CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management
Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular, and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2
Acsys Solution Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 3
Acsys System Introduction The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro Din cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the Acsys Keys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 4
Acsys Mechatronic VS Traditional Mechanical Problems in Logistics Industry Mechanical keys are easy to copy Usually a mechanical key can only open one lock Once a key has been given to a user, it is impossible to know when that user is using the key and whether it is used outside working hours Impossible to know who opened what lock and at what time, also difficult to know who accessed a lock in case of a theft All mechanical locks can be picked and bumped without breaking the lock When a key is lost/stolen the locks need replacement Other systems require wiring and power No mechanical system can help control when the staff goes or finishes work If multiple locks need to be accessed a bundle of keys is required which if lost requires multiple lock changes Mechanical keys only work on mechanical locks and cannot incorporate other technologies Most padlocks are easy to pick/bump making them insecure and some shackles are easy to cut The Acsys Solution Acsys keys can not be copied One key can open 100,000 locks The Certifying Authority can decide in advance who can open which lock at what time or how many times they can open it Control and verify which locks were opened by downloading the information from the locks and keys (Last 1000 events-which door/which day/what time) High security locks and that cannot be picked, drilled or bumped Lost/stolen keys can easily be deleted from system Wire free! Easy installation! Time & Attendance function and you can control who goes where and when Program different keys to have access on various padlocks on different locations RFID capable keys that can be programmed to operate a Card System (RFID,POS,Mifare1) and; Acsys is the only company who can provide the most secure padlock in the World 5
The Monetary Benefits Of Implementing The Acsys Solution Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced/copied, a great amount of time, energy, and money are spent for changing the locks. With the Acsys CGS system, keys can only be activated through the software, meaning that if a key is lost/stolen/ unreturned, only the software is needed to be updated. Theft of assets is often an inside job as keys are copied and used to gain access to the sites and assets even after maintenances were completed. With Acsys CGS system, the access to every asset is now remotely controlled and monitored, we see a great reduction in theft. Since the locks are battery-free, thus require no maintenance, and the keys only need battery replacement every 1+ years, the operational expanse (OPEX) cost of running the Acsys system is minimal, meaning little or no recurrent expenditure after deployment. Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is also reduced. As every operation & maintenance (O&M) staff has his own key, they can now go directly to the site as needed and no more time, energy and money are wasted in collecting/returning/ managing keys. Thus, downtimes of towers is reduced. A win-win for both Operator/Tower companies and O&M suppliers. The control center now has control over which and when the sites need servicing and able to verify how much time was spent on site to conduct a specific maintenance. This allows the manager to set KPI s for certain tasks to increase operational efficiency. Through the AcsysMobile APP, the users time and location are logged and reported in real-time which allows the control center to increase the amounts of sites that can be serviced in one day. As the control center has the actuate records on time spent on site for a specific maintenance, it has a complete overview over billable hours. Through implementation of the Acsys access control solution on sites, it has not only simplified the site access authorization but also logged the access in real-time. That is, adherence to service license agreements (SLA) can now be verified. Good suppliers are rewarded and bad one are eliminated. As access to sites is controlled, the management of false and real alarms is properly handled. The activity reports allow the control center to detect abnormal patterns of user behavior and act upon them efficiently and effectively. Thus, collusion between employees to compromise the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump and hard to be vandalized, there is no more need to have security guards on site and unauthorized access is eliminated. As the system can automatically notify which site is being serviced, if the servicing time is abnormal, e.g. a servicing personal is injured and trapped on site, the control center will be informed which in some cases can save lives. 6
Why Acsys? Office Home Gates Containers Car Park USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER 7
How to Program keys 1 2 3 Acsys Software??? Ex : 08:30-18:30 Ex :Mon - Fri, from July - September? IP/USB Programmer Open Acsysware Management Software and decide WHERE the key can have access Program the key rights to be limited in time and duration Insert the key into programmer 4 5 6 The Access Rights are downloaded to the key The Key can now ONLY open the locks for which it has received access for the period access was granted When the time (08:30-18:30) or when the length of the access rights (July- September)has passed, the key has no more access 8
