Home

VISIKEY User manual & Installation Guide

image

Contents

1. Setlatcho4 1 14 15 QA J SetLateno5 1 15 14 1 Setlatth 16 15 12 SetLateno7 17 16 11 Ee ResetLatchoi 14 16 11 ResetLatcho2 12 1217 Resetlathtb5 15 64 11 Restlatht 16 6 11 ResetLatcho7 17 16 1 1 ResetLatchos 1 8 6 1172 AAA NS A IA Time Zonet 1 4201 1 CS E E TimeZoneo4 24 1 72 J TimeZone05 275 4 __ TimeZoneoe 4206 75 1 E TimeZone07 227 71 6 J gj TimeZonet8 2278 717717 AAN AAA AAA OuputtO 1 O0 190 OuptO 0 Tamer OuputO3 0 82 72 Outputo4s 04 Outputo5 105 84 DorOpn Ouptt 1 06 s Dues Output O07 6 J Outputos 1 O08 87 11 OuptO O0 168 J JJ Outputio 1 gt 19 J j Of 1 8A 2 1 Oupti2 Ot 98 1 X Ol8 1892117 4584 Ol 1 28D 12 1 Output15 Ot 1 8 9 JJ Ouputi Ote 4 14 EE Imputot 104 10 oor Open Doo Open nptO 12 194 RemotReleae 13 194 J 4 J 1 14 93 9 J Input 1061848 J 11661 995 J
2. Js j 0 10 J E Imputog 118 19 Jo 1 19 168 J 39 12 24 21 N 12141 9A Imputi 122 0 98 1 Inpti3 1712 9C 11 17 1 Doo J Inuti5 17 H5 1 O 9E 1 inputi MW6 O EA C UEM UU EE II Tamper 1 050 X TameA Tampero2 7 FO A TameB Tampero3 A2 11 Tampero4 Tampero5 7 5 1 4 171 Tamer 6 17 Tampero7 7 1 686 11 Tamer8 7 8 1 1717 Tampero9 24 9 8 p 9j jJ Tamerit 1 69 J j Tamper 01 14 Tameri2 gt 1717 Tamper13 1 17 Tamperi4 4 11 j Tamperi5 Ft 6 1717 Tampri 6 1 17 1 RE NENNEN NAAA imerO T0 1 b B0 11 imr 7 m2 C 1717 02 13 8 J 4 17 14 J Timero5 715 J 1717 66 76 5 imrO7 7 7 6 11 06 o TO 84 1 fTimeroQ T9 868 J J Timerio TO 1 J imei 12 14 1 Timert2_ d e 73 imri3 13 Himri4 7 meri 72715 4 1217 16 E EM ee a
3. Access 7 8 Access 8 Hour Access 8 Hou Full Access 2 Full Access Fig 16 3 Days of Week Allocation 53 oystem Configuration in Detail lily decesos Full Access Access Y Full ccess A No Access 8 Hour Access 7 8 Hour Access Hou Full Access EE Full Access Fig 16 4 Change a Day Type within a week Defining Year Types Year Types like Week Types are made up of smaller items Each Year Type is built up from 53 Week types each week being individually assignable To build up a year with the same week simply set the first week to the required Week Type and then click on the replication button to the right of the week Select the number one This means every week of the year will be set to the same as the first The replication system allows the quick and simple setting of shift patterns If replication 2 is selected then every other week is set and if replication 3 is selected then it would be every 3 weeks Note that only the weeks subsequent to the one being selected will be modified by replication There are 32 different Year Types but the first Year Type is permanently set to No Access The Years Types may be changed as frequently as required with the modification being immediately brought into force Defining Areas An Area is a logical area in which Readers reside An Area
4. Prevent user from using key Also operate by toggle buttons Do not of course set the deletion toggle to on unless you want to delete the user from the user base Drop Menu Information Dark grey boxes should be clicked on to enter information Once clicked on a menu will appear of all the information that is allowed to go into that box Simply move the arrow down the menu until it points at the data you wish to enter and then click The data is automatically entered for you The Title Department and Technology boxes work this way 60 oystem Configuration in Detail SR521 Cardlock 000 mom E sensn E EJE Fig 16 12 Blank User Record SR521 Cardlock default gif 61 oystem Configuration in Detail 00200000 SR521 Cardlock default gif Fig 16 13 Name details entered 2335345 SR521 Cardlock Roberts default gif Fig 16 14 Keycard amp Pin details entered 62 oystem Configuration in Detail 2335345 SR521 Cardlock Robson Production default gif Fig 16 15 Entering Department details Button Click Information The Auto PIN provided you have set it see Section 10 8 and Automatically prevent Key usage at boxes are controlled by clicking on the raised buttons and small raised arrows to enter data Now let us consider how the data was entered in fig 16 13 and 16 14 Firstly the name of the key user
5. amp amp 14 18 20 21 afefala sfer 8 1011 12 13 5 16 17 18 22 23 24 25 26 27 28 9 15 28 30 31 1819 E EJ qm 22 23 24 25 26 1516 29 303 Fig 16 16 The Holiday Calendar window 66 oystem Configuration in Detail 1 fefafals 6 f7 9 10 1112 1314 15 16 17 1818 2221 15 16 17 18 19 20 21 15 16 17 18 19 20 21 Bi 8 Cn m lt Normal gt lt Normal Access gt lt Normal Access gt _ lt Normal Access gt lt Normal Access gt _ 1121 3 4 5 lt NormalAccess gt Y 46 7 8 81011121314 8 8 1011 12 13 14 9 10 11 12 13 ajs 1112 18 19 25 26 910 15 16 17 14 15 16 17 18 19 20 21 17 18 18 20 21 21 22 2 Fig 16 17 Holiday Access Rights for July 3rd Use of the Monitor Window The Monitor window is opened by clicking on the Monitor option When first opened it fills the entire screen but you may wish to re size it see fig 16 17 On this screen are displayed the major transactions which occur within the system These are 67 oystem Configuration in Detail Internal S ystem messages e g Login addition of a user MUX messages Card Transactions Reader Messages e g alarm messages P rint output User Search results including Muster Dumps Time and Attendance output History Recall output The Monitor window is best displayed permanently but you may not wis
6. To see the other options click on the dark grey bar set by default to Normal Access Every previously defined Day Type is available If you have previously defined a Day Type labelled Normal Access yourself then there will be two of these available to choose from but the VISIKEY will be able to distinguish between them Move down the menu and click on the Day Type which you wish to enter Go through and set the access rights for that particular date for every department If you do not set a new Day Type then the Normal Access option will remain A No Access Day Type as automatically defined by the system will be available Use this to label those departments which are not allowed building access on that date Those departments which are allowed access on that date will have the same Area access rights as a normal day but the times of this access may have changed depending on whether a new Day Type has been specified Move through the year setting holiday access rights as necessary When you are finished simply click on the close icon 65 oystem Configuration in Detail T c T T m SHHE BEAR BEAR ER RR MN mM m mM om m i m Me m i m co un m Im v T rm T GEHEN MEJIA m 0 0 238 afojelals LW m d afofelo
7. or D O B 2 The default information contained in the field 3 The size of the field To open the User Fields window select it through the Config Menu See fig 16 11 Both types of field can be customised through this window To set a yes no field which is controlled through the grey toggle buttons click on one of the eight grey boxes in the Marker section When the cursor appears type in the text This text will now appear in the Create User menu when it is next opened and you can set a yes or no answer to it for every user As an example this field could have the option Fire fighter added The second type of field is slightly more complex There are five sub fields and each has a text message and can contain up to 16 characters or numbers about a user in answer to that message As an example this field has been pre set with Sex and D O B in the figures but all five separate areas of the field can be changed as desired To set the message for a sub field click on a box below the Sex and D O B messages already set and enter the message text when the cursor appears Now click on the box across from this beneath the m and the dd mm yyyy This box will appear ready to accept 5 System Configuration in Detail information when the Create User window is next selected In this box you are setting the default contents for that field Look at the entry for the D O B option It gives
8. 9 10 The COMMs Port I O window sub area configuration This option is available to the Morley DPUs and allows up to 16 sub areas to be specified from within a main area via a keypad The SUB AREAS option is present within LOOPS amp READERS at any reader configured as an ISC DPU Clicking on the SUB AREAS option 30 the config menu box at the bottom right of the READER LOOP window See Fig 9 11 brings up the window shown in Fig 9 12 in which 16 areas can be allocated to corresponding keypad buttons labeled 0 to F Note these sub areas must be entered earlier in the AREA NAMES amp option in the CONFIG menu Once configured the user will be marked into the area assigned to the button depressed Reader 1 1 Nexus ml Reader 1 2 Reader 1 3 Reader 1 5 Header 1 5 Second Floor Header 1 4 First Floor Reader 1 7 Third Floor Fig 9 11 Reader configuration window 31 the config menu Fco uu ccu MT UNICO 1 FirstFloor m second Floor Third Floor Fourth Floor gj menm Reception MZ Reception 2 FirstFloor FirstFloor A SecondFloor Third Floor MZ Fig 9 12 Sub Area configuration window 32 users menu Chapter Nine USERS Menu Create User s Allows the creation of one or more Keycard Holders Simply fill in the relevant fields and select Accept The process is described i
9. Areas 1 to 128 Loop A Loop number from 0 to 17 for Loops 1 to 18 83 Reader A Reader number from to 127 for Readers 1 to 128 Fore Col amp Back Col A colour number from O to 15 Point Size point size from 1 to 63 X and Y Co ordinates A co ordinate value from O to 4095 Fill and Line Whether a shape has a filled interior and or an outline Appendix 3 Glossary of terms VISIKEY Access Control System i e the VISIKEY Access Rights The Area and time limits of access assigned to a Department Alarm An alert indicating abnormal system condition e g a fire alarm Alarm window window that allows the custom setting of alarm messages including instructions e g Fire alert emergency services AND a logical operator in Boolean Algebra which only gives a true result if both inputs are true Anti Passback a security feature which prevents card tag sharing and lending by employees Abbreviated to APB Anti Passback level the operator defined security level of an Area A higher number means a higher level All lower levels must have been entered before access to the next level is allowed APB Anti Passback Area a pre defined set of physical limits within a building e g store room laboratory Defined by the readers on its outer periphery Back up a second copy of a file or set of files kept for added security Usually kept on a physical medium i e a hard disc or on pape
10. For example one of the relays should be connected to the circuit which activates the door lock mechanism thereby allowing the reader to operate the door Other output line relays could be connected to for example an alarm bell or a siren The setting of these relays is a hardware task and should be considered when the VISIKEY is being installed The Alarm lines are read into the VISIKEY computer and are detected by the system software This software can then configure the system response to the alarm condition The VISIKEY software could trigger alarm messages as previously set display Alarm Windows make audible alarms and or create Muster lists on selected groups Standard Logid Standard AROC gt EN Fig 18 1 The Reader Logic Library window 70 ________ MNS 0 2 mjDereen o Fig 18 2 Reader Logic Entry window The alarm program line is entered on the light grey line opposite the relevant Alarm line the Alarm name is entered into the dark grey bar below The Alarm name is selected from a drop down menu thus Alarms and their text messages must be set beforehand otherwise they will not appear on this menu The Timer lines are for internal use only They control the timing of reader operations For example the time allowed to open the door after card removal can be set in this way The time is sel
