TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management



Similar documents
CONTAINER TRANSPORT SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

SECURITY & WORKFORCE MANAGEMENT SOLUTION PROVIDER. info@acsy.com

Global Asset Tracking & Identification System

The company offers: Smart Tracker Are You in Control? EXECUTIVE SUMMARY

Autos Limited Ghana Vehicle Tracking Business Proposal

Electronic Cargo Tracking System (ECT-1)

SAMA Tracking Solutions

Fleet management solutions for your business

TracKing. A complete web-enabled temperature management system.

USER MANUAL V5.0 ST100

ROUTE GPS. Vehicle Tracking & Fleet Management Providers

Keep control is essential.

A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications

Logitrac Fleet Tracking System

Vehicle Tracking System,

Reducing operating costs of power generators with cloud-based remote management

Tracking & Fleet Management System. Itzik Baron, Mobile Satellite Sales Manager

Vehicle Tracking Solution

Reducing operating costs of telecom base stations with remote management

ELECTRIC VEHICLE CHARGING SOLUTIONS FOR FLEETS

WIRELESS TANKER TRUCK MONITORING SYSTEM (TTMS)

Interlink. Live vehicle tracking. Always on always live. Cloud based system. Easy to use software. On-Target dashboard AGMTelematics

About Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime

Bush Tracker

Administrator's Guide

Key Control Management and Guard Tour Solutions. think inside the box.

USB Secure Management for ProCurve Switches

LA-9011 GSM/GPS Tracker User Manual

Proactive Monitoring of Friction Management Systems Reduces Costs and Downtime

Functional Specification Document

GPS FLEET MANAGEMENT BUYER S GUIDE. Is fleet tracking right for my business?

CCTR-800 Portable Real Time GPS Tracker

Discrete Wireless MARCUS Product Overview

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies

WIFI OBD GPS Tracker T356 User Manual

The NexTraq Difference

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

Real-Time Car GPS Tracker (Portable, Weatherproof, Magnet, More)

NAVMAN WIRELESS GPS FLEET AND ASSET MANAGEMENT SOLUTIONS A BETTER WAY TO MANAGE YOUR FLEET AND ASSETS

"#$%&'#!()*&+%,-! ./01#2! 3"4!5!677!! 3,!89#)9%#:!!!

GPS/GSM/ GPRS/ Web Based Real Time Vehicle Tracking System RFP

Trace Desktop Workforce / Fleet Management System

RFID System Description for Logistics & Inventory

Vehicle Monitoring Quick Reference Guide

SCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group

Total Security Surveillance Ltd. Vehicle Tracking Services BROCHURE

TracKing. A complete web-enabled temperature management system.

1. Vehicle Security/Tracking Device

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

GPS Vehicle and personal location tracker. User manual

BIOMETRIC SOLUTIONS 2013 ISSUE

MCOM VEHICLE TRACKING SYSTEM MANUAL

Quick Start Guide: Iridium GO! Advanced Portal

Business Solution Suite

1838AP 1810AP PG. 48 PG. 42

Field Service Application

SUBARU STARLINK YOUR SUBARU CONNECTED Safety & Security OWNER S MANUAL. Love. It s what makes a Subaru, a Subaru. MY16StarlinkS&S_OMportrait.

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

These are but a few of the many scenarios that can fill your life with mental stress, anxiety, concern and worry.

VT600X USER MANUAL. GPS Vehicle Tracker. User Manual V5.4 VT600X

Emerson Smart Firewall

HMS Industrial Networks

MORE THAN DOTS ON A MAP. Optimizing Business Intelligence by Automating Fleet Management MotionLink motionlink.com

HMS Industrial Networks. Putting industrial applications on the cloud

Incisive Business Guide to Vehicle Tracking

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

User Guide for the Volvo On Call mobile application

HELIUM PULSE FOR MONITORING AND ALERTING HELIUM SMART SENSORS HELIUM NETWORK HELIUM CLOUD HELIUM PULSE HP

TRACKING AND SECURITY SYSTEM

GPS Vehicle Tracking. The Complete Reference Guide

Intervid Fleet Management Fleet Telematics. Intervid, Inc Pegasus Court, Suite C Frederick, MD 21704

IMPLEMENTATION OF ELECTRONIC CARGO TRACKING SYSTEM (ECTS)

Junos Pulse for Google Android

TRANSIT TRACKING Location Tracking Solutions

GPS TRACKING. Tracknology 2012 All Rights Reserved VEHICLE TRAILERS

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

A fool proof Fleet Management System

999GPS Tracking Platform Operation Guide

How To Manage A Logistics Company

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

A Daimler company. Lower consumption greater transparency for your bus fleet.

