Presentation on theme: "16 th -17 th June 2003 Carmel Indiana Geoffrey Version 5.1.4: Cutting Edge Security Technology."— Presentation transcript:
16 th -17 th June 2003 Carmel Indiana Geoffrey Version 5.1.4: Cutting Edge Security Technology
16 th -17 th June 2003 Carmel Indiana How Geoffrey Handles Alarms
Examples of Alarm Labels: Emergency Exit Door Alarms Specific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours access All Invalid Access Attempt into IT Area from 8pm – 6am M-F, 24/7 Sa/Su Communication Failure with Area Controller Examples of Time Zones: 5pm – 8am, M-F; 24 hours Sa/Su 24 hours, M-F, Sa/Su Examples of Transaction Groups: Valid Access Invalid Access Contact Conditions Communications User Info Examples of Devices: Readers Contacts Relays Gary D’Aries Bruce White Jason Palleschi Jack Kahn
Alarm Display: Sent to Address Alarm Display: Workstation by Computer Name Alarm Display: Workstation by User Login
Alarm Label: Specific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours access Transaction Type: Cardholder Time Zone: 7 p.m. Tuesday Area: 3 rd Floor IT Server Room, East Wing Priority: Level 3 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor If no response in pre-programmed time, reroute to: Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor If no response in pre-programmed time, reroute to:
Alarm Label: Communication Failure to IT Area Controller Transaction Type: Communication Time Zone: 2 a.m. Tuesday Area: 3 rd Floor IT Server Room Priority: Level 2 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor If no response in pre-programmed time, reroute to:
Alarm Label: Door Forced Open Transaction Type: Contact Active Time Zone: 8 p.m. Tuesday Area: 3 rd Floor IT Server Room Priority: Level 1 Priority Alarm Workstation: Floor 3 Security Desk, East Wing User: Joseph Smith, Security Officer User: Beth Jones, Security Officer John Porter, Asst. Security Supervisor Workstation: Floor 3 Security Desk East Wing Workstation: Floor 3 Security Desk West Wing User: Brian Fields, Security Manager John Porter, Asst. Security Supervisor James Walker, Security Supervisor Workstation: Main Security Desk User: Brian Fields, Security Manager Brian Fields, Security Manager James Walker, Security Supervisor
Version 5.1: Default templates included in software Customize layouts to your company’s floor plans Customize.WAV files to match language or accent of operators
Alarm Graphic Examples
Normal Status Alarm Status
Alarm Graphic Examples
Alarm Details: Instructions
Alarm Details: Comments
Alarm Details: Live Video* *Live video is achieved through the optional GVTR integration.
16 th -17 th June 2003 Carmel Indiana Areas & Area Sets
What is an Area? An Area is a space or group of spaces that have secured entry ways (e.g. door, gate, turnstile, etc.). An area can consist of one reader or a number of readers and can be identified at one location or over several locations consisting of “Door Types” and “Area States”.
What is a Door Type? A Door Type is the particular model or kind of door which a cardholder is granted access to use –Pedestrian –Vehicular –Handicapped –Turnstile
What is an Area State? Each area has one of 8 user defined state options (e.g. normal, lockdown, strike, etc.) Area State determines who has access to that area during a specific condition or state. –For example, if an area is placed in “Strike” state then only those cardholders with access during Strike will be granted access to that area while in Strike state. –Cardholders are given permission to access areas in various states when they are added to the cardholder database.
Example: Main Lobby Area Main Lobby Building A West Entrance Turnstiles South Disabled Entrance Northeast Entrance Turnstiles
Los Angeles Office Comm Closets on Floor 6 and Floor 10 Dallas Office Comm Closets on Floor 2 and Floor 7 New York Office Comm Closet on Floor 2 Example: IT Area
What is an Area Set? An Area Set is a group of Areas. –For example, a company can set up an “ IT Set ” to grant IT employees access to the Perimeter Area, Lobby Area, Common Area, IT area and Comm Closets.