11. Header This searches for all occurrences of the specified Reader including card transactions and reader alarms Area This searches for all occurrences of the specified Area including card transactions and all reader information from within that Area Keynumber This searches for all occurrences of the specified Keynumber including user creation and Key usage Technology This searches for all occurrences of the specified Technology type 46 history recall Transaction This searches for all occurrences of the specified transaction These transactions include Permit Entry Key Not Known Error Time Zone Error APB Error Area Full Area Access Error and PIN error This is useful for finding all illegal PIN usages within a week at a particular reader for example When this window is initially opened all options are cleared The first operation to carryout is to specify which history file is to be used As all other options are cleared clicking on the search button now will retrieve everything from the file When a history file is almost full warning will be given and when it is full a further warning is given and it starts to overwrite the earliest entries It is wise to print out the entire file when it first warns the user of being almost full This can be carried out as explained in the previous paragraph The printed copy may then be stored away for future referenc 47 49 System Configuration in Detail Chapter Four
12. alarm condition to source this procedure This could be a CCM unit Contact Condition Monitor connected to an UPS Uninterruptable Power Supply mains failure output The backing up time option sets the frequency with which the system automatically writes a copy of its current files onto the hard drive This is a precautionary measure against complete power failure or any other event which may cause the computer memory to be wiped or otherwise disrupted It is an important option and its use should be carefully considered It is rarely necessary to make a back up copy of the system records every minute a back up time of once a day should prove sufficient for most users Remember the more often the system records are backed up the less data will be lost if there is a disruption Backing up to floppy disc is carried out by clicking on one of two buttons marked A and B representing the two possible floppy drives on the host computer To backup place a formatted disc into the required drive and clock on the drive button The backup shall take place On completion simply remove the disc and store it in a safe place If during a backup a textual message appears explaining a disc error then refer to your Windows help about which action you should take Please note that whilst this error is displayed and the system is awaiting your response the VISIKEY has ceased operation temporarily The company name as set by the user is continuously
13. all levels with a lower value is set by defining which area the current area resides e g The Stores area may be within the Admin area person cannot re enter a certain level without first having left it This prevents card lending between employees Area with an level set must therefore have one or more in and out readers so that the VISIKEY can monitor both entries and exits of personnel An Area with an APB level can also be set with a maximum capacity limit if required Once this limit is reached no more persons will be admitted until someone has left There can be up to 128 areas Capacity List Allows the setting of capacities in the Capacities menu which will appear when selected through the option above for setting Area capacities Loops and Readers See Fig 9 6 The initial window allows the definition of loop names for a specified group of DPUs and the setting of which loop is controlled by which COMMs port From the Loops window further loop dependant windows contain information about individual DPUs on a loop such as the readers Technology Card or IR tag etc Logic Type how reader operates Reader Type APB type etc the Area in which it resides the ISO Track Read direction resource specification and the number of reader heads the DPU supports 23 the config menu Reader Logic Allows setting of names for logic type and entry editing of DPU scripts For more informatio
14. and timers Reader integration into the system is through defining relationships between reader events and system functions Specifications features Any alarm condition key transaction or console activity may be sent to a real time window remote display terminals printers files and or other computers through a RS232 port Each output device can be configured to display only information in a particular group e g only alarm conditions The VISIKEY specification is as follows Number of doors 512 Number of readers 512 Number of key holders 65 000 Number of day types 32 Number of week types 32 Number of year types 32 Number of physical mapped areas 128 Number of digital inputs 1024 Number of digital outputs 3072 Number of DPUs 128 Number of slave terminals Multi User 7 Host Holiday schedule Yes Password control Yes Anti P assback Yes Program supervision Yes History recall Yes Colour graphics Yes Programmable alarms Yes Area accounting Yes Plans and maps Yes Multiple reporting monitor output Yes Full override on individual readers Yes Full override on individual areas Yes Full override on individual loops Yes Full override on whole system Yes DPUs have Time Dependencies Yes Keyboard less operation Yes Programmable DPU script language Yes DPU interaction with other systems Yes Localised process contro Yes Real time reader information Yes Real
15. electrical circuits shown below the bulb will light if either of the two switches is closed In ii it will light only if both switches are closed We can represent the positions of the switches by a 1 if the switch is closed i e current flows through it and 0 if the switch is open no current Now for the bulb we can assign values in the same fashion a 1 if the bulb is lit current flows through it and a 0 if it is not no current flows Using these values we can tabulate the actions of both circuits Circuit 1 77 Circuit ii pw pe We can see that the bulb in circuit i will light if either switch 1 OR switch 2 is closed For circuit ii the bulb will light only if switch one AND switch 2 are closed Circuit one illustrates the action of what is known in Boolean Algebra as an OR operator Circuit 2 acts like an AND operator The tables we have made that show their responses are known as truth tables All possible inputs are entered and the results calculated The action of a operator is completely described by its truth table An OR operator gives a true result if any of its inputs are true An AND operator gives a true result if and only if both inputs are true The VISIKEY also allows the use of two more operators the NOT operator and the Exclusive OR operator The NOT operator has only one input and its output is the opposite of this It inverts th
16. logical operator used in Boolean Algebra Gives a true output if one and only one of its inputs is true EPROM Erasable Programmable Read Only Memory Holiday information operator configurable information which can override pre set Access Rights on specific dates Icon a small displayed graphic which performs a specific operation when selected e g the CLOSE icon 85 Keycard a plastic card with an attached magnetic strip This strip holds the users key number which is read by the card reader when the Keycard is inserted 1 0 Input Output The operations by which the system receives information from and sends information to other devices Key holder a person who holds either Keycard or an IR tag Key number the 16 digit identifying number of a user LED Light Emitting Diode A small light emitting device Login or Log in the action whereby an operator enters their user name and Password to inform the VISIKEY that they wish to use the system as a system operator Logout or Log out the action performed when leaving the VISIKEY to inform it that an operator has left the system Loop a series of readers physically linked by a common communication system LSB Least Significant Bit Megabyte Mbyte or Mb one million bytes of possible information storage space Effectively storage space for one million characters Menu a display of a number of selectable options Mouse a pointing device whic
17. operator to change the VISIKEY s operational parameters instantly Computer specification e P3500Mhz Personal Computer or better e 100Mbyte free hard disc drive larger drives permit larger history files e 1 44Mbyte 3 5 floppy disc drive for installation VGA interface card or higher preferably with XGA driver SVGA colour monitor or higher XT AT type keyboard Mouse trackerball or other pointing device Microsoft Mouse compatible windows and pointers Chapter Five ooftware Installation To run the system first install the Security Device This device should be plugged into the Parallel Printer Port at the back of the PC This device MUST ALWAYS be present whilst using the VISIKEY else no communication to any serial COMMs or printer port is possible When an upgrade of software becomes available the new installation will not cause the previous configuration to be lost The old backup file will be accepted by the newer VISIKEY To carryout the installation upgrade place the VisiKey installation disc into the A floppy drive select RUN from the start menu computer Type A SETUP lt Enter gt And follow the on screen prompts Next insert the Hardware key driver installation disk into the A floppy drive select RUN from the start menu computer Type A DK2WIN32 lt Enter gt And follow the on screen prompts After installation of the hardware key drivers your machine will reset Once windows has reloa
18. same level as the left hand box Again a menu drops down Add the number of characters in the answer you expect to the number in the left hand box Click on this number This tells the VISIKEY software where the data for that sub field ends Although this procedure might sound quite complex it is in fact very simple and easy to become accustomed to User definable fields can be very useful and the questions asked through them should be carefully considered 58 oystem Configuration in Detail Visto CarReg O First Aider pos Fig 16 11 User Field Configuration window Entering a New Card Holder The VISIKEY can support up to 65 thousand Keycard Holders each of which can have certain departmental limits of building access The window used to enter the details of a new Keycard Holder is shown in fig 16 11 This window can also be used to edit previously entered details To open this window first select the Key user base option from the Primary option menu by clicking on it once A menu will pop up Move up to the Create new user option and click The window as in fig 16 12 will now appear Once the window is opened look at the categories to be entered Now look at fig 16 12 Some of these categories have already been filled in by default These can be changed if required Information is entered into the new Keycard Holder screen in the following ways Textual Information By placing the cursor i
19. second window entitled Access Hights and it is within this second window that the access rights of the particular department are defined These access rights are defined in terms of Areas and Year Types Type in the name of the Department and press the Return key You will notice that every Department name has a thin grey button to the right of it to open the access rights window The Access Rights window is shown in figs 16 8 16 9 and 16 10 If you do not enter a particular Area into the Access Hights window for a particular Department that Department will by default have no access to that particular Area Once all of the Areas have been entered into the Access Rights window for a particular Department you can then enter the access Week Type for that Area Look at figs 16 8 to 16 10 While the Sales Department can enter the main office and the demo room they have no access to the stores The access rights of the sales department are changed to give normal access to stores When planning the Year types to enter into the Access Rights menu it is often better to work backwards Decide which Areas a Department should NOT have access to and then you can ignore these entries as they are blank by default Now consider those Areas to which a Department must have access Decide on the times at which a Department should have access to a particular Area and which Year type this is If it is not one of your previously defined Year types than