Lower consumption greater transparency for your bus fleet.

is trademark of Mobiliz Information and Communication Technologies Inc.

Android App User Guide

Presented By : PERNEC TRANSMISSION BERHAD

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

A&E Specifications RoadRunner HD High Definition Mobile Recording System

How To Use Netbiter

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

traka.com Intelligent management solutions for keys and equipment

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone

Gallagher Command Centre

User Manual GSM Alarm System. All rights reserved by Delta Security Co., Ltd

DriveRight. Fleet Management Software. Getting Started Guide. CarChip. DriveRight. Drivers. Vehicles. Product #8186

Integrated Physical Security and Incident Management

Transcription:

TANK TRUCK FLEET & WORKFORCE MANAGEMENT SOLUTION High Security Locks & Keys Access Control Time & Attendance Key Management

Company Profile Acsys is a global leader in the emerging field of mechatronics access control. With technology originating from two famous French defense contractors in 1999, Acsys products and solutions provide a powerful means to control who goes where and when, indoors and outdoors, without wiring and without reliance on a power supply. A highly specialized international team delivers world-unique, patented solutions. From the Code Generation System (CGS) and Keypad Key to remote staff management via the AcsysMobile App, the modular and solution-oriented approach sets Acsys apart from other security competitors. With top-tier clients in the public and private sectors extending across telecommunications, banking, power, mining, logistics, luxury shops, aviation and more. Acsys proves why it s all about security & productivity! 2

Market Scope MINING MILITARY HOSPITALS WAREHOUSES MUSEUMS OFFICES AIRPORTS RESIDENTIAL PORTS LOGISTICS POWER STATIONS RAIL &METRO GOVERNMENT RETAIL TELECOM CONTAINER HOUSES WATER COMPANIES ATM BANKS GUARDING 3

Acsys Solution Access Control System Decide and Control Who Goes Where and When High Security Lock & Key System No Copied Keys No Picked Locks Key Management System No More Tracking of Lost/Stolen Keys and Lock Changes Time & Attendance System Verify What Work was Done, Where, and When 4

Acsys System Introduction Acsys Keys can be fitted with a Proximity / RFID coil allowing the user to use the key as a badge (optional) The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit AES ENCRYPTION, making the keys IMPOSSIBLE to COPY AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL Since there is no power in the locks. We can offer Euro DIN cylinders and padlocks in various sizes All models are Wire-Free EASY to Install EASY to Maintain Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 18:00) LED light on the Acsys Keys gives user information: GREEN ACCESS GRANTED ORANGE ACCESS DENIED AT THIS TIME RED ACCESS DENIED 4 blinks (color depending on the above) LOW BATTERY LOST/STOLEN KEYS can be DELETED from the system and from the locks where it had access Activity Reports The key has a chip that can be programmed to open one or up to 100,000 locks The key and lock each have a built-in MEMORY that keeps track of the last 1,000 events, WHO went WHERE and WHEN The lock has a built-in chip that can be programmed to accept the entry of 1,000,000 keys The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock 5

Acsys Mechatronic VS Traditional Mechanical Traditional Mechanical Locks Issues Keys are usually distributed to users or stored in a central location, which requires people spend time to collect, return and manage those keys. Keys are often copied leading to theft/degradation and as a result unbudgeted maintenance, leading to service interruption. Once distributed there is no control over where and when the mechanical key is used. There is little or no traceability on how long the user spent on a site and this can have serious financial impact on operations, especially on remote sites. Mechanical locks are not safe and can be easily bumped/picked providing no security for the site. Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site. Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs. Acsys Mechatronic Solutions The Acsys solution offers controlled and secured access rights distribution. Acsys locks CANNOT be picked or bumped and are very difficult to drill. Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work. The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on sites (and the cost of the intervention). Keys cannot be copied, so no access is possible outside the access rights working hours. If someone TRIES to access without having rights, that will be stored in the key and lock. Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE itself. 6