Administration Area Set Perimeter Area Administration Area HR Area Set Perimeter Area Administration Area HR Area Accounting Area Set Perimeter Area Administration Area Accounting Area Manufacturing Area Set Perimeter Area Manufacturing Area Manufacturing Administration Area Set Perimeter Area Manufacturing Area Manufacturing Office Area Area Sets IT Area Set Perimeter Area Lobby Area Common Area IT area Comm Closet Handicapped Admin Area Set Perimeter Area – Handicapped Administration Area Executive Area Set Administration Area HR Area Accounting Area Comm Closet Area Manufacturing Area Manufacturing Office Area Executive/IT Lobby Area Executive/IT Common Area Executive Area IT Area Perimeter Area – Pedestrian/Vehicular Handicapped Executive Area Set Perimeter Area (Handicapped/Pedestrian/Vehicular) Administration Area HR Area Accounting Area Comm Closet Area Manufacturing Area Manufacturing Office Area Executive/IT Lobby Area - Handicapped Executive/IT Common Area Executive Area IT Area
System Host Card, Contact, User Transactions Workstation #1 CCTV Universal Interface LCD Display Panel RS-232 ASCII Video Switcher #1 RS-232 ASCII Workstation #25 CCTV Universal Interface
16 th -17 th June 2003 Carmel Indiana How Geoffrey Handles Cardholders
Accounting Department Cardholder Access Normal work day for an Accounting Clerk is 9am-6pm. All other employees have a normal workday of 9am-5pm During the annual audit the daily workday changes to 8am-7pm and Saturdays from 9am-noon
Cardholders: Status Levels (Acct Clerk Normal Workday) System Readers Standard System Time Zones Perimeter Reader #1 Administration Area Reader #1 Administration Area Reader #2 H.R. Area Reader #1 9am-5pm M-F 5pm-10pm M-Th 7am-9am M-F 9am-Noon Sat
Cardholders: Status Levels (Acct Clerk During Annual Audit) System Readers Standard System Time Zones Perimeter Reader #1 Administration Area Reader #1 Administration Area Reader #2 H.R. Area Reader #1 9am-5pm M-F 5pm-10pm M-Th 7am-9am M-F 9am-Noon Sat
Status Level Issues Limited number of time zones programmed into some systems Using time zones defined in the system may grant unnecessary access for times when administrators don’t really want the employee to have access (e.g. granting access from 5-10pm when access is only really needed until 6pm) Extending or temporarily changing access requires the creation of a new status level Administrators must remember to change that extended access back to normal access after time has passed
Cardholders: Area Sets Time ZonesCardholder Access Area Sets
Cardholder Access Options in Geoffrey Change Area State to “Audit” Extend access with expiration at end of audit Create “Accounting Department Time Zone” (Geoffrey has unlimited time zones)
16 th -17 th June 2003 Carmel Indiana Elevator Control
Elevator Cab #1 5 Floors Reader GIONX24 is used with a GRCNX 8 or 16 Controller to for elevator control
Elevator Cab #1 10 Floors Elevator Cab #2 10 Floors Reader GIONX24 can be used to control multiple elevator cabs
Elevator Cab #1 5 Floors Elevator Cab #2 5 Floors Elevator Cab #3 5 Floors Reader
Elevator Cab #1 3 Floors Elevator Cab #2 3 Floors GIONX24 when used for elevator control can be used in conjunction with other devices on the system.
16 th -17 th June 2003 Carmel Indiana Program Flash
Enables firmware to be flashed to Controllers and Interfaces Minimizes trips/time at customer sites No need to change chips for new or updated features
Guest Pass Setting Options Fully integrates with Geoffrey Access Control Software Operators can assign access control privileges to authorized guests Operators can be allowed to authorize guests for sign-in or sign guests in automatically Guest Pass System can require portrait and/or signature capture
Guest Pass Setting Options Guest Pass System can send to the host upon their guest’s sign-in or sign-out; this can include their portrait if captured Enable label or photo ID badge to be printed or generic visitor badge to be recorded in guest record Guest Pass System requires a Primary Contact and can be configured to require a Secondary Contact as well Sign-In/Sign-Out instructions can be defined per guest Define color codes for Valid Guests, Guests about to Expire and Expired Guests
What is a Guest Pass Location? A Location is any place(s) where the Geoffrey Guest Pass System is running A Location is defined as some place or places that are going to be responsible for guest acceptance. Each location defines its own Guest Pass Settings. A Guest Pass System can be installed and operated in any location where Geoffrey is running
Location Examples: 4 Separate Guest Pass Systems/Licenses Office Bldg on Cabot Place West Office Bldg on The South Colonnade Office Bldg on Columbus Courtyard Office Bldg on Cabot Place East
Location Examples: 1 Guest Pass System/License Office Bldg on Cabot Place West Office Bldg on The South Colonnade Office Bldg on Columbus Courtyard Office Bldg on Cabot Place East
Guest Pass Run Through… These examples show the Guest Pass System with all options turned on. The system can be tailored to meet your specific needs. ADD A NEW GUEST - Add a new guest to Pending, Not Authorized AUTHORIZE A GUEST - Add guest to Pending, Authorized SIGN A GUEST IN SIGN A GUEST OUT Web Interface Click here to return to the Main Menu
These are user defined fields.
