from system Wire free! Easy installation! Time & Attendance function and you can control who goes where and when Program different keys to have access on various padlocks on different locations RFID capable keys that can be programmed to operate a Card System (RFID,POS,Mifare1) and; Acsys is the only company who can provide the most secure padlock in the World 5

6 The Monetary Benefits Of Implementing The Acsys Solution Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced/copied, a great amount of time, energy, and money are spent for changing the locks. With the Acsys CGS system, keys can only be activated through the software, meaning that if a key is lost/stolen/ unreturned, only the software is needed to be updated. Theft of assets is often an inside job as keys are copied and used to gain access to the sites and assets even after maintenances were completed. With Acsys CGS system, the access to every asset is now remotely controlled and monitored, we see a great reduction in theft. Since the locks are battery-free, thus require no maintenance, and the keys only need battery replacement every 1+ years, the operational expanse (OPEX) cost of running the Acsys system is minimal, meaning little or no recurrent expenditure after deployment. Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is also reduced. As every operation & maintenance (O&M) staff has his own key, they can now go directly to the site as needed and no more time, energy and money are wasted in collecting/returning/ managing keys. Thus, downtimes of towers is reduced. A win-win for both Operator/Tower companies and O&M suppliers. The control center now has control over which and when the sites need servicing and able to verify how much time was spent on site to conduct a specific maintenance. This allows the manager to set KPI s for certain tasks to increase operational efficiency. Through the AcsysMobile APP, the users time and location are logged and reported in real-time which allows the control center to increase the amounts of sites that can be serviced in one day. As the control center has the actuate records on time spent on site for a specific maintenance, it has a complete overview over billable hours. Through implementation of the Acsys access control solution on sites, it has not only simplified the site access authorization but also logged the access in real-time. That is, adherence to service license agreements (SLA) can now be verified. Good suppliers are rewarded and bad one are eliminated. As access to sites is controlled, the management of false and real alarms is properly handled. The activity reports allow the control center to detect abnormal patterns of user behavior and act upon them efficiently and effectively. Thus, collusion between employees to compromise the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump and hard to be vandalized, there is no more need to have security guards on site and unauthorized access is eliminated. As the system can automatically notify which site is being serviced, if the servicing time is abnormal, e.g. a servicing personal is injured and trapped on site, the control center will be informed which in some cases can save lives. 6

7 Why Acsys? Office Home Gates Containers Car Park USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER 7

8 How to Program keys Acsys Software??? Ex : 08:30-18:30 Ex :Mon - Fri, from July - September? IP/USB Programmer Open Acsysware Management Software and decide WHERE the key can have access Program the key rights to be limited in time and duration Insert the key into programmer The Access Rights are downloaded to the key The Key can now ONLY open the locks for which it has received access for the period access was granted When the time (08:30-18:30) or when the length of the access rights (July- September)has passed, the key has no more access 8

9 Proposal for Securing and Controlling Access to Containers in Transit Main Project Requirement -A container with goods arrives in Turkey* and it needs to be secured with a padlock during its Transit presence on the Territory -We assume that there will be a human presence to ensure that the container is locked and secured at the port of entry -When leaving the Turkish* territory, the container needs the padlock to be removed -We assume that there will be a human presence to ensure that the lock is removed from the container Other requirements -System needs to be simple and easy to operate at both port of entry and port of departure -Goods need to be re-usable as much as possible without any need of re-programming -Container may need to be accessible during routine Police inspections whilst on the territory, notification of lock opening in real-time is desired -The solution may optionally also be fitted with a GPS or LBS location device to track the device in real-time Questions -Will there be a need for anyone to open the padlock during transit? (ex Customs/Police) -Does the key need to travel with driver or will key be used only at Entry/Exit? -Does the customer need to know when and where it was locked and by whom for both Entry and Exit? -Is internet stable and available at Port of Entry and Exit? -If not, is 3G available at those locations? -Is a padlock associated to a specific container or can it be used randomly? -Does any container ID/Truck ID/ Driver ID need to entered into a software? 9