Why Acsys? Office Gates Truck Assets USE ONE KEY FOR EVERY TRUCK USE ANY LOCK ON ANY TRUCK ONE SOLUTION FOR EVERY PLACE EASY TO INSTALL & MAINTAIN Where and When was it used? Mon Fri 24hrs 365Days 24hrs Mon Fri 08:00-20:00 Activity Reports Activity Reports EASY TO CHECK WHERE THE KEY WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE LOST MECHANICAL KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN OPEN THE LOCK VERIFY WHERE AND WHEN USERS OPEN THE LOCK 7

Tank Truck Fleet and Workforce Management Solution 8

Project Background A state-owned petroleum company with the core business in oil, gas, renewable and new energy. Currently, there are needs to upgrade the existing passive one-time used security seal/tape solution on tank truck to improve the monitoring and control of the goods and assets throughout the whole distribution process. Secondly, despite some trucks have already fitted with GPS monitoring system, there is no correlation and computerized automation and integration with the security seal/tag solution. This makes the total fleet management solution less secure and less effective. Data: 650 tank trucks in CITY A and only a small amount is fitted with GPS In-vehicle system Each tank truck has 2-5 compartments and each needs 2 Padlocks 1 deport in CITY A 850 remote fuel stations in CITY A 9

Key Components of the Solution AcsysLogistics is a GPS location-based fleet and workforces management solution for enterprise. Through Acsys in-house GPS location system or by integration with an existing GPS system, AcsysLogistics provides the administrator a Live Dashboard (G.I.S.) showing WHERE about and WHAT status are the vehicles in real-time. The Live Dashboard also provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin-point where and by whom the activity is taking place. AcsysLogistics means SECURITY, VISIBILITY, EFFICIENCY & PRODUCTIVITY and FLEXIBILITY in managing the cargos, assets, fleets and workforces in REAL-TIME. Akey Gkey CGSPlus Key PL5 IP Programmer In-vehicle Programmer GPS System 10

Advantages SECURITY VISIBILITY EFFICIENCY & PRODUCTIVITY FLEXIBILITY Current challenges Key lost/stolen/no return = lock change Key is easy to be copied Key is copied = Lock change Locks can be bumped/picked easily Padlocks in used can be pretended to be closed Many keys are in used and hard to manage and control usage Cannot control who Attempts to open the unauthorized lock(s) and no record on such attempts Operators need different keys for different locks for different fuel brand trucks Operators need to collect/return keys before/after used No Record information about who goes where, when for how long Specific locks only can be used on specific trucks to specific destinations Specific key only can open specific lock Acsys solutions Key lost/stolen/no return = No need change lock Key cannot be copied Locks cannot be picked, bumped and hard to drill Each open/close of lock is clearly visible and recorded in the system AES 128-bit encryption Record who, when, where and use the key for how long Access logs on both keys and locks show who attempts to open the unauthorized lock(s) Key auto-blocked after 5 attempts to open unauthorized lock(s) One key per operator One key can open all locks depending on the Access Rights (No picking and breaking of lock due to lost/no return keys) Any lock can be used on any truck to any destination One key for any lock(s) 11

Advantages Acsys solutions answer to SECURITY Where are the trucks/assets? Is the truck locked (Locks closed)? VISIBILITY Is the truck loaded/unloaded/halfloaded? EFFICIENCY & PRODUCTIVITY FLEXIBILITY ALARM Why is an unlocked and loaded truck moving? E.g. theft, violation of work process etc. ALARM Why is a locked and loaded truck not moving? E.g. accident on site, broken down etc. 12

Monetary Benefits of Implementing Acsys Solutions Cost Reduction Efficiency Data Safety With mechanical systems when keys are lost/stolen/misplaced/copied, usually time, energy and money needs to be spent changing the locks. With the Acsys system, keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated. As the access to every oil truck is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used illegally. Since Acsys locks require no maintenance and Acsys keys only need battery replacement 1x/year, the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment. As any Acsys lock can be used on any truck to any destination, no more time/energy/money wasted in collecting/returning/managing lockkey matching. The control center now has control over which trucks/sites need servicing and when and can verify how much time users spent on doing specific jobs, which allows to set KPI s for certain tasks to increase operational efficiency. The control center can view how long the users have spent on doing specific jobs, giving them a complete overview over billable hours. Through implementation of the Acsys solution access to site/assets is simplified but now also logged in realtime, so adherence to SLA s can now be verified. The software reports allow the control center to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible. As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized, there is no more need to have security guards on site, unauthorized access is eliminated. As well as to prevent vandalism to gain access to any assets. Through a better management, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced. 13