20. the lowest frequency The pitch step is also in the range of 0 to 16383 The pitch step rate is a temporal distance between each pitch step This is counted in 53ms steps 1 18 2 of a second The overall duration of the sound is also in defined in multiples of o3ms 28 the config menu 0 15300 1 54 0 3280 1 O 944 1 54 o 0 1 o 8 o 1 je o o 1 0 90 0 1 0 o 0 1 0 o 0 1 Warning m Fig 9 9 The Sound definition library Monitors and Outputs Allows the setting of up to eight output devices for the printing and or logging of all or any combination of VISIKEY monitor registering operations Files MDA type i e monochrome monitors COMM ports and windows can all be addressed individually by the VISIKEY and any combination of monitor information sent to each e g all types of monitor information could be sent to a file on a remote computer via the COMMs link for added security History files are created from this option The operator must specify the size in total number of single line entries and name of the file in DOS filename restriction format and select the CREATE button The VISIKEY will create the file but will truncate it if insufficient disc space if available See Section 10 The MONITOR Option COMMs Port I O See Fig 9 10 The COMMs Port I O window allows the I O Input Output port address and IRQ Interrupt Request vectors
21. the specified format in which you are supposed to enter the information about a person s birth It is to consist of two numbers for the day always two and no fewer so the third would be entered 03 a dash then two numbers for the month e g July would be 4077 and four numbers for the year e g 1967 This in this case would look like 03 07 1993 The system will not distinguish between letters and numbers or any other characters in these entries as these fields are totally configurable and the VISIKEY software does not filter them in any way You should therefore make the format in which you expect data entry as clear as possible If you wished to enter data for Registration you would set the default contents to seven characters such as seven x dummy letters You can use any letters you wish here to indicate the information format Once you have entered the text and answer format for your field you must then tell the VISIKEY how much data to expect The number of bytes of information is the same as the number of characters in the answer box Firstly click on the left hand dark grey box between the text and answer columns This tells the VISIKEY software where your data will start A menu will drop down Click on the number that is one greater than the number in the right hand dark grey box on the level above This number will now appear in the lower left hand box Now click on the right hand dark grey box on the
22. window displays the following information 41 control menu The number of readers in the Area The APB level of the Area The maximum capacity limit of the Area The current capacity of the Area There is also a button labelled Open MROC for Area This opens an MROC window with the MROC commands as above for that Area only Reader 1 1 Loop masteri Reception APB Root Unknown Undefined Information No DPU Upload 21 Cardlock standard Logic Wed 22 Sep 1999 04 02 56 NEXUS Mark Thompson Tue 28 Sep 1999 15 13 20 Fig 13 1 Area and Reader Information windows Header Info This operation opens a window which shows information on a selected Reader Selecting the Reader Info option from the Control menu opens a menu which lists all Readers by name 42 control menu Clicking on one of the Readers then opens another window which contains information about the Reader This window displays the following information The Reader s name Loop on which the Reader is placed The Area in which the Reader resides The COMM s loop the Reader s controlling MUX is connected The current real time status of the Reader i e On line Off line Pending The Reader type i e On line APB IN etc The Logic Type the reader s reader script The Reader s Technology i e Watermark Wiegand etc The Reader s Resources The Reader s APB level as defined by the Area The Rea
23. you can return to the Year types menu and define it Most organisations will find that most of their employees can be catered for using a small core of Year types leaving the others free for more specialised access requirements 55 oystem Configuration in Detail Having decided on which Year type satisfies the access requirements for a particular Area and Department this can then be entered alongside the Area name in the corresponding Access Rights window Simply click on the dark grey box opposite the required Area A menu will drop down Select the required Year type and click It is automatically entered Continue this procedure for every Area for each Department in turn Once this is done the Access Rights for all Keycard Holders have been defined Repairs Fig 16 7 Department List 56 oystem Configuration in Detail pum Repairs Lily Access Full Access Full Access Fig 16 8 Department List with Access Rights for Sales Defining User Fields The VISIKEY has two separate types of user configurable fields those which contain the answers to yes no questions e g is the Keycard Holder a first aider and those which hold a longer piece of textual information e g a date of birth Textual User Fields are provided in the VISIKEY to allow for the customisation of Keycard Holder records A textual User Field consists of three parts 1 The text of the field which is its title e g first aider
24. MORLEY ELECTRONICS LIMITED VISIKEY User manual amp Installation Guide Morley Electronics Ltd Unit 34 Moorland Way Nelson Park Cramlington Northumberland NE23 1WE Tel 44 0 1670 732444 Fax 44 0 1670 707333 Email accesssales morleyuk co uk Web www morleyuk co uk Table of Contents Chapter One 1 Overview of the VISIKEY 1 Chapter Two 3 Features and Specifications 3 Chapter Three 7 Operating Methods 7 Use of a Keycard 7 Use of an Infra red Tag 7 REV Wisin 8 Chapter Four 9 Computing Requirements 9 Computer specification 9 Chapter Five 11 Software Installation 11 Express Install 11 Chapter SEX uos tetas 13 Changing Passwords 13 Chapter Seven I5 The System Menu 15 Who is Logged On 15 Enabling Other Operators15 HE nS 16 ROSA rs 16 Shut Down 16 Environment 16 Force Backup 18 Chapter Eight ene iia 19 The CONFIG Menu 19 Day 19 Week TYPES 19 Year Type 19 Hold Sails 19 Departments 19 User Fields see fig 9 2 21 ar 21 PIN Algorithm 21 Fig 9 3 Titl
25. Other Operators Once the Supervisor log in name and password have been selected then the access rights of other operators of the system software can be defined More than one operator can have full access rights if necessary This section will tell you how to enter the user names of other users their passwords and how to define the access rights that they have It is recommended that more than one person has access to the full range of system rights in case of sickness or accident This could be done simply by having two people log in as the same person i e as SUPERVISOR with the appropriate password which you should have changed This however will not allow you to distinguish between these persons on the security record It is therefore recommended that these two persons have entirely separate user names and passwords Passwords should of course be kept secret The more widely that passwords and their associated user names become known then the greater the risk to system security Two persons should not have the same user name the system menu Once you have decided on the rights for the other operators of the system return to the Password window by selecting the System Menu and then selecting Passwords on the menu Now you can enter the names of the other system operators and their access rights Click on the left hand side in the column entitled User name The cursor will appear Make sure that this cursor is at the f
26. RC Watermark Wiegand 24bit Hex and Wiegand 24bit BCD Interconnectivity This allows system variables to be processed and then made accessible to all DPUs on the system For example a flag indicating that no one is left within a building so the lights may be turned off This information would be sent to ALL DPUs and they may take action accordingly Codes for Global Scripts area count area num ccm state loop reader lt head gt ccm num alarm state loop reader lt head gt alarm num var state var num These may be used in global scripts Interconnectivity in such examples as below area count 3 lt 2 This means the statement is true when the count of people in an area must be APB area is less than 2 Floor Plans Allows the setting of up to 32 floor plan textual descriptions and the filename of the plan file Fig 9 5 Floor Plans window 25 the config menu ini x Reader nexus EJ JL gt Reader Reception E gt Readers Reception gt 1 Reception E gt Reader 800 Reception gt Reader 1 6 Reception C gt _ Reader 1 7 Reception E gt Reader 1 8 Reception gt Reader Nexus E Reception E gt Reader 2 2 Reception gt Reader 2 3 Reception C gt Reader 2 4 Reception D gt Reader 2 5 Reception gt ic 207010101120 Fig 9 6 Readers within loop Alarm Messages sy Mainsfall Main
27. Zoom window Zoom Control This opens the zoom control window opened automatically when selecting the above To alter the zoom ratio simply click on one of the pair of arrows on the required side of the ratio Left arrow decreases the number right arrow increases it A button is also supplied to reset the zoom ratio to 1 1 MROC all loops Manual Reader Over Ride Command Allows the selection of a pre defined reader control function to be sent to all reader loops effectively to all readers For example if it is necessary to evacuate the building rapidly then all door latches could be opened by a manual over ride command The commands available are e Open Door e Reset Reader a loop Allows manual over ride command of a single loop with the same command options as all loops MROC an Area Allows a manual over ride command to be sent to all readers within a previously defined Area All defined areas have a text label Same command options as MROC all loops MROC a reader Allows a manual over ride command to be sent to a particular reader Same command options as MROC all loops Area Info This operation opens a window which shows information on a selected Area Selecting the Area Info option from the Control menu opens a menu which lists all building Areas by name Clicking on one of the areas then opens another window which contains information about the readers in that Area This
28. also be subject to remotely controlled manual override via simple mouse clicks if this should prove to be necessary Key holders can be tracked through the building in real time Their access rights to building areas can be altered immediately or when appropriate giving immediate results Each key holder is assigned to a Department which in turn has certain specified access rights to different Areas at different times of day week and year These may be overridden by Holiday Information which allows each department to be assigned different access rights on particular days of the year Key holders be set to time out at a particular time and date rendering their key inoperative after a specified time but retaining their details within the system Along with essential key holder information the System User may configure the key holder database to have fields which are unique to the users application Each key holder may be assigned to be a visitor or a first aider or any other class of person the application requires Each key holder may have eight yes no pieces of this type of information held about him her Search criteria can also be any other piece of key holder information e g search by surname Door Processing Unit DPU e g card or tag reader controller operation is configurable by the use of reader scripts These allow the system operator to control reader outputs and system alarms which may also depend on other inputs