10 Proposal to secure containers between Entry and Exit ports Goods Require to be Secured during TRANSIT Port of Entry Port of Exit Acsys IP Key Programmer Based on the project requirements, we propose several solutions which are simple to use, simple to install, requires minimal training and human intervention and secures the assets during their Transit. In order to quickly, securely and efficiently distribute Locking & Unlocking codes we suggest to use the Acsys IP Key Programmer which has the following advantages : -Easy to install and use -Has own IP address easy network detection -Doesn t require PC usage -Can be installed outdoors -Is a REAL-TIME data relay unit allowing to send information up/down quickly and securely -Allows control center to have detailled reports over who LOCKED/UNLOCKED which container at what location + date + time Alternatively, we suggest to use the advantages of the world-unique Acsys CGS solution, which reduces the need for hardware and utilises the users mobile phone/smartphone to LOCK/UNLOCK the padlock as well as to send critical information about the container (Container ID, Truck registration, Driver ID) to the control center in a simple and efficient way. The advantage of this solution is a reduced hardware, available anywhere where there is GSM coverage and very flexible in its usage. 10

11 Solution A : Lock/Unlock at Entry & Exit Port Activity Reports Customs HQ Ex : Ankara Real-Time IP/VPN connection (control who opened/closed what day/time/key ID) Activity Reports Acsys IP Programmer SECURED AND CONTROLLED TRANSPORTATION OF GOODS Acsys IP Programmer Cannot be Opened During Transit Port of Exit (ex Harran) CUSTOMS DRIVER Port of Entry (ex Istanbul) CUSTOMS Program key to Unlock the padlock Program key to Lock the padlock 11

12 Solution A Process : Lock/Unlock at Entry & Exit Port A. Container arrives at Port of Entry B. Customs official has a Key without access rights C. Customs selects random padlock to be affixed to container D. Customs insert key in Programmer, and uploads a LOCKING command E. Customs inserts key in padlock and LOCKS container L. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is UNLOCKED 2)by user Nr JKL 3)at 19:12 on xx/zz/yyyy 4)from Entry Port Nr Z Secured and Controlled Transportation of Goods F. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is LOCKED 2)by user Nr KPZ 3)at 13:40 on xx/zz/yyyy 4)from Entry Port Nr X K. Customs inserts key in padlock and UNLOCKS container J. Customs insert key in Programmer, and uploads an UNLOCKING command I. Customs official has a Key without access rights H. Container arrives at Port of EXIT G. Container is LOCKED and in Transit in Turkey* 12

13 Solution B : Lock/Unlock at Entry & Exit Port and optional remote-controlled opening by driver Control Center Server Activity Reports NOTE: Keypad Key Cannot be used. Unless correct password is entered DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer RANDOM PASSWORD KEY = MAXIMUM SECURITY Loading Area Unloading Area DRIVER DRIVER REAL-TIME REAL-TIME Driver has key but NO password SINGLE USAGE in LIMITED TIME with RANDOM CODE Driver has a CGS KEY can requesting access and gets a code in ANYTIME 13

14 Solution B. Acsys CGS Process Illustration OPERATOR Code Generating System Need Access Get Code REAL-TIME REAL-TIME SMS The CGS concept is similar to code creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the control center. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the control center (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, such as 5 minutes for example,to allow for access to the job site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG. Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple job sites and is especially useful when a user needs to access remote job sites where there might not be any coverage. At any time, all of the key s access logs can be downloaded (using the USB/IP Programmer or the MoPro) to give the control center a complete overview of the following : -Access Request Time -Access Request Location (job site/asset) -Time of Entry -Time of Exit -Attempted access to other job sites/assets without authorization Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at anytime without prior approval of the control center. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entry of a special software generated code. 14

15 Solution B. Acsys CGS Process Illustration CALL SMS CODE CODE 1. The user has a password key and needs access to some locks 2. The user calls the operator, gives his password, and receives a code to use the key 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 15