Acsys Keys are SMART Acsys AKey Key Features: One key can open up to 100,000 locks Keys keep track of the last 1,000 events (WHEN, WHERE, HOW LONG) Keys are encrypted with AES 128bit so they cannot be copied Keys power the lock. Typical battery life is 1 year or 25,000 times of access Keys can be programmed to work at different times and/or days for different locks Keypad key (optional) only works after correct passcode/pin is entered to prevent unauthorized people from using the key Keys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Time & Attendance: Record user s activities Access control: Access locks depending on Access Rights 14

Acsys Keys are SMART Acsys GKey Key Features: A special key for Security Guard only GKey CANNOT open/close locks Guard uses GKey to verify and download the Access Logs of locks (WHO, WHEN, WHERE, HOW LONG, WHAT), i.e. lock opened/closed by who at what time and for how long GKeys can access 250 locks each time Gkeys are encrypted with AES 128bit so they cannot be copied GKeys power the lock. Typical battery life is 1 year or 25,000 times of access GKeys can be programmed to work at different times and/or days for different locks GKeys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Time & Attendance: Record Guard s activities Access Monitoring: Verify and download Access Logs from locks to get computerized record of WHO, WHEN, WHRE, HOW LONG and WHAT Patrol Guard: Guard uses key for regular patrol tour operations 15

Acsys Keys are SMART Acsys CGSPlus Key Key Features: One key can open up to 100,000 locks Keys keep track of the last 1,000 events (WHEN, WHERE, HOW LONG) Keys are encrypted with AES 128bit so they cannot be copied Keys power the lock. Typical battery life is 1 year or 25,000 times of access Keys with patented keypad to prevent unauthorized usage. Two-factor authentication for enhance security Keys work on a random, single-usage, time-limited passcode generated by the Acsys s patented CGSPlus system only User must request the passcode from the system and enter to the key before usage Keys can be fitted with Mifare coil (optional) and used as badges in traditional access control system Applications: Access control: Access locks depending on time-limited, random and lock specific passcode. Administrator has full control of user s key usage and access rights can be issued on demand based only. 16

Typical Site Situations 17

Work Processes A: Depot GATE IN B: Depot GATE OUT C: Field Stations D: In Transit (Accidental / Emergency Open) 18

A: Depot GATE IN 19

A: Depot GATE IN 1. Operator A arrives at work & logs-in his attendance with key and gets access rights for the day 2. Operator A can ONLY OPEN locks to which he was given access ADMINISTRATOR CONTROL CENTER SERVER Activity Reports CONTROL CENTER To Refilling Zone 4. Control center receives daily detailed report of key usage (WHEN, WHERE, HOW LONG) 3. At preset intervals or at end of duty, the operator logs-out his attendance with key, all key access logs are uploaded to server, all access rights are removed 20

B: Depot GATE OUT 21

B: Depot GATE OUT 1.. Operator B arrives at work & logs-in his attendance with key and gets access rights for the day. Guard arrives at work & logs-in his attendance with his GKey. 2. Operator B can ONLY CLOSE locks to which he was given access 3. Guard visually check RED marks on locks and inserts GKey to each lock to VERIFY locks are properly closed ADMINISTRATOR CONTROL CENTER SERVER Activity Reports GPS System ALARM CONTROL CENTER Exit from Depot GEO-FENCE 6. Control center receives daily detailed report of key usage (WHEN, WHERE, HOW LONG) and any remaining rights are deleted from the key 5. GPS will detect and monitor the movement of the truck. The software will ALARM when the truck has left the GPS GEO-FENCE and not ALL locks are closed 4. After verifying all locks on truck(s), Guard inserts GKey to programmer to digitally file a report that all locks are closed properly and is free to go 22