29. am DS Aamos 1 1 O03 J J 9 J Aamos 1 405 w J j J J Aamos 1 A6 15 JJ J J J J Aam07 1 A07 1 So e e Aamos 1 A08 1051717 Aamos A090 Aamio 1 So e o Aami a 1 j Aami Nami3 1 E E Aamis Aami5 7 AS E 4 21 Aami6 17 SE 12 1 PS ESA Ao E 1 CCMina co DM COM2 1 4 04 1 1 0 5 CCMinOO 1 06 D COM6 ccmino 07 1 16 COM7 CcCMn 1 08 CcCMn 9 CCMIniO ccm 12 17 2 1 2 fp Operators Token Hex 28 An example of a program line could be Output 1 Input 3 AND NOT Input 5 74 Now because of the use of RPN this would become Output 1 Input 3 Input 5 NOT AND In the abbreviated mnemonic language this would be O01 103 105 amp and this is what you would enter into the system Once recognised by the VISIKEY this form would then be tokenised Tokenising would give 80 92 94 F2 FO and this is the form in which the program would be sent to the relevant readers 75 76 Appendix 1 Boolean Algebra RPN This is a system of logical operators based on a binary system Consider the two
30. ar left hand side of the box either by clicking with the mouse pointer there or by moving it there from the keyboard using the arrow keys Now enter the user name followed by Enter Now move across to the box on the right hand side in the Password column and enter the operators password Press Enter again Another operator has been added to the system Repeat this process as many times as is necessary up to eight times Operators may be allowed to choose their own passwords but they should keep these secret Only the specific operator and persons with System access should know other operators passwords Passwords should not be anything obvious e g a wife son or daughters name or a telephone number Easily guessed passwords like these can threaten system security A good way to choose passwords is to randomly open a dictionary and choose the first word of at least six letters on that page Thus the password choosing process is randomised and unauthorised tampering with the system made much more difficult Quit This option returns program control back to the shell that launched the VISIKEY It is not recommended that the computer controlling the VISIKEY is used for other tasks as this could lead to compromises in building access control and security The system will place all readers into standalone mode if this option is chosen Restart Restarts the VISIKEY All system files are saved ready to be re loaded This is useful if t
31. art and Stop times This informs the VISIKEY the time range in which records are to be checked The earliest time cannot be before the creation of the history file specified and the stop time cannot be beyond the current time The times may be changed in steps of minutes hours days and weeks and may be set to the earliest or latest time Search on Particular Group This informs the VISIKEY which type of group should be sought These groups are Internal Multiplexor Key Transactions Reader Alarms Print Output User Searches Time amp Attendance Collation and other previous HRP output These groups are used in the MONITORS AND OUTPUTS section to specify which messages are sent to which files printers etc Search on Textual Content Wild card In this a textual string needs to be specified and checks if any record contains this string Alarm Occurrences and Acknowledgements This searches for all occurrences of the specified Alarm including the actual alarm it s acknowledgement flushing or being dropped from the bottom of the alarm stack Departmental Search This searches for all occurrences of the specified user Department including card transactions user creation etc Search When a Certain Operation is Present This searches for all occurrences of the specified Operator This covers EVERY record when an operator is logged in This is very useful to see what happened when ABC was logged in last Thursday week for example
32. ded run the VisiKey software which is located in the Morley folder in the Applications menu NOTE If you have requested a Desktop shortcut to VisiKey software use the shortcut only to run the software do not use the shortcut whilst the software is already in operation If you require to maximise the software whilst in operation click on the key Icon located in the application tray Express Install The VisiKey software includes an Express install feature which allows a initial system configuration to be carried out with limited system knowledge This option is located in the Config menu Note that to obtain access to this menu option you must have set the password access rights to allow Config access windows and pointers Your company name Morley Wiegand IECMUX Nexus CARA Fig 5 1 Express installation dialog box To carryout an express install first enter the end users company name in the box provided Next select the reader technology type to be used on the system If the system is an RS232 or RS485 based network the Loop Type should be set to IEC MUX Determine which serial port you wish to use on the PC an select it in the Comm Port selection box Finaly select the number of controllers you wish to configure and the type of controllers being used You are now ready to configure the system depress the Okay button at this point you will be asked to verify the co
33. der s current CCM state where applicable The last user to use the Reader and at what time Real time indication of alarms from the Reader The hardware type of the Reader R100 R500 ISC etc version number and issue date of the software and the serial number There is also a button labelled MROC This opens an MROC window with the MROC commands as above for that Reader only Heset MUXs This operation sends a reset command to all multiplexors This forces the multiplexors to request re initialisation The MUXs also reset all readers This allows an operator to put the system into a defined and stabilised state 43 history recall Chapter Thirteen History Recall The History Recall System allows the operator to selectively search and display past historical events from the VISIKEY s past Just about every single event is logged and has or more properties for which a search can recognise history History 00 00 00 12 00 00 AM a Fig 14 1 The History Recall window The search system is a simple logical AND scenario whereby each option specified must match if a record is to be displayed The options are detailed below to aid comprehension History File to Search This informs the VISIKEY which history file is to be searched as the VISIKEY may have up to 7 different history files running concurrently collecting the same or different information 45 history recall ot
34. displayed in the bottom left hand corner of the screen whilst the system is in operation unless it is covered by an active window Force Backup This forces a backup of the entire system set up and Keycard Holders to the hard drive This should be used on a regular basis when entering lots of information into the VISIKEY to ensure a copy is stored away The timed backup carries out the same function but on defined time periods the config menu Chapter Eight The CONFIG Menu The options available from this menu allow the custom configuration of the system to the users requirements The setting of these should be carefully considered Before using these options you should consult the manual Chapter 15 Planning Your System Day Types There are 32 different Day Types which are user defined Each Day Type can have up to eight start stop time ranges included in it Each Day Type is labeled with a particular name of the operators choosing As an example a Day Type which allowed access from 8 45 a m to 5 30 p m could be labeled Normal Day a Day Type that allowed no access could be labeled Access Each Day Type is also allocated a particular label by which it is addressed e g Normal Day Week Types There are 32 different Week Types which are user defined Each Week Type consists of a list of seven Day Types entered by the operator and addressed by their previously assigned labels e g Normal Day or No Acces
35. e PIN Algorithm Monitor Control and Capacities Windows 22 Time amp Attendance Reason Sou d 23 Time amp Attendance Output TNR 23 Area Names and Capacity 23 Capacity 23 Loops and Readers 23 Reader Logic 24 Reader Resources 24 Reader Keypad Layouts 24 Reader Technologies 24 Interconnectivity 25 Codes for Global Scripts 25 Floor Plans ui a 25 Alarm Messages 26 Alarm WindowS 21 Alarm Sounds 28 Monitors and Outputs 29 COMMs Port I O 20 Sub area configuration 30 Chapter Nine 33 USERS Mensa tcs 33 Create 33 Find series 33 Pack User Base 33 Group user changes 34 Chapter Ten 37 MONITOR Option 37 Chapter Eleven 39 LOGIN Menu 39 Change Password 39 LOS 39 Chapter Twelve 41 CONTROL Menu 4 Plans and Maps 41 Zoom Control 4 all loops 4 MROC a loop 4 MROC an Area 4 a reader 4 ATCA No 41 Reader Info 42 Reset 43 Chapter Thirteen 45 His
36. e input The EOR operator gives a true output 1 only if one of the inputs is true If both or neither are true then the output is false 78 Truth tables for EOR amp NOT operators EOR Input 1 Input 2 Output sr 3 E MEE NEN ER NN Reverse Polish Notation RPN Reverse Polish Notation although it may at first seem complex is actually based on a very simple system Expressions in RPN form show exactly how a calculation will be carried out by a computer When carrying out calculations the computer utilises an area of memory known as the STACK This stack may be regarded as a pile of plates each of which has a number written on it Plates may only be removed or placed onto the pile at the very top Only the number on the topmost plate can be read When doing calculations the computer examines the operation to be carried out and then takes a number from the top of the stack It will then either operate on this number alone e g if itis a NOT operation or it will take the next number from the stack which has now risen to the top and combine it with the previous number e g for AND OR and EOR operations The result of this operation on either one or two numbers operands is then placed pushed onto the stack at the top Other numbers can then be added to the top of the stack and the result will sink down but not be forgotten or the result can be used immediately in another calculatio
37. e machine PIN Personal Identification Number This number is typed into a keypad on readers as necessary It is unique to each user and each user should keep their PIN secret PIN algorithm a method of automatically assigning PINs to users Pointer the on screen arrow icon which is controlled by the pointing device PRINT icon opens a print options window allowing the printing of a window contents Quit an option which allows the computer to leave the VISIKEY completely It is not recommended that you do this as system security may be compromised RAM Random Access Memory Memory in which changeable information can be stored Header a card reader or tag reader Reader Logic the series of programmed lines which controls the physical operation of a particular reader or group of readers Reader Resources a lookup table allocation physical I O a DPU to logical within individual logical readers RPN Reverse Polish Notation See Programming a Reader and Appendix 4 Single User allows only one console operator to access the VISIKEY Supervisor the default user name of a VISIKEY operator with complete access to all system functions 87 Tag reader a reader which reads the Keynumber from IR tags Technology the reader input medium e g Keycards or IR tags Title bar the bar at the top of a window which displays the window name it is also a drag icon allowing the window to be positioned a
38. ected from a drop down menu giving a range of 0 05 to 59 95 0 15 increments The Latch lines allow the setting and resetting of latches The Reader System Alarms cover occurrences such as an invalid card transaction or reader going off line due to a telemetry failure These alarms can cause Alarm Windows or Pages to appear on the VISIKEY screen 71 The Transaction Verification System allows the checking of a person passing through a turnstile for example before updating their APB level The two lines of script used for this facility Transaction Okay and Transaction Void only become TRUE on the falling edge of a script lines Alarm Output Input CCM Latch and Timer conditions can all be used freely in any expression but beware strange results can occur when cross referencing conditions This can lead to oscillations of outputs and alarms Writing a Program VISIKEY programs are first written using a mnemonic language This mnemonic language is then entered into the relevant section of the Reader Logic window The VISIKEY will then tokenise every program line i e a number is assigned to each operator and operand and these tokens are then sent to the relevant readers The operands available through the Reader Logic window are present EE dE Transaction 1 TramsOkay 02 74 TranVoid Trans Void NO FF gt Setlatho 104 1 50