16 Solution C : Lock/Unlock at Entry & Exit Port using CGS and adding additional INFO Activity Reports Control Center Server DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer NO KEY = MAXIMUM SECURITY Loading Area Unloading Area MANAGER DRIVER DRIVER MANAGER Lock the truck with PASSWORD KEY Hand the key to the driver Driver has a keypad KEY WITHOUT PASSWORD DRIVER calls the MANAGER to get the PASSWORD to OPEN the lock NOTE: Password Key Cannot be used unless correct password is entered 16

17 Solution C. Process : Lock/Unlock at Entry & Exit Port AND add ASSET Data A. Container arrives at Port of Entry B. Customs official has a Key without access rights L. Control Center now knows that 1)Customs Officer Nr KBL 2)Has UNLOCKED Container nr XXR and Truck Nr DLL675 at 3)Entry Point ZLR 4)On TT/HH/yyyy at 21:54 K. Customs receives code, enters it on key UNLOCKS the padlock J. Customs sends SMS to software asking for a UNLOCKING code, and adds Container/Truck info in message C. Customs selects random padlock to be affixed to container I. Container arrives at Port of EXIT D. Customs sends SMS to software asking for a LOCKING code, and adds Container/Truck info in message E. Customs receives code, enters it on key and now key can be used Secured and Controlled Transportation of Goods F. Customs inserts key in padlock and LOCKS container H. Container is LOCKED and in Transit in Turkey* G. Control Center now knows that 1)Customs Officer Nr KBL 2)Has locked Container nr XXR and Truck Nr DLL675 at 3)Entry Point XYZ 4)On xx/tt/yyyy at 13:45 17

18 Advantages of CGS solution The advantage of using the CGS platform are the following : 1.Low cost, very easy/fast to deploy, no maintenance 2.Fully redundant solution works even if NO power 3.Customs can have access to ALL of the padlocks but ONLY after requesting a code from the control center giving it a good control + overview of openings/lockings 4.The codes issued by control center can be issued manually (over the phone) or automatically using an SMS Gateway (reducing workload) 5.The codes that are issued by CGS can be used once only and always for a fixed time 6.If key is lost/stolen NO risk as key needs a 10 digit RANDOM code issued by the software to be activated (= over 1 Billion combinations) 7.Issuance of codes is Max 1 Minute in either direction and can be easily scaled for users 8.Every issued CODE and additional info to/from a specific phone Number is stored in the database giving control center a CLEAR OVERVIEW of : WHO LOCKED/UNLOCKED WHEN (Time + Date) WHERE (Point of Entry/Exit) WHAT container WHAT truck/trailer licence plate Nr WHO driver information USE ANY PHONE! Data Explanation 5469 : is the user personal PIN code 5m : is a code that will be valid for 5 minutes which is enough to LOCK/UNLOCK the padlock C : is for example the Container Nr T45M3443 : is for example the license plate of the trailer/truck where the container is placed 18

19 Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Grant and Program Access Rights Authorize Access GPS Control Center Upload and Send Access Logs Verify Access 1. The Acsys App (for Android) is an extension of the CGS solutions 2. The codes are sent/received using the App instead of using SMS 3. The app also records the GPS coordinates of the phone and user and only allows code creation/code receiving on certain locations based on the Geo-fencing principles 4. Also allows user to take pictures (with location/date/time stamp) of the container, the locked lock and any other details (nr plate etc) 5. App also has a reporting suite allowing the user to fill in free or preset fields (such as Container nr, truck license plate nr and driver ID nr) to allow the control center to have a good overview of the actions of the user 19

20 Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Activity Reports Send UNLOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION Customs HQ (control who opened/closed what day/time/key ID) Activity Reports Send LOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION SECURED AND CONTROLLED TRANSPORTATION OF GOODS Cannot be Opened During Transit PORT OF EXIT(EX-HARRAN) CUSTOMS DRIVER PORT OF EXIT(EX-ISTANBUL) CUSTOMS Get CODE to Unlock the padlock Driver has KEY but can not get CODE Get CODE to lock the padlock 20