C: Field Station 23

C: Field Station GPS System 1. Truck is fitted with GPS location tracking system and Acsys In-vehicle Programmer 2. GPS verifies truck at correct location. Field Station operator inserts key to Invehicle Programmer to get access rights for locks 3. Operator ONLY OPEN/CLOSE locks which he is authorized and this based on location ADMINISTRATOR CONTROL CENTER SERVER GPRS IN-VEHICLE GPS TERMINAL USB/RS232/RS485 DATA IN-VEHICLE PROGRAMMER GPS System ALARM Activity Reports GEO-FENCE 5. GPS detects truck moves out of the GPS GEO-FENCE (i.e. Field Station), the software will ALARM if not all locks are locked 4. After job done and insert key to programmer, Access logs are automatically uploaded and any remaining rights are deleted from the key 24

D: In Transit (Accidental / Emergency Open) 25

D: In Transit (Accidental / Emergency Open) REAL-TIME REAL-TIME 1. Truck has accident in transit 2. Driver has a CGSPlus passcode key but NO passcode 3. Driver CALL/SMS Administrator for a random, single-usage, time-limited passcode to OPEN/CLOSE locks ADMINISTRATOR CONTROL CENTER SERVER 4. Driver ONLY OPEN/CLOSE locks which he is authorized 26

Consolidated Reporting System 27

Consolidated Reporting System GPS Fleet Management Reports on trucks Positions Speed Routing Driving behavier Etc. CONSOLIDATED REPORT AcsysLogistics 28

Acsys Solution Architecture and How Keys get Access Rights 29

Acsysware Architecture Request & validation HQ CONTROL CENTER Global access and audit Reports Region A Region B Region C Region D Request & validation Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Sub-region 1 Sub-region 2 Program and Audit keys in a combination of USB/LAN/CGS/BLUETOOTH/3G depending on operational needs Regional access and audit Reports Sub-regional access and audit Reports Site Access Multi-Site/Region/Operator 30

Local Programming (USB/IP) USB CENTRAL LOCATION Computer USB MUTIPLE LOCATION Regional HQ Refueling company Control Center Acsys software IP VPN VPN Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Maintenance company Guarding company Regional HQ Acsys Keys Acsys Locks Activity Reports Regional HQ 1 Refueling company Maintenance company Guarding company CENTRAL LOACTION PROGRAMMING(USB): The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are downloaded to the key s memory. Logs of the key s usage can be uploaded to the database in exactly the same way. MUTIPLE LOCATION PROGRAMMING(IP): IP Programmers allow for distributing access rights across a virtual private network (VPN). It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company s operations (for convenient downloading/uploading). 31

Local Programming (USB/IP) 1. The user has an Acsys key with NO access rights 2. Access rights are downloaded to the key when inserted into the USB/IP Programmer 3. The key downloads the TIME LIMITED access right from the USB/IP programmer (ex 8:00-12:00 lock 24/25/32) 4. The user opens the lock within the fixed time (ex 08:00-12:00) Activity Reports ADMINISTRATOR CONTROL CENTER SERVER Activity Reports 8. Access logs are automatically uploaded and any remaining rights are deleted from the key 7. The user goes back to the office inserts the key into the USB/IP programmer 6. The user finishes work and close locks 5. The user carries out the task (ex 8:00-12:00) 32

Acsys CGSPlus Solution (Remote Key Activation) The Acsys Code Generating System Plus (CGSPlus) is a simple, yet powerful way to manage access to remote sites and assets in real-time. Through a phone and an Acsys CGSPlus Key with Keypad, the control center can grant access rights in real-time and be notified of site arrival and exit and accessing of assets. The patented CGSPlus solution is offered exclusively by Acsys and is a unique approach to remote site access control. The concept is simple, every user now has a key but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s). OPERATOR ANY PHONE ANY PHONE SMS Whenever a user requires access to a site or asset, he needs to request the code by call/sms to the control center. Upon verification of user credentials the code will be issued to the user, who in turn enters it on the key, granting him access and ONLY on the site and assets that the control center wants the user to access. The Acsys CGSPlus solution is the safest and most convenient way to control access to remote sites without the need for picking-up or returning keys. USER CGS Working Principle 33