39. en you have the time and date you want simply stop You cannot go back past the current time and date Once the configured time and date have been reached the Prevent Card Usage button is automatically set rendering the card useless The configured output devices are informed of the event When you have entered the data in the key user window to your satisfaction simply click on the Update box Remember that you can alter data as much as you wish going back to boxes and changing them until you are completely satisfied It is only when you click on Update that the record will be entered into the system If you decide not to enter the user into the system simply click on abandon and the data will be ignored and the window will close The entering of new key users is registered on the monitor screen and on whichever external devices are set to receive that category of monitor information Multiple Keycard Holders may be entered with the same details All that is required is a surname possible a dummy name technology type initial Key number and Department Up to 500 entries may be created by setting the appropriate entry at the bottom of the User Record The increment type BCD or HEX means whether or not the resulting numbers contain HEX digits i e A to F This is generally set to BCD NOTE The technology label Watermark indicates that the user has been assigned as Keycard holder with a Watermark ca
40. h and using Group changes disable all visitors cards 34 users menu This is achieved by use of a search in the FIND USER option to specify the group of Keycard holders that require modification As another example consider Fig s 10 3 to 10 6 Suppose the repair department was to become defunct and its Keycard holders were to be moved into the production department Using the FIND USER option on the KEY USER BASE menu a search would be carried out for the repair departments key holders l e Enter the REPAIR option from the drop down menu on the grey DEPARTMENT box Fig 10 3 and click on ACCEPT to start search A window titled FOUND KEY USERS will appear indicating the number of key users found Fig 10 4 Clicking on the GROUP CHANGE OPTIONS will then bring up the window shown in Fig 10 5 From the drop down menu on the department box enter the PRODUCTION option Then enable this by clicking the white box to the ON state and clicking the grey change button on the bottom left of the window The Keycard holders that were allocated to the repair department should now be in the production department Fig 10 3 User search window 35 users menu Fig10 4 Search Result window Production E Fig 10 5 Group change window 36 monitor option Chapter Ten MONITOR Option Selecting this option displays the main log monitor which records any or all major system events These events Inter
41. h controls the pointer when moved across a smooth surface Has one or more buttons to allow clicking and Dragging MROC Manual Reader Override Command Allows direct control of a reader or set of readers by a VISIKEY operator MSB Most Significant Bit Multiplexor a device which allows and controls the connection of many communications lines Multi User allows several console operators to concurrently access the VISIKEY MUX An abbreviation for Multiplexor NOT gate a Boolean operator which gives the inverse of its input as the output Off line reader a card or tag reader which has control over its own function i e it can decide Access Hights without needing to consult the central VISIKEY database 86 On line reader a card or tag reader which consults the VISIKEY central database before allowing or denying entry Operator a person with the right to control the VISIKEY The level of control allowed can be set through the SYSTEM menu OR gate a Boolean operator which gives a true output if either or both of its inputs are true Packing the process of increasing VISIKEY efficiency by compacting the key holder database and removing any records no longer required Password the secret word unique to each operator which ensures that the VISIKEY is aware of who is operating the system at any given time It is entered when Logging on PC Personal Computer Usually implies an IBM or compatibl
42. h it to cover the whole window If you do re size the window then move the side bar down so that you are looking at the bottom end of the window display as this is where all of the latest transactions are reported The Monitor window can be set to open automatically on any monitor output Simply set the Start Monitor on Message option with Monitors and Outputs option with the CONFIG menu The window will open with the same size and in the same position as it was when it was last closed Other monitors can also be set e g a printer which is set to monitor certain transactions Their can be up to eight monitors including the monitor window Each monitor can be set to record any combination of the monitored events as mentioned above Primary System Monitor Fig 16 18 Inbuilt Monitor window 68 Planning Your System Chapter Fifteen Planning Your System Having read the previous section you should now be familiar with the capabilities of the VISIKEY We will consider here how to plan a system whose details can then be entered as previously described The first requirement is a plan of the layout of your organisation It does not have to be to scale but should include the locations of all readers and their APB numbers and also notes of any special requirements Remember APB numbers increase as more restricted levels are reached To calculate the APB level of a certain Area simply count the number of APB registered readers thr
43. he configuration of the system has been changed and will not take effect until the system is restarted The system will place all readers into standalone mode for the duration of shutting down the system and restarting if this option is chosen Shut Down This will save all data and close the system down One window will be displayed prompting the operator to restart the system when appropriate The system will place all readers into standalone mode if this option is chosen This function may be carried out automatically when a critical situation arises such as the loss of mains power and a low UPS battery although this is fully configurable in the Environment window Environment Allows the setting of time time zoning daylight saving date and times screen saving auto logout auto shutdown backing up time backing up to floppy disc screen display layout and the setting of the company name the system menu re ua Ocic EJ f nmm i la lad Fig 8 3 The Environment Window Once the system is installed the correct time and date will be obtained from Windows The screen may be switched off and the operator may be logged out after a predetermined period of time with no use The former preserves the screen prevents burn in and the latter preserves system integrity the system menu The system may be automatically shut down by setting a reader and
44. histicated software VISIKEY gives you the precision control you need for effective access control management The window driven programming allows you to accomplish every task with a few simple point and click operations The entire system can be easily configured to suit your own needs Readers may be addressed globally in pre selected groups or individually These operations can be carried out via menu selection through pre programmed event control e g security alarm or by control through the site plan windows Areas within a site may have an Anti Passback APB level associated with them giving added security by preventing the use of the same Key twice in any one Area Using APB the building plan can be viewed as a series of nested boxes Access is only allowed to the next level if all previous levels have been passed Also a person may not re enter an Area unless they have already left it i e cards cannot be passed back through windows etc for re use by another colleague Areas can have configurable capacity limits When reached these stop all further attempts at entry Such a system is very useful with regard to compliance with fire and structural regulations The site plan allows real time monitoring of the status of door readers with more detailed information available with a single pointer operation Any reader within the plan window may be overridden remotely through the software Readers or groups of readers can
45. ical operations and Reverse Polish Notation RPN If you require further information on either of these topics please consult Appendix 3 Each reader can have one Boolean expression for each Output line Alarm line and for each internal Timer There are 16 of each of these so a reader can be programmed with up to 48 separate expression Entering a Program 69 To enter a program you must first open the Reader Logic Library window by selecting the Reader Logic option on the CONFIG menu Click on a Name bar and give your program a name Now select the grey button to the right of this name This opens the Reader Logic window which allows you to enter your program A line of program can be entered opposite each of the sixteen Output lines Alarm lines and Timers eight resetable latches and time zones reader system alarms and transaction verification You do not have to program all of the lines Leave blank any that you do not wish to use The window moves sideways to accommodate all the lines as necessary Press the Return key after each line that you enter Once you have entered all of your lines simply close the window Open another window if you wish to enter another program or return to the system options by closing the Reader Logic Library window Output lines 1 to 16 are actual physical output lines which control relays inside the reader units These relays can be connected to whatever external equipment is considered necessary
46. ill open See fig 16 2 This is the window that allows time entry Click on the hour box of the start time A drop down menu of hours appears in 24 hour clock Select one by clicking on it It is automatically entered in the correct box Now click on the minute box Another menu appears Select the number you wish and click Once more it is entered automatically Do the same for the End time boxes The times entered have automatically appeared in the slot 1 label Now simply close the small window by clicking on the close icon and the data is entered into the appropriate column 51 oystem Configuration in Detail There are eight time entry slots and so eight time zones can be set for each day type The times which are set do not have to be in any particular order PII E PMA El El BE Full Access 0000 2353 TEET Fig 16 1 Time of Day Allocation window Full Access 0000 2359 9 7 8 Hour Access 04514574 E 5 NENNEN u zm 8 45 1 4 I Fig 16 2 Setting a Time Slot Continue to set up as many day types as you will need There can be up to thirty two lt is best to plan these out before you enter them See the Chapter 15 Planning Your System 52 oystem Configuration in Detail Defining Week Types Week Types are like Day Types but instead of being defined in terms of t
47. imes they are defined in terms of the Day Types previously mentioned The Week Type window is opened through the Config option menu and is entitled Days of Week Time Allocation See fig 16 3 Each Week is addressed by a label i e its name and each label has seven columns one for each day of the week Into these columns are entered the Day Types that you wish each day in that particular Week Type to be To enter the name of a Week Type simply click on the new entry option in the week type menu then click onto the empty box next to the Week name label The cursor will appear Now type in the name you wish to give that particular Week Type and press the Return key The Week Type name has now been entered Now enter a Day Type for each day of the week An entry for every day is already set This is the No Access Day Type You can either leave this as set or change it to suit your own requirements To change the entry click on the relevant box and a menu will appear listing all of the day types you have previously defined oelect one of these with the pointer and click It is entered into the box for that day See fig 16 5 amp 16 6 You can change these entries as often as you wish Once you have set your first week type you can set others simply by repeating the procedure The VISIKEY software will allow you to configure up to thirty two different Week Types m TERT Full ccess Y FullAccess Access