21 Acsys Key Specifications CGS AKEY OPTIONAL USE YOUR KEY AS A BADGE PASSWORD AKEY Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10C to +65C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) FINGERPRINT KEY Acsys Key = Acsys ProxKey Proximity/RFID PASSWORD IKEY PASSWORD AKEY WITH LCD CGS IKEY 21

22 Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 22

23 Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations 23

24 Other Products Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by DC Power supply Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by Micro USB Optional Belt-Clip 24

25 Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 25

26 It s All About Security & Productivity REAL TIME WORLD UNIQUE WIRE FREE PREVENT THEFT SMS KEY 26

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics

More information

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics

More information

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management TELECOM SECURITY & USER MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management Company Profile Acsys is a global leader in the emerging field of mechatronics access

More information

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com [email protected]

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. www.acsys.com info@acsy.com SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER www.acsys.com [email protected] COMPANY PROFILE OFFICES : CHINA/INDIA/UGANDA/MEXICO/UAE/SAO PAULO/LAGOS CLIENT BASE IN 48 COUNTRIES Acsys is a global leader

More information

AC-115 Compact Networked Single Door Controller. Installation and User Manual

AC-115 Compact Networked Single Door Controller. Installation and User Manual AC-115 Compact Networked Single Controller Installation and User Manual December 2007 Table of Contents Table of Contents 1. Introduction...5 1.1 Key Features... 6 1.2 Technical Specifications... 7 2.

More information

USER MANUAL V5.0 ST100

USER MANUAL V5.0 ST100 GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2

More information

WIFI OBD GPS Tracker T356 User Manual

WIFI OBD GPS Tracker T356 User Manual WIFI OBD GPS Tracker T356 User Manual Version:1.000 http://www.ulbotech.com [email protected] Document Title T356 User Manual Version 1.000 Date 2015-04-02 Status Release General Notes Ulbotech offers this

More information

FLASH USB 2. 0. Introduction ENGLISH

FLASH USB 2. 0. Introduction ENGLISH ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB

More information

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X GPS Vehicle Tracker User Manual V5.4 VT600X 1 Preface VT600X USER MANUAL Thank you for purchasing our products. This deliberately edited manual is to introduce the tracker with the complete technical data

More information

EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE

EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE EASY PROGRAMMING AND TRANSACTION ANALYSIS SOFTWARE You can program online 24/7 giving you the freedom to work when and where you want. From remote bookkeeping and access, to security control on the ground

More information

Business/Home GSM Alarm System. Installation and User Manual

Business/Home GSM Alarm System. Installation and User Manual Business/Home GSM Alarm System Installation and User Manual Brief Introduction: GSM 900/1800/1900 bands, can be used in most parts of the world Full duplex communication with the host Monitor the scene

More information

Autos Limited Ghana Vehicle Tracking Business Proposal

Autos Limited Ghana Vehicle Tracking Business Proposal Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize

More information

Car Alarm Tracker Manual-20150814

Car Alarm Tracker Manual-20150814 CCTR-922 Car Alarm Tracker Manual-20150814 Welcome to use this GSM car alarm with tracker function CCTR-922. this product use 2G GSM network (LBS locate) to locate the car, it has many new and unique functions,

More information

Intelligent Wireless Tracking & Asset/Fleet Management Solution. Overview

Intelligent Wireless Tracking & Asset/Fleet Management Solution. Overview Intelligent Wireless Tracking & Asset/Fleet Management Solution Overview Intelligent Wireless Tracking & Asset/Fleet Management Solution We take this opportunity to introduce our product SmartTrace Intelligent

More information

1. Vehicle Security/Tracking Device

1. Vehicle Security/Tracking Device GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today

More information

CCTR-800 Portable Real Time GPS Tracker

CCTR-800 Portable Real Time GPS Tracker CCTR-800 Portable Real Time GPS Tracker Welcome to use Real Time GPS tracker CCTR-800, This product is with GPS module and GSM module, It has many new and unique functions, such as real time uploading

More information

User Guide for the Volvo On Call mobile application

User Guide for the Volvo On Call mobile application User Guide for the Volvo On Call mobile application This document provides basic information on the pre-requisites, functionalities and limitations of the Volvo On Call mobile application. General Information