Proposal for Securing and Controlling Access to Containers in Transit Main Project Requirement -A container with goods arrives in Turkey* and it needs to be secured with a padlock during its Transit presence on the Territory -We assume that there will be a human presence to ensure that the container is locked and secured at the port of entry -When leaving the Turkish* territory, the container needs the padlock to be removed -We assume that there will be a human presence to ensure that the lock is removed from the container Other requirements -System needs to be simple and easy to operate at both port of entry and port of departure -Goods need to be re-usable as much as possible without any need of re-programming -Container may need to be accessible during routine Police inspections whilst on the territory, notification of lock opening in real-time is desired -The solution may optionally also be fitted with a GPS or LBS location device to track the device in real-time Questions -Will there be a need for anyone to open the padlock during transit? (ex Customs/Police) -Does the key need to travel with driver or will key be used only at Entry/Exit? -Does the customer need to know when and where it was locked and by whom for both Entry and Exit? -Is internet stable and available at Port of Entry and Exit? -If not, is 3G available at those locations? -Is a padlock associated to a specific container or can it be used randomly? -Does any container ID/Truck ID/ Driver ID need to entered into a software? 9
Proposal to secure containers between Entry and Exit ports Goods Require to be Secured during TRANSIT Port of Entry Port of Exit Acsys IP Key Programmer Based on the project requirements, we propose several solutions which are simple to use, simple to install, requires minimal training and human intervention and secures the assets during their Transit. In order to quickly, securely and efficiently distribute Locking & Unlocking codes we suggest to use the Acsys IP Key Programmer which has the following advantages : -Easy to install and use -Has own IP address easy network detection -Doesn t require PC usage -Can be installed outdoors -Is a REAL-TIME data relay unit allowing to send information up/down quickly and securely -Allows control center to have detailled reports over who LOCKED/UNLOCKED which container at what location + date + time Alternatively, we suggest to use the advantages of the world-unique Acsys CGS solution, which reduces the need for hardware and utilises the users mobile phone/smartphone to LOCK/UNLOCK the padlock as well as to send critical information about the container (Container ID, Truck registration, Driver ID) to the control center in a simple and efficient way. The advantage of this solution is a reduced hardware, available anywhere where there is GSM coverage and very flexible in its usage. 10
Solution A : Lock/Unlock at Entry & Exit Port Activity Reports Customs HQ Ex : Ankara Real-Time IP/VPN connection (control who opened/closed what day/time/key ID) Activity Reports Acsys IP Programmer SECURED AND CONTROLLED TRANSPORTATION OF GOODS Acsys IP Programmer Cannot be Opened During Transit Port of Exit (ex Harran) CUSTOMS DRIVER Port of Entry (ex Istanbul) CUSTOMS Program key to Unlock the padlock Program key to Lock the padlock 11
Solution A Process : Lock/Unlock at Entry & Exit Port A. Container arrives at Port of Entry B. Customs official has a Key without access rights C. Customs selects random padlock to be affixed to container D. Customs insert key in Programmer, and uploads a LOCKING command E. Customs inserts key in padlock and LOCKS container L. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is UNLOCKED 2)by user Nr JKL 3)at 19:12 on xx/zz/yyyy 4)from Entry Port Nr Z Secured and Controlled Transportation of Goods F. Customs then re-inserts key in Programmer, it will send info to CONTROL center that : 1)padlock Nr XZY is LOCKED 2)by user Nr KPZ 3)at 13:40 on xx/zz/yyyy 4)from Entry Port Nr X K. Customs inserts key in padlock and UNLOCKS container J. Customs insert key in Programmer, and uploads an UNLOCKING command I. Customs official has a Key without access rights H. Container arrives at Port of EXIT G. Container is LOCKED and in Transit in Turkey* 12
Solution B : Lock/Unlock at Entry & Exit Port and optional remote-controlled opening by driver Control Center Server Activity Reports NOTE: Keypad Key Cannot be used. Unless correct password is entered DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer RANDOM PASSWORD KEY = MAXIMUM SECURITY Loading Area Unloading Area DRIVER DRIVER REAL-TIME REAL-TIME Driver has key but NO password SINGLE USAGE in LIMITED TIME with RANDOM CODE Driver has a CGS KEY can requesting access and gets a code in ANYTIME 13
Solution B. Acsys CGS Process Illustration OPERATOR Code Generating System Need Access Get Code REAL-TIME REAL-TIME SMS The CGS concept is similar to code creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the control center. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the control center (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, such as 5 minutes for example,to allow for access to the job site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG. Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple job sites and is especially useful when a user needs to access remote job sites where there might not be any coverage. At any time, all of the key s access logs can be downloaded (using the USB/IP Programmer or the MoPro) to give the control center a complete overview of the following : -Access Request Time -Access Request Location (job site/asset) -Time of Entry -Time of Exit -Attempted access to other job sites/assets without authorization Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at anytime without prior approval of the control center. If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entry of a special software generated code. 14