48. is taken Use of a Keycard WARNING Users should not insert any cards other than their Key cards into the card reader mechanism Other cards e g credit cards may be wiped of information by the system rendering them useless This is a security feature which prevents the use of programmable cards by persons seeking to gain fraudulent access to a site A user wishing to gain access to a certain Area first inserts their Key card into the slot in the card reader The user will now if applicable type in a PIN and if this is also valid the card is then removed Alternatively the card may be removed from the reader before PIN entry but the PIN must be entered within 10 seconds before the card read times out The LED fitted to the reader will then display either red or green If the LED shows green the card has been recognised as valid and the door will be released If the card reader LED shows red then the card is invalid and the user cannot pass The use of an invalid card is notified to the operator who may then take action as necessary Use of an Infra red Tag Users with infra red tags use them by simply pointing them at the relevant point on the tag reader signified by a flashing LED at a distance of approximately 6 inches or less It is not necessary to specifically operate the tag in any way e g to press a button or such like as the tag is automatically interrogated by the reader A steady green light indicates correct operation
49. may have any number of entry and exit Readers with or without APB protection If APB protection is enabled then an additional option of Capacity is possible to set the maximum number of Keycard Holders in the Area 54 System Configuration in Detail To create an Area click on the Area name box and enter a name for the given Area If Anti Pass Back APB is required set the Area s depth into the building APB Level To calculate this number assume the outside world is zero then the foyer is 1 and so on working in recursive circles To limit the number of Keycard Holders in an Area set the capacity option to the maximum required When an Area is full no one else is allowed in until someone leaves the Area Defining Departments and Their Access Rights Whenever a new Keycard Holder is defined as described earlier he or she must be assigned a department and it is through this departmental assignment that a Keycard Holders actual access rights within the building are set All Keycard Holders in a department have the same access rights and these are defined through the Departments window To select the Departments window simply select the Departments option from the Config menu The Departments window will appear In fig 16 7 the names of some Departments have already been entered and one is in the process of being entered To enter a Department name click on the New entry option Clicking on this opens a
50. n You must think in this form when converting expressions into Reverse Polish Notation Some examples Infix form RPN form 142 12 2x3 23x 4 5 4 5 5 4 54 79 A B AND NOT A AND B OR C B C OR A NOT AND T01 AND NOT A01 TO1 A01 NOT AND The examples given here should be sufficient for the needs of VISIKEY reader programming but for a fuller explanation of RPN consult a more expansive computing text Example script program Suppose we wanted to open a door for 5 seconds when either a valid card is presented to a reader assigned to the door or the request to exit button is pressed Assuming The door lock is connected to output 1 The request to exit button is connected to CCM input 1 We need a timer to provide the 5 second unlock time for this we will use timer 1 The easy way to do this is in 3 steps 1 Write down the Boolean logic required this would be Output 1 Timer 1 This unlocks the door for the duration of Timer 1 Timer 1 CCM Input 1 OR Valid Card Presented This sets Timer 1 true if Input 1 is true or if a Valid Card is Presented at the reader 2 Convert the Boolean logic from step 1 into script lables These lables are taken from the above list Therefore Boolean Logic Script Lables Output 1 Timer 1 O01 T01 Timer 1 CCM Input 1 OR Valid Card Presented T01 2 C01 OPN 80 3 We now have the logic required for the script i e O01 T01 01 01 These
51. n see Chapter 16 Programming a Reader E Reception APBReot FirstFloor Reception M Second Floor Reception M Third Floor Reception Fourth Floor Reception po 2 2 NoAPB A Na Na NA Fig 9 4 The Area Names and APB window Reader Resources The reader resources allow configuration of which physical inputs and outputs are used by each reader within a DPU By default readers have 2 CCM inputs and 2 relay outputs This is totally soft configurable and permits systems with up to 16000 inputs and 16000 outputs on the same DPU Reader Keypad Layouts This permits the setting up of keypad layouts on Morley type DPUs for non standard keypads The function of each key may be defined by the user to allow keypads to be mapped in any way Reader Technologies The defining of reader technologies is a complex but extremely flexible way of allowing new card technologies and formats to be used on the VISIKEY software with Morley DPUs For each technology the hardware interface type may be defined Watermark Wiegand and SoftMagnetic whether it has one display LED or two whether bi directional reads are permitted whether sentinel data ought to be searched for within a data stream the bit pattern of a data stream data sentinel and check bits and the resultant number format 24 the config menu The system as default has a number predefined reader technologies standard and L
52. n a box and typing in the information directly The name key number and PIN are entered in this way Sex date of birth D O B plus other information for other operator definable fields are also entered in this way To place the cursor in a box move the pointing arrow over the box to the place you want the cursor to be and then simply click The cursor will appear in the box If the cursor is not where you want it in the box move it either by re pointing the arrow and clicking again or by using the arrow keys on the keyboard If you place the cursor in the wrong box simply move to the correct box and click and the cursor will appear there automatically 59 System Configuration in Detail Boxes that require information to be entered in this fashion are coloured light grey Note that using a Local reader with Keycard will insert a key number into the key number field automatically removing the necessity to type in the number manually Yes No Information By Yes No toggling of buttons such as those first seen on the password menu The User Markers column operates this way Click on the buttons to toggle them on or off Toggling one of these buttons to on places the user in that particular category Up to eight categories can be defined and these can be used as search criteria when it is necessary to find certain users e g first aiders The lines Key User record marked for deletion on next packing And
53. n more detail in Chapter 14 Entering a New User Find User See Fig 10 1 This option allows the VISIKEY to search for Keycard Holders using various textual labels including wild cards The operator could search for all those people in a building who were qualified as say first aiders The search categories into which a Keycard Holder is set are entered in the Create User option above Each user can have up to eight yes no pieces of information stored about them e g are they a first aider A search can also be for any other piece of information held about the user e g a search by surname or even by using a wild card a search for all persons with surnames beginning with P for example Output can also be sent to a configurable output device e g a printer if required But the first 500 entries found will be displayed in the FOUND KEY USERS window when the FOUND button is clicked See Fig 10 2 Pack User Base Compresses the user base weeding out all those persons marked for deletion This option when utilised allows faster processing of further requests on large heavily used systems 33 users menu lt Unknown gt lt Unknown gt 00000 No APB Fig 10 2 Search Results Group user changes This option allows a group of users with one or more common attributes to be modified on a group basis e g If all visitors cards were to be disabled at the end of each day the operator could carry out a user searc
54. nal system messages MUX messages Key transactions Reader transactions P rint output Search Output including Muster Dumps Time and Attendance Output History Recall output This is the preferred option to display whenever the system is running without direct operator interaction All major transactions can be seen at a glance and any necessary action taken through the use of the other options This monitor also has a Start Monitor on Message option configured in Monitors amp Outputs in the CONFIG menu which automatically opens the monitor window whenever one of the above configured events occurs 37 login menu Chapter Eleven LOGIN Menu If an operator is logged out this option opens the LOGIN window to allow him her to log in All actions carried out from the LOGIN LOGOUT button are logged to all configured output devices and or history files If the operator is already logged in the following options are displayed Change Password Allows the operator to change his her current password The old password must be entered first to ensure a valid operator is carrying out the operation and the new password must be entered twice to verify correct entry Re login Logs the operator out and opens the LOGIN window Logout Logs the operator out 39 control menu Chapter Twelve CONTROL Menu Plans and Maps Allows the selection of a plan or map to be viewed Also automatically opens the
55. need to be converted to RPN Logic before they can be entered into VisiKey Therefore Boolean Logic HPN Logic 001 T01 001 T01 T01 C01 OPN T01 C010PN It is now simply a matter of entering the above RPN logic into VisiKey Select the reader logic library this is in the config menu reader logic Referring to figure 1 enter a name for the reader logic in the next free logic space we have used the name example as logic 3 and then press the selection box to the right of the name entered Number Name Selection Visual Setup Logic 1 22221 3 Logic 2 Standard _ J Logic 3 J J J Logic 5 _ O Innir fi Referring to figure 2 we are now in the logic editor here we simply enter the RPN logic we developed in step 3 se 1 spa1 T Tee Om Rea Um 0 08 E se 2 008 E o 4 O Tiera Um Ds I se 5 Tier 5 008 Reset Ope amp Ter 0 008 21 Teer Sf O OOOO 1 owu8 set 5 Times 3 008 Reset 5 Timer Um 0 08 se 21 0 0 08 Reset Oot 12 I set Ties 13 E Reser Oda Timer id saa Tmt 15 Timer 16 a Figure 2 The final Step 15 to set the du
56. neer who carried out these changes Once you are logged onto the system select SYSTEM on the Icon Bar menu will now pop up Fig 8 1 Select the Passwords option then a window displaying user names and passwords should now be displayed Fig 7 1 A number of blank boxes will be present below the user name Password bars denoting levels of access Clicking on any of these boxes will allow access to that level These boxes toggle on off by clicking on them blank is off red is on Click on all buttons to gain full access to the system and then close the window To change the supervisor password select LOGOUT as described earlier Then select the change password option a window will appear requesting the current password therefore type SYSTEM lt Enter gt windows and pointers The cursor is then entered into the New password box below Type the new six character password and verify in the box below Thus the supervisor password is now changed SUS PEO San ESSEN een posee p LJ HEN Fig 7 1 The System Password Configuration Menu the system menu Chapter Seven The System Menu VisiKey Access Control Ver 2 47 for Win32 Demo System cg Recycle Bin Briefcase Fig 8 1 The SYSTEM menu Who is Logged On This displays which console operator is logged onto each terminal on a Multi User System and at what time they logged in This is updated in real time Enabling