More information

LA-9011 GSM/GPS Tracker User Manual

LA-9011 GSM/GPS Tracker User Manual LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device

More information

Real-Time Vehicle Tracking System [RKI-1660]

Real-Time Vehicle Tracking System [RKI-1660] Real-Time Vehicle Tracking System [RKI-1660] User Manual Robokits India [email protected] http://www.robokitsworld.com Page 1 Robokits India has partnered with Vehicleonmap.com to bring a Real-Time Vehicle

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

999GPS Tracking Platform Operation Guide

999GPS Tracking Platform Operation Guide 999GPS Tracking Platform Operation Guide Welcome to use this Real Time GPS tracking platform, This software is web based system, it is not necessary to download any software or any plug-in software, just

More information

Basic Software Setup Guide. www.easyclocking.com

Basic Software Setup Guide. www.easyclocking.com 1 Basic Software Setup Guide www.easyclocking.com 2 Table of Contents Software registration 3 How to connect the time clock.. 5 How to turn the time clock on 5 Defining the type of connection... 5 TCP/IP

More information

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Gallagher Command Centre

Gallagher Command Centre DATASHEET Gallagher Command Centre security.gallagher.com Gallagher Command Centre is the central management platform for the Gallagher security system. Leveraging a client server architecture, the software

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Fingerprint Time Attendance Terminal. Hardware Manual Rev: 1.01

Fingerprint Time Attendance Terminal. Hardware Manual Rev: 1.01 Hardware Manual Rev: 1.01 Content I. NOTICE FOR USING... 4 1.1 OPERATING ENVIRONMENT... 4 1.2 ABOUT THE SYSTEM... 4 1.3 PRESSING METHOD... 5 1.4 QUICK GUIDE... 6 1.4.1 Turning on... 6 1.4.2 Accessing management

More information

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

PROGRAMMING & OPERATING INSTRUCTIONS CL5000 AUDIT TRAIL

PROGRAMMING & OPERATING INSTRUCTIONS CL5000 AUDIT TRAIL PROGRAMMING & OPERATING INSTRUCTIONS CL5000 AUDIT TRAIL 1 CODES AND OPERATION CODES The factory set Master Code is #1234. This should be changed immediately after installation (see Program 10). The Master

More information

P10 - Standalone Access Controller and Reader

P10 - Standalone Access Controller and Reader www.quantek.co.uk T: 01246 417113 P10 - Standalone Access Controller and Reader 1 Description & Features: P10 is a waterproof standalone access control, reading EM&HID card, it uses advanced Microprocessor,

More information

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited (Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

User Manual. Wireless Alarm System. PIEZO WARNING: This wireless alarm system contains a 100dBA siren, please be aware of this after activation.

User Manual. Wireless Alarm System. PIEZO WARNING: This wireless alarm system contains a 100dBA siren, please be aware of this after activation. User Manual Wireless Alarm System PIEZO WARNING: This wireless alarm system contains a 100dBA siren, please be aware of this after activation. EN50131-1:2006+A1:2009 EN50131-3:2009 EN50131-6:2008 EN50131-5-3:2005+A1:2008

More information

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait. SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL 2016 Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.indd 1 5/11/15 3:31 PM TM Foreword... 2 Welcome to SUBARU

More information

How GPS works? WHAT IS GPS? HOW TRACKING WORKS?

How GPS works? WHAT IS GPS? HOW TRACKING WORKS? WHAT IS GPS? The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense. GPS was originally intended

More information

CCTR-800 Portable Real Time GPS Tracker

CCTR-800 Portable Real Time GPS Tracker CCTR-800 Portable Real Time GPS Tracker Welcome to use this Real Time GPS tracker CCTR-800, This product is with GPS module and GSM module, It has many new and unique functions, such as real time uploading

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM

YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM RUSSIAN DESIGN CAR SECURITY SYSTEMS YOUR GUIDE TO PANDORA 5OOO CAR SECURITY SYSTEM Welcome to your guide for Pandora car security systems. This guide is mainly focused on our flagman Pandora 5OOO product