Solution B. Acsys CGS Process Illustration CALL SMS CODE CODE 1. The user has a password key and needs access to some locks 2. The user calls the operator, gives his password, and receives a code to use the key 1. The user has a password key and needs access to some locks 2. The user sends SMS and password requesting access and gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts PIN code to use the key, GREEN FLASH= can use the key 15
Solution C : Lock/Unlock at Entry & Exit Port using CGS and adding additional INFO Activity Reports Control Center Server DRIVER When the driver returns, he can upload the key activity to the software Acsys IP/USB Programmer NO KEY = MAXIMUM SECURITY Loading Area Unloading Area MANAGER DRIVER DRIVER MANAGER Lock the truck with PASSWORD KEY Hand the key to the driver Driver has a keypad KEY WITHOUT PASSWORD DRIVER calls the MANAGER to get the PASSWORD to OPEN the lock NOTE: Password Key Cannot be used unless correct password is entered 16
Solution C. Process : Lock/Unlock at Entry & Exit Port AND add ASSET Data A. Container arrives at Port of Entry B. Customs official has a Key without access rights L. Control Center now knows that 1)Customs Officer Nr KBL 2)Has UNLOCKED Container nr XXR and Truck Nr DLL675 at 3)Entry Point ZLR 4)On TT/HH/yyyy at 21:54 K. Customs receives code, enters it on key UNLOCKS the padlock J. Customs sends SMS to software asking for a UNLOCKING code, and adds Container/Truck info in message C. Customs selects random padlock to be affixed to container I. Container arrives at Port of EXIT D. Customs sends SMS to software asking for a LOCKING code, and adds Container/Truck info in message E. Customs receives code, enters it on key and now key can be used Secured and Controlled Transportation of Goods F. Customs inserts key in padlock and LOCKS container H. Container is LOCKED and in Transit in Turkey* G. Control Center now knows that 1)Customs Officer Nr KBL 2)Has locked Container nr XXR and Truck Nr DLL675 at 3)Entry Point XYZ 4)On xx/tt/yyyy at 13:45 17
Advantages of CGS solution The advantage of using the CGS platform are the following : 1.Low cost, very easy/fast to deploy, no maintenance 2.Fully redundant solution works even if NO power 3.Customs can have access to ALL of the padlocks but ONLY after requesting a code from the control center giving it a good control + overview of openings/lockings 4.The codes issued by control center can be issued manually (over the phone) or automatically using an SMS Gateway (reducing workload) 5.The codes that are issued by CGS can be used once only and always for a fixed time 6.If key is lost/stolen NO risk as key needs a 10 digit RANDOM code issued by the software to be activated (= over 1 Billion combinations) 7.Issuance of codes is Max 1 Minute in either direction and can be easily scaled for 10.000+ users 8.Every issued CODE and additional info to/from a specific phone Number is stored in the database giving control center a CLEAR OVERVIEW of : WHO LOCKED/UNLOCKED WHEN (Time + Date) WHERE (Point of Entry/Exit) WHAT container WHAT truck/trailer licence plate Nr WHO driver information USE ANY PHONE! Data Explanation 5469 : is the user personal PIN code 5m : is a code that will be valid for 5 minutes which is enough to LOCK/UNLOCK the padlock C3422322 : is for example the Container Nr T45M3443 : is for example the license plate of the trailer/truck where the container is placed 18
Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Grant and Program Access Rights Authorize Access GPS Control Center Upload and Send Access Logs Verify Access 1. The Acsys App (for Android) is an extension of the CGS solutions 2. The codes are sent/received using the App instead of using SMS 3. The app also records the GPS coordinates of the phone and user and only allows code creation/code receiving on certain locations based on the Geo-fencing principles 4. Also allows user to take pictures (with location/date/time stamp) of the container, the locked lock and any other details (nr plate etc) 5. App also has a reporting suite allowing the user to fill in free or preset fields (such as Container nr, truck license plate nr and driver ID nr) to allow the control center to have a good overview of the actions of the user 19
Solution D : Lock/Unlock at Entry & Exit Port using Acsys App Activity Reports Send UNLOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION Customs HQ (control who opened/closed what day/time/key ID) Activity Reports Send LOCKING request with Staff ID/ Container ID/Truck ID + GPS POSITION SECURED AND CONTROLLED TRANSPORTATION OF GOODS Cannot be Opened During Transit PORT OF EXIT(EX-HARRAN) CUSTOMS DRIVER PORT OF EXIT(EX-ISTANBUL) CUSTOMS Get CODE to Unlock the padlock Driver has KEY but can not get CODE Get CODE to lock the padlock 20
Acsys Key Specifications CGS AKEY OPTIONAL USE YOUR KEY AS A BADGE PASSWORD AKEY Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10C to +65C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) FINGERPRINT KEY Acsys Key = Acsys ProxKey Proximity/RFID PASSWORD IKEY PASSWORD AKEY WITH LCD CGS IKEY 21
Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 22
Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with stainless steel plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations 23
Other Products Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by DC Power supply Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by Micro USB Optional Belt-Clip 24
Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 25
It s All About Security & Productivity REAL TIME WORLD UNIQUE WIRE FREE PREVENT THEFT SMS KEY 26