57. nfiguration when complete the VisiKey software will restart When the software has restarted it will function as a working system the only additional requirment to test the system will be the addition of a card user to the database windows and pointers Chapter Six Changing Passwords The password which allows full access to all operations is automatically defined when the software is first installed to allow the system to be initially configured The log in name is SUPERVISOR and the password is SYSTEM It is recommended that the password be changed as soon as system access is gained The log in name SUPERVISOR can also be changed if required To enter the VISIKEY software you must first log in Click on the LOGIN icon on the Icon Bar A window will appear requesting name amp password A thin red line will appear on the left hand side of the User Name box This is the cursor Now type SUPERVISOR lt Enter gt The cursor will now be entered into the Password box The password will be displayed as asterisks for security Now type SYSTEM Enter You are now logged on in the system If an error message appears simply click where indicated and try the procedure again making sure of the correct spelling each time The case of the letters i e upper or lower case is not important If the password for Supervisor has already been changed or the user name of Supervisor has been modified then consult the engi
58. nguage un A E rn E 93 Appendix 3 84 Glossary of terms 94 VISIKEY Overview Chapter One Overview of the VISIKEY The VISIKEY from Morley Electronics is an efficient and highly effective system designed for building access control and management By controlling the system using an or compatible personal computer maximum flexibility has been achieved whilst retaining ease of operation The VISIKEY can be custom configured to suit your needs and as these needs change so can the VISIKEY A simple pointing device such as a mouse or a trackerball is all that is needed to control all of the VISIKEY functions through its sophisticated windows driven software Once installed this software allows you to configure the system to your own needs The VISIKEY software can be used to control access to selected areas of buildings using both physical and temporal constraints It can also control and be controlled by other building systems such as fire alarm control systems or burglar alarm systems through its versatile digital interfacing system Both fail safe and or fail secure environments can be implemented The VISIKEY software allows multi tasking With multiple control windows on display all updated in real time the VISIKEY user can ensure safe efficient and secure access control management at all times Specifications features Chapter Two Features and Specifications Using sop
59. ough which it is necessary to pass to reach the current Area Work from the outside in the first APB Area being level 1 There can be up to 128 APB levels Now assign a number to all of the readers on the plan These are the numbers which the VISIKEY will use to address them Each reader must obviously have a completely unique number This is set in hardware Once the readers have been configured each may be assigned a name through the VISIKEY software and can then be addressed by that but for actual system installation and commissioning each reader must be given a number Headers are arranged in loops and all the readers in any one loop addressed with a single Manual Reader Override Command see MROC a Loop Any one loop can have up to 128 readers in it and there can be up to 18 loops All readers can be addressed singly if necessary see MROC a Reader The grouping of readers into loops depends on which control box they are attached to and wil not be considered here Chapter Sixteen Programming a Reader Readers in the VISIKEY can be individually programmed It is not however necessary to write a separate program for every reader Once written each program can be applied to as many readers as required Programming readers allows their responses to be configured precisely to the specific needs of any application Readers can be programmed through the VISIKEY computer The method of programming combines Boolean Algebra to allow log
60. r 84 Backing up time the interval at which the VISIKEY automatically makes back up copies of its files Bit switches small switches which can be set manually within devices to control device response BMS Building Management System Boolean Algebra a system of combining inputs to give outputs using logical operations Card reader a device for reading the key number of cards and relaying this information to the VISIKEY computer The reader can then allow or deny access according to central instruction Capacity the number of persons currently in an Area Capacity limit the maximum number of persons allowed in that Area Clicking selecting an icon by pressing and releasing a mouse button Close icon clicking on this closes a window Cursor indicates the position where the next typed character will appear on the screen It is depicted as a red line in the VISIKEY Day Type the name of a day which has been previously defined in terms of up to eight time zones Department an employee group with the same pre set Access Rights e g Management Engineering Dragging moving a window about the screen by clicking and holding on the Title bar The pointer icon changes to a hand Dragging allows the custom positioning of windows on the monitor Duress PIN Pressing the E key while a card is still in a reader sets off the Duress alarm informing the operator that the user is acting under threat EOR a
61. ration for Timer 1 this is done by selecting the drop down list of available timer durations by clicking on the grey box beside the white box which shows Om 0 0s and scrolling down the list selecting Om 5 0s Refer to figure 3 81 Figure 3 82 Appendix 2 Plan and Map Script Language The VISIKEY can display real time depiction s of buildings and sites To create a plan or map a standard text editor is required to enter the PDL Page Description Language Here follows a list of commands available comment The permits an entry of a comment with the description Circle fill line lt area gt lt x pos1 gt lt 1 gt lt x pos2 gt lt y pos2 gt Draws a lined and or filled circle Colour lt fore col gt lt back col gt Sets the foreground and background colours Line lt area gt lt x pos1 gt lt 1 gt lt x pos2 gt lt y pos2 gt Draws a line between to points Origin lt x pos gt lt y pos gt Sets the origin defaults to 0 0 Reader lt loop gt lt reader gt lt x pos1 gt lt y pos1 gt lt x pos2 gt lt y pos2 gt Draws a reader Rectangle fill line lt area gt lt x pos1 gt lt y pos1 gt lt x pos2 gt lt y pos2 gt Draws a lined and or filled rectangle Text lt area gt lt x pos gt lt y pos gt lt point size gt lt text gt Draws text of a defined size The entries in each command are described as follows Area An Area number from 0 to 127 for
62. rd Watermark is a brand name for a specific type of card with special properties namely that once data is set on it cannot be altered or removed The cards will come with information about the ten digit number set on them when they are purchased by the company and it is this number which must be entered as the Keycard Holders key number when he is issued with the card Key numbers cannot be operator chosen they must be as set on the cards See Appendix 3 for more information about Watermarked cards Use of the Holiday Information Windows The Holiday windows are used to set override conditions on normally set access rights These overrides can be set to occur on specific operator definable dates i e Holidays To open the Holiday window select the option from the Config menu The window will open and appear as in fig 16 16 the current date is marked in grey To select the date for which you wish to overlay holiday information on normal access rights simply click on it in the window A new window will open entitled Access Rights on and the 64 System Configuration in Detail date selected A list of departments is given on the left and their access rights on this date are displayed alongside See fig 16 17 If the access rights for a Department are left set at Normal Access as automatically defined by the system then that Department will have the same access rights as set through the normal Access Rights window
63. s A typical Week Type might consist of two No Access days and five Normal Days A Week Type of this sort might well cover the majority of the employees within a company and still leave another 31 Week Types free for more specialised uses Each Week Type is also allocated a particular label by which it is addressed e g Normal Week Year Types There are 32 different Year Types which are user defined Each Year Type consists of a list of 53 Week Types entered by the operator and addressed by their previously assigned labels e g Normal Week or No Access A typical Year Type may consist of 53 weeks of Normal Week giving normal access throughout the year Once one or more entries are entered into a Year Type window they may be replicated throughout the year The replication step allows the easy definition of shift working etc e g A pattern of Night Shift and Fore Shift on alternate weeks Each Year Type is also allocated a particular label by which it is addressed e g Normal Year Holidays This option allows the setting of holiday information by date It sets Global Area departmental access overrides on these chosen dates For example if a date is specified as a holiday then only those persons in the Security or Maintenance departments might be allowed into the building Departments This allows the setting of department names e g Security Management Engineering etc and defines
64. s desired by the operator Tokenise to convert a program or other expression e g a Boolean expression into a form containing only numbers Trackerball a device which controls the on screen pointer using a ball which is moved by the operator User a Keycard Holder VGA the video display standard which is used on the VISIKEY Watermark card see Appendix 3 Week Type the name of a week which has had each day in it defined in terms of Day Types Window an area on the screen which allows access to and manipulation of stored information Window sizing icon an icon which allows the window to be re sized to the most convenient dimensions Year Type the name of a year which has had each week in it defined in terms of Week Types 88
65. s failure at reader m The door has been forced open Dooropen The door has been left open too long Fig 9 7 Alarm Messages Window Allows the setting of the text of up to 255 alarm messages and names When an alarm is signalled by a reader its type is decoded by the VISIKEY and then the relevant alarm 26 the config menu message can be displayed This window allows you to set the text that will appear when any given alarm is notified to the system Each alarm message may also point to an ALARM WINDOW or PAGE which is a separate window on the screen describing the alarm condition in detail For more information about alarms see the Chapter 16 Programming a Reader Alarm Windows Fire Alarm 4th Left Justified Left Justified Left Justified Left Justified Left Justified Left Justified Centered Fire Alarm Activation on fourth Floor LeftJustified LeftJustified Left Justified Left Justified Left Justified LeftJustified Left Justified Left Justified Enable mediwmemsem _ mimm i Fig 9 8 An Alarm Window definition An Alarm Window is a custom screen which will appear under a predetermined circumstance of which the layout is defined here The priority sets the importance of the window the lower the number the greater the importance If a greater priority window wishe