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRIC SOLUTIONS 2013 ISSUE BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise

More information

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One

More information

Precise innovation presents: USer manual

Precise innovation presents: USer manual Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much

More information

DC-8706K Auto Dial Alarm System

DC-8706K Auto Dial Alarm System DC-8706K Auto Dial Alarm System User Guide Basic Contents: 1x the host unit; 1x wireless door (window) magnet; 1x wireless infrared detector; 2x remote control; 1x siren; 1x phone core; 1x AC to DC power

More information

System Integration Software

System Integration Software System Integration Software Release Notes for Version 6.0.5 1.0 Compatibility Currently, PC9000 is compatible with the following Radionics control/communicators: D7212, D7412, D7412G D9112, D9412 and D9412G

More information

How To Program An Autodialer

How To Program An Autodialer GJD HYL005 GSM Autodialer Instruction Manual Please read these instructions before you start the installation Features: LCD display. Programmable 9 x 32 digit phone numbers for each trigger. 10 second

More information

GPS Vehicle and personal location tracker. User manual

GPS Vehicle and personal location tracker. User manual GPS Vehicle and personal location tracker User manual 1 Contents 1. Product overview... 2 2. Safety instruction... 3 3. Specification and parameters... 3 4. Getting started... 4 4.1 Hardware and accessories...

More information

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK

INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP ENTRYCHECK Security Door Controls 3580 Willow Lane, Westlake Village, CA 91361-4921 (805) 494-0622 Fax: (805) 494-8861 www.sdcsecurity.com E-mail: [email protected] INSTALLATION/PROGRAMMING INSTRUCTIONS E4KP

More information

MANUAL Remote Programmer XM3

MANUAL Remote Programmer XM3 MANUAL Remote Programmer XM3 Conditions Transactions, deliveries et cetera will be according to the general terms of delivery as deposited at the Chamber of Commerce at Meppel, The Netherlands. Registration

More information

Real-time Vehicle Tracking System

Real-time Vehicle Tracking System DEVICE USER MANUAL v2 http; WEB BASED TRACKING PORTAL INDEX Overview What s in the Box? Pin-out Interface LED Status Information SIM Card and Cellular Data Requirements Usage Steps Service and Support

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

Administrator User Instructions- Master PIN Usage

Administrator User Instructions- Master PIN Usage Administrator User Instructions- Master PIN Usage LOK-IT USB Drives are supplied by the University as a method to safely transport data. They are not intended to be used for primary data storage. The LOK-IT

More information

Operating Instructions. Keypad 2605..

Operating Instructions. Keypad 2605.. Operating Instructions Keypad 605.. Contents Device description...4 Device presentation...5 Areas of application...6 Operation...8 Acknowledgement signals... 10 Start-up sequence... 11 Connection terminals...1

More information

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock. P CCTV rk Camera UAE Smart Office ameras oke Detectors Surveillance Camera Distribution Exper Budget-friendly Advanced IP CCTV NVR Fire Detectors Maintenance Smart Office IP Cam Plug N Play Remote Monitors

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

Monnit Wi-Fi Sensors. Quick Start Guide

Monnit Wi-Fi Sensors. Quick Start Guide Monnit Wi-Fi Sensors Quick Start Guide Inside the Box You should find the following items in the box: Monnit Wi-Fi (MoWi ) Sensors 2 x AA Batteries for Each MoWi Sensor Quick Start Guide Note: A MoWi USB

More information

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms DIY Friendly Easy Fit Range of Alarms 60% of burglaries attempted on UK homes fitted with burglar alarms are unsuccessful. Introducing the new Easy Fit range of alarms With decades of experience in residential

More information

GPS Vehicle Tracker USER MANUAL VT-108

GPS Vehicle Tracker USER MANUAL VT-108 GPS Vehicle Tracker USER MANUAL VT-108 VT-108 is a GPS/GSM/GPRS tracking device which is specially developed and designed for vehicle Real-time tracking and security. With superior GPS and GPRS modules,