Remote key Activation (Call/SMS) CALL SMS CODE CODE 1. The user has a passcode key and needs access to some locks 2. The user calls the operator, gives his PIN, then receives a code to use the key 1. The user has a passcode key and needs access to some locks 2. The user sends SMS and his PIN requesting access, then gets a code to use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts code to use the key, GREEN FLASH= can use the key 4. The user can now use the key on the specified locks for a defined duration (5min/30min/1HR/8HRS) 3. The user inserts code to use the key, GREEN FLASH= can use the key 34

Acsysware Introduction Reporting Tool Acsysware is a Key and Lock Management System specifically designed for industrial clients. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsysware provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks. Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys. Furthermore it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods,aes-128 bit, which prevents key duplication. Acsysware is supported by one of the most scalable and most stable databases, MS SQL Server 2008 R2, which permits the software platform to be installed across the network. Acsysware s wizard-like experience is designed to carry out error-free management of the keys and the locks. The reporting tool provides up-to-date information about all activities performed on the hardware and the software such as: access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, and user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore,with the new email notification services the reports can be sent to individual users or user groups on a daily, weekly or monthly basis. 35

Special Solutions 36

Prevent Locks Swapping A B Cording Fix the lock to truck by clipping a cable to the lock body Fix the lock to truck by welding the shackle and metal chain 37

Acsys GPS Padlock Solution Control Center Independent GPS module with SIM card and battery inside. CLOUD Remotely Control Position Remotely Control Access GPS/SMS CGS/SMS TRACK YOUR ASSETS ANYTIME, ANYWHERE All data is encrypted using 128-bit AES ENCRYPTION Acsys lock CANNOT be BUMPED OR PICKED and very hard to DRILL The Acsys GPS padlock is a standard PL5 padlock that is equipped with an additional GPS module that will transmit its position at pre-set intervals The GPS padlock solution allows you to secure any asset, control when the asset is being used and by whom, but also allows you to monitor its position and track it when it is being moved The GPS padlock is battery-operated but should the battery be drained, the padlock will still function as its power supply is coming from the key and not from the GPS unit As standard the GPS padlock is able to send up to 10 status positions within one day giving a clear overview of its position on the web-service mapping software. The battery autonomy is 10 days. Should less status positions be required (ex not on weekends) then its autonomy can be increased to about 25 days using only 3 status positions per weekday. 38

Hardware Specifications 39

Acsys Keys Specifications AKEY NORMAL (Operator Key) AKEY GuardKey (Guard Key) AKEY CGSPlus (Driver Key) Key is impossible to copy Key in Reinforced ABS, UV proof, IP55,RoHS Stainless steel blade Powered by 2x LR1 batteries Battery autonomy 2 years/25k openings Operating Temperature from -10 C to +65 C Logs last 1000 operations 4 Status LED (Access/No access/restricted Access/Low battery) OPTIONAL : USE YOUR KEY AS A BADGE = ACSYS KEY PROXIMITY/RFID ACSYS PROXKEY 40

Acsys Cylinder Locks Specifications Cylinder Locks Padlocks Blind Lock Double Lock Button Lock Locks are impossible to pick/bump Brass with stainless steel plating Power comes from key (no battery) No Wiring EURO-DIN standard Operating temperature -20 C to +85 C Logs last 1000 operations Sizes from 3cm to 14cm 41

Acsys Padlocks Specifications PL2 PL5 Padlocks are impossible to pick/bump Brass with chrome plating with plastic cover finished Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Padlocks are impossible to pick/bump Brass with chrome plating Power comes from Key (no battery) Operating temperature from -20 C to +85 C Logs last 1000 operations Water Sealing Rubber Cap 42

Programmers Specifications USB/IP Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by externaldc Power supply (IP version) In-vehicle Programmer Reinforced ABS, UV proof IP 55, RoHS Powered by 16 volt power adapter or built-in battery 43

Other Products Specifications USB/IP Programmer 3G Programmer Mobile Programmer (MoPro) Reinforced ABS, UV proof IP 55, RoHS Powered by USB (USB) Powered by externaldc Power supply (IP version) Reinforced ABS, UV proof IP 55, RoHS Powered by 6 Volt power adapter or by built-in battery Reinforced ABS, UV proof IP 55, RoHS Optional belt clip Recharge able battery 44

Quality Assurance and Awards Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000. Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA. Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications. The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years. 45

It s All About Security & Productivity REAL TIME WORLD UNIQUE WIRE FREE CONTROL & SECURE Acsys KEY 46