66. s to appear when a lower priority window is already shown then the former window is pushed onto a stack and the latter window shown The stack has a depth of 64 windows Two sets of operations may the config menu be carried out by this system the actual displaying of a defined window and a Muster Both can be individually enabled to allow one or both to be activated Each of the 15 lines of the window may contain up to 40 characters which can be left right or centrally justified using the justification option to the left of each line The time delay for a window shown below the window definition is the time before the window is displayed An audible sound can be programmed to occur when an Alarm Window is activated This is done by selecting a sound from the pre programmed library A Muster Dump may also be activated by an alarm This is defined by the lower section of the Alarm Window definition window The options are of an AND nature with all Keycard Holders found being displayed on all configured USER SEARCH output devices i e printer Alarm Sounds See Fig 9 9 All sounds in the VISIKEY are configurable The parameters for each of the 31 different sounds the first sound is permanently set to silence include initial pitch pitch step pitch step rate in 53ms steps and duration also 53ms steps The initial pitch is in the range of O to 16383 which covers most of the humanly audible spectrum with O being
67. t there is no carry so 4 21 the config menu 3x123 5x3 15 but there is no carry so 5 Therefore the auto PIN as assigned to the user by the VISIKEY is 2435 The PIN Algorithm number need only be set once for all users This feature massively simplifies the task of issuing PINs The calculated auto pin is automatically entered into the appropriate section on the New User window MORLEV TR GANT CS LTO Notepad System Started Fig 9 3 Title PIN Algorithm Monitor Control and Capacities Windows 22 the config menu Time amp Attendance Reason Codes Time amp Attendance Reason Codes allow the setting of valid numbers which may be entered at T amp A Enquiry reader It is essentially a validation system Note that the first two entries are fixed and are sent on a T amp A In and Out respectively Time amp Attendance Output This sets the output format of T amp A information It permits the setting of which users fields are assembled into a T amp A record Area Names APB and Capacity See Fig 9 4 Allows the naming of areas so that other parts of the VISIKEY can address them by this name rather than just a number A group of readers could be assigned a name such as Laboratory The Anti Passback APB level of the Area can also be set Someone wishing to enter a level with a certain anti Passback value must also have been recorded by the system as entering
68. teen oystem Configuration in Detail The tasks which we will consider here are Defining Day Types Defining Week Types Defining Year Types Defining Areas Defining Departments and their Access Rights Defining User Fields Entering a New Keycard Holder Use of the Holiday Information Windows Use of the Monitor Screen Defining Day Types Day Types are defined on the Day Types window To open this click on the CONFIG option A menu will appear Click on the DAY TYPES option then click on the New entry option A window will open It will be entitled TIME OF DAY ALLOCATION This is the window within which day types are defined Each defined Day Type receives a textual label i e a name and is then addressed by this name whenever its use is required To set your own day type click in the empty box next to the label Day name Then enter the day you wish to set i e Its label for example See fig 16 1 The Day name has been labelled 08 hour access press the return key after the entry so that the data is recognised Each day type can have up to eight independently definable time zones within it Slots 1 to 8 As you will see most days will not require all of these but they allow for special customisation when necessary Look at the day 24 hour access It has been set to allow entry from exactly midnight to 23 59pm To enter this data click on the dark grey box in the first time slot Another small window w
69. the limits and times of access for these departments into Areas through the relevant Access Rights window See Chapter 14 5 Defining Departments and Their Access Rights the config menu WisiKey Access Control Yer 2 47 for Win3 Demo 21 19 Contig Fig 9 1 The CONFIG menu 20 the config menu Visto Fig 9 2 The User Field Configuration User Fields see fig 9 2 Permits the configuration of user fields both text and logical These fields are used in the Create Users option and allow the custom configuration of user information See Section 14 5 for more detail Titles Allows the configuration of titles in the Titles window which will appear when new Holders are added to the system Simply click on an empty bar and type in the new title To alter a title simply click on the bar you wish to change and alter the entry as appropriate PIN Algorithm When used with the Auto pin option on the Create User window this allows PINs for employees to be automatically set thus saving time and effort A four figure number is entered in the PIN Algorithm box When the Auto Pin option is utilised later the PIN Algorithm number is multiplied without carry with the lowest four digits of the users Key number This number is then the users PIN For example PIN Algorithm number 4735 New users key number 9876543213 Now 4x3 12 but there is no carry so 2 7 2 14 bu
70. time Area information Yes Real time key holder tracking Yes Configurable key holder information Yes Time and Attendance collection Yes P rioritised alarm windows Yes Muster dumps Yes Configurable alarm sounds Yes Specifications features Supported technologies supported concurrently on new Morley NEXUS Thorn EMI Watermark ABA track 2 Wiegand PAC All technologies which use either a Watermark Wiegand or SoftMagnetic hardware interface All bit formats within a Keycard may be specified using the VISIKEY s powerful Soft Format Configuration system Operating Methods Chapter Three Operating Methods Keycards infra red IR tags and Wiegand amongst other technologies contact Morley Electronics for further details can be used with the VISIKEY Users may also be assigned Personal Identification Numbers PINs to be entered into door processing units DPUs fitted with keypads It is not necessary to fit all DPUs with keypads Users with PINs will still be able to use those DPUs without keypads The PIN is added security feature and may only be required for access to certain areas preventing the use of card stealing Pressing E while a card is present in a reader signifies that the user is acting under duress the Duress button Use of this by ANY user can be programmed to activate a pre configured alarm which alerts the system operator allowing him her to ensure that the correct action
71. to be set for interface cards The entries instruct the VISIKEY as to where the specific address of such devices is to be found and how to signal to the device that it is ready to communicate monitored information For each COMMs port the baud rate number of data bits number of stop bits parity type handshaking type and which terminal Host or Slave on Multi User Systems must be specified The settings should correspond to the device to which it connects therefore it is prudent to consult the manual or documentation supplied with the devices 29 the config menu The connection to a 485 Loop driver is as follows 9600 baud 7 bits 2 stop bits Even parity DO NOT use CTS RTS DO NOT use XON XOFF DO NOT use 00 Low Loc Lona COMI 8250 0 03 8 9600 8 1 None 2 8250 wjUx 2 8 IRQU3 9600 8 COM3 COM3 8250 None None 9600 8 1 None None 8250 Y None None 300 5 1 None None 8250 29 None None 300 5 1 None come None 8250 None None 300 5 1 None None 8250 None None 300 5 1 None None 8250 None None 300 5 1 None None 8250 7 None None 300 5 1 Nome _ None 8250 None 300 5 1 None None 8250 None None 300 5 1 None Fig
72. tory Recall 45 History File to Search 45 Start and Stop times 46 Search on Particular Group ENEMIES 46 Search on Textual Content Wild card 46 Alarm Occurrences and Acknowledgements 46 Departmental Search 46 Search When a Certain Operation is Present 46 sense 46 46 Keynumber 46 Technology 46 Transaction 47 Chapter Fourteen 51 System Configuration in Detail deese 51 Defining Day Types 51 Defining Week Types 53 Defining Year Types 54 Defining Areas 54 Defining Departments and Their Access Rights 55 Defining User Fields 27 Entering a New Card Holder E E 59 Textual Information 59 Yes No Information 60 Drop Menu Information 60 Button Click Information 63 Use of the Holiday Information Windows 64 Use of the Monitor Window es ES 67 Chapter Fifteen 69 Planning Your System 69 Chapter Sixteen 69 Programming a Reader 69 Entering a Program 69 Writing a Program 72 Operator sito lis 74 Appendix A asd kde 77 Boolean Algebra RPN 77 Reverse Polish Notation 79 Example script program 80 Appendix Zaida 83 Plan and Map Script La
73. was entered by clicking on the relevant boxes and then typing in the information before pressing the Return key at the end of each box i e both after the initials and after the surname The key number and PIN number is also entered in this manner The Title and Technology data were entered using menus as in method two In fig 16 15 this method is being used to enter data into the Department box Once the Department has been entered you should then set the APB level Finally enter the data into the definable fields the key user could be tagged as a first aider for example by clicking on the relevant toggle button The definable fields of sex and date of birth are also entered using method 1 Three more categories of user definable textual information are available and these are also entered by method 1 63 System Configuration in Detail When setting the time at which to automatically prevent key usage there are three options now never which displays the word Indefinite and a specific time and date Click on either of the two large buttons in the bottom right hand corner to select Now or Never To select a specific time and date select Now The current time and date will be displayed and you can alter these settings by clicking on the arrows in the small panel at the bottom left A single click on each arrow will alter the relevant piece of data in plus or minus one steps Wh
74. while a flashing green light indicates either a misread or a illegal attempt to gain entry Operating Methods Heview Both the Keycard and the IR tag use the same system to identify users This consists of a ten digit number There are thus a possible 10 different user identification numbers available for each system As the system differentiates between Key card and IR tag keys this number of possible combinations is therefore available on both technologies Please note that the reader operation is totally re configurable e g the Open Door signal from the VISIKEY may not open the door but may trigger a timer to then allow the door to open after a period of time Obviously other operations are possible Please refer to Section 19 and Appendix 3 for further information System Requirements Chapter Four Computing Requirements To operate the VISIKEY requires the use of an IBM or compatible personal computer PC With Windows installed This computer chosen because of its reliability processes the information received from the remote card readers and then controls their operation Instructions may be sent to allow or deny entry or to trigger an alarm condition The computer continuously monitors the status of the entire system and displays this information in an easily assimilated form Although designed to run without operator attention any required information can be easily requested and rapidly displayed allowing an

Download Pdf Manuals

image

Related Search

Related Contents

Lexicon RX-7 User's Manual  Manuale d`installazione  "as。"ーc 捌ダウンライト ー刷 取扱説書 品番 NFMX4ー660  INV_Alg-Protection  Renesas M38C89T-ADF User's Manual  Agresso Procurement User Manual  BajaPPC-750 User`s Manual, #0002M621-15  Tricity Bendix SE501 User's Manual  ENARCO, S.A.  ifet - Assemblée des Départements de France  

Copyright © All rights reserved.
Failed to retrieve file