More information

Product Overview. For a more detailed overview of the SafeTime system please view our video via our website: www.safe-time.co.uk

Product Overview. For a more detailed overview of the SafeTime system please view our video via our website: www.safe-time.co.uk Presentation for Product Overview The SafeTime inspection device has been designed with collaboration in mind, ensuring that everyone has access to the latest inspection information. This critical information

More information

User Manual Wireless Alarm System RINS1548-4. PIEZO WARNING The wireless system contains a loud siren, please be aware of this after an activation

User Manual Wireless Alarm System RINS1548-4. PIEZO WARNING The wireless system contains a loud siren, please be aware of this after an activation EN50131-1:2006+A1:2009 EN50131-3:2009 EN50131-6:2008 EN50131-5-3:2005+A1:2008 PD6662:2010 Security Grade 2 Environmental Class II Software Version >9.13 User Manual Wireless Alarm System RINS1548-4 PIEZO

More information

Business/Home GSM. Alarm System(III) Installation and Users guide

Business/Home GSM. Alarm System(III) Installation and Users guide Business/Home GSM Alarm System(III) Installation and Users guide I. General information: GSM 900/1800/1900 bands, can be used all over the world. Full duplex communication with the base. Monitor environment

More information

CCTR-811 Vehicle GPS Tracker

CCTR-811 Vehicle GPS Tracker CCTR-811 Vehicle GPS Tracker Welcome to use Real Time GPS tracker CCTR-811, This product is with u-blox GPS module and GSM module, it can upload current location to website, display history tracking on

More information

Iphone & Android App Smart GSM Home Alarm System

Iphone & Android App Smart GSM Home Alarm System Iphone & Android App Smart GSM Home Alarm System PST-GA242Q User Guide Version V14.3 Dear User, Thanks for selecting the intelligent alarm system. Please read through this guide before installation so

More information

Installation and Operating Instructions Audit Trail Software for 6126/6127/6128/6129 Series

Installation and Operating Instructions Audit Trail Software for 6126/6127/6128/6129 Series Installation and Operating Instructions Audit Trail Software for 6126/6127/6128/6129 Series General Notes These instructions are for installing S&G Audit Software (and all associated software components)

More information

PERSONAL GPS TRACKING SOLUTION TL206

PERSONAL GPS TRACKING SOLUTION TL206 PERSONAL GPS TRACKING SOLUTION TL206 Contents Tables 1. Introduction-----------------------------------------------------------------------------------------------------------------------1 2. What s new?

More information

Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by

Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by Elvey is a leading distributor of electronic security equipment in Africa. Our vision is to assist in the protection of people and property by providing quality, innovative products and solutions to the

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

LAND ROVER INCONtROL

LAND ROVER INCONtROL LAND ROVER InControl USER GUIDE Welcome to Land Rover InControl This guide assists you in activating your Land Rover InControl account as well as providing information on the InControl products below:

More information

Access Control Buyers Guide Need an Access Control System to protect your business premises?

Access Control Buyers Guide Need an Access Control System to protect your business premises? Access Control Buyers Guide Need an Access Control System to protect your business premises? 12 critical things you must know about Access Control Systems in order to avoid expensive mistakes and ensure

More information

User Guide. Vehicle Diagnostics by Delphi

User Guide. Vehicle Diagnostics by Delphi User Guide Vehicle Diagnostics by Delphi Table Of Contents Welcome...9 Is My Vehicle Compatible?...9 Equipment Overview...10 Package Contents...10 System Requirements...11 Installation Requirements...11

More information

Key Control Management and Guard Tour Solutions. think inside the box.

Key Control Management and Guard Tour Solutions. think inside the box. Key Control Management and Guard Tour Solutions think inside the box. think inside the box. KeyWatcher Touch and KeyWatcher Illuminated Systems are the modular, scalable solutions designed for interoperability

More information

Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS

Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM

More information

Quick Start Guide. Rev. 1.0

Quick Start Guide. Rev. 1.0 Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your

More information

USER MANUAL V5.0 VT300

USER MANUAL V5.0 VT300 GPS Vehicle Tracker USER MANUAL V5.0 VT300 Updated on 26/12/2008 Contents 1 Product Overview 3 2 For Your Safety 3 3 VT300 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2 Light and

More information

Operating Manual QUESTOR

Operating Manual QUESTOR QUESTOR AS 273 Management Software Document: KSW3s527.0004 / en 2010.08 Edition: August 2010 QUESTOR TABLE OF CONTENT 1 Product description EN-4 1.1 Purpose... EN-4 1.2 System components... EN-4 1.2.1

More information

TX GSM SMS Auto-dial Alarm System. Installation and User Manual

TX GSM SMS Auto-dial Alarm System. Installation and User Manual TX GSM SMS Auto-dial Alarm System Installation and User Manual Product Features: 1. 16 wireless zones, 3 wired zones alarm system, suitable for small to medium size offices and homes. 2. The system uses

More information

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS

More information

Intelligent GSM Auto-Dial Alarm System

Intelligent GSM Auto-Dial Alarm System Auto-dial Alarm System Intelligent GSM Auto-Dial Alarm System Profile For a better understanding of this product, please read this user manual thoroughly before using it. 2013.2.V1.0 Auto-dial Alarm System

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD. MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard

More information

ACCESS CONTROL SYSTEMS USER MANUAL

ACCESS CONTROL SYSTEMS USER MANUAL Ritenergy Pro (Version 3.XX) ACCESS CONTROL SYSTEMS USER MANUAL 1 User Manual Ritenergy International, LLC TABLE OF CONTENTS RITENERGY PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Basic

More information

V2.0 Attendance System Hardware Suite Guide Instructions Manual

V2.0 Attendance System Hardware Suite Guide Instructions Manual CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..

More information

SAMA Tracking Solutions

SAMA Tracking Solutions SAMA Tracking Solutions Vehicle Tracking System VTS SAMA Telecom 1 About SAMA Telecom SAMA TELECOM, is a leading company in telecommunication services, software application and system implementation. We

More information

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training) TX3 Series TELEPHONE/CARD ACCESS SYSTEMS System Introduction (Sales Training) The new TX3 is designed to provide the best performance and value in stand alone or fully integrated system configurations:

More information

Electronic Cargo Tracking System (ECT-1)

Electronic Cargo Tracking System (ECT-1) A D VA N C E D F L E E T M A N A G E M E N T S Y S T E M S Electronic Cargo Tracking System (ECT-1) The UTrack ECT-1 system is ideal for monitoring and managing any fleet size of Tankers or Cargo Trucks

More information

Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE

Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd. Mucai Drive, Off Ngong Road, P.O Box 4243 00506 Nairobi. Tel: 020-2721218, 2017911/2, 020-6750440, Fax:

More information

Portions of the lockbox software are copyright (c) 1993-2005 Chad Z. Hower (Kudzu) and the Indy Pit Crew http://www.nevrona.

Portions of the lockbox software are copyright (c) 1993-2005 Chad Z. Hower (Kudzu) and the Indy Pit Crew http://www.nevrona. SentriLock FAQ SentriLock FAQ By SentriLock, LLC Published by: SentriLock, LLC Copyright 2013 by SentriLock, LLC Portions of the lockbox software are copyright (c) 1993-2005 Chad Z. Hower (Kudzu) and the

More information

NortechCommander Software Operating Manual MAN-00004 R6

NortechCommander Software Operating Manual MAN-00004 R6 NortechCommander Software Operating Manual MAN-00004 R6 If the equipment described herein bears the symbol, the said equipment complies with the applicable European Union Directive and Standards mentioned

More information

K300/S300 User Manual. K300/S300 ID User Guide

K300/S300 User Manual. K300/S300 ID User Guide K300/S300 ID User Guide TABLE OF CONTENTS I. Before Installation II. K300/S300/S300 Management A. Enrollment Procedure a. User Enrollment i. ID Enrollment ii. Password Enrollment B. User Verification a.

More information