Guest Pass: Web Interface Using the Geoffrey Web Interface, users can authorize guests ahead of time remotely. Using the web interface is a quick and convenient way to alert security officials of anticipated guests.
A Solution for Building Owners or Property Managers Use up to Four Different Access Control Systems and Share Readers in Common Areas
GURI: Specifications Specialized Firmware Use Any Wiegand Signal Output Device LED Control for Each Access Control System
Old Way:Here’s How It Works Present Card Access Control System A (access granted) Access Control System B (access denied; not in controller memory) Access Control System C (access denied; not in controller memory)
Geoffrey Way: Here’s How It Works Present Card with Encoded Bit Pattern A at any Wiegand Signal Output Device Access Control System A Access Control System B Access Control System C Access Control System D GURI interprets Bit Pattern and sends the transaction to only the corresponding access control system No transaction is sent to the other Access Control Systems
One Last Note… The GURI interprets bit patterns and site codes only from Wiegand signal output devices Sample encoded cards are required for GURI setup
Geoffrey Hardware: How it Works for You Compatibility –Complete firmware library can interface with any readers, biometric device or access control card in the market today Economic Stability –Multiple site codes and multiple bit formats –Communication interface – Multiple communication channels to peripheral devices Direct connect u to 16 controllers per hardwired channel IP Addressable – virtually connect over WAN Dial up modem 254 remote locations Retrofit –Hardware can be used with most current cards & existing installed card reader heads Features –Reader controllers with up to 8MB of dynamically allocated memory –Elevator control –Copy monitor –Advanced configurations to include complete hardware redundancy
GRCNX 8/16 – Geoffrey Reader Controller
What does the GRCNX do? The GRCNX contains the customer’s database, card population and access rules. It monitors the contact inputs and relay controls. The GRCNX is “blind” to the actual access device as it has already been decoded by the GRINX. GRINX Geoffrey GRCNX
Geoffrey GRCNX-8/16 Features Standard Features –Up to 16 Card Reader configurations Using 8 Communication Channels (2 Readers Per Channel) –Standard 1 MB Memory dynamically allocates 1000s of cardholders and transactions –Two 3-Amp SP/DT Outputs and 8 Supervised or Unsupervised Inputs 7-Amp Hour Gel Cell Battery Backup for Standby Operation –Flash Memory Provides Firmware Upgrades via Software Communication Link –Built-In Noise Suppression –Built-In Surge Suppression
Geoffrey GRCNX-8/16 Features Optional Features –Up to 7MB of Additional Memory (8MB Total) for Larger Databases (GMEMNX-3, GMEMNX-7) –I/O Expansion Module Allows 8 Additional Supervised or Unsupervised Inputs and 12 3 AMP SP/DT Outputs for a Total 16 Inputs and 14 Relays (GIONX) –Plug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP) (GIPRCNX) –Plug-in Modem can be used for Primary Dial-Up Communications or as Secondary Alarm Communication when Using Network Connection (GMODNX) GIPRCNX GMODNX GMEMNX-3 GMEMNX-7 GIONX
GRCNX-2 Reader Controller
Geoffrey GRCNX-2 Features Standard Features Standard 1 MB Memory dynamically allocates 1000s of cardholders and transactions 16 Supervised or Unsupervised Inputs, Two 3- Amp SP/DT Outputs and 4 Solid State Relays 2 Card Reader Configuration Direct Connect to Reader Heads Flash Memory Provides Firmware Upgrades via Software Communication Link Built-In Noise Suppression Built-In Surge Suppression Does not require GRINX for reader hook up Optional Features Plug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP) Plug-in Modem Allows Dial Up Connection
The GRINX is the System’s “Decoder” The GRINX initially decodes the technology of the Reader (card reader, biometric device, etc. The GRINX then sends all encoded information to the Reader Controller (GRCNX) which verifies user access based on the end user database. GRCNX Geoffrey GRINX
GRINX Features Flash Memory Allows Download of Different Firmware Programs from PC to Allow Connection to Different Reader Technologies and Multiple Formats of Bit Patterns of Cards Has 7 Contact Inputs and 1 or 2 Output Relays (GRINX-1, GRINX-2) Can work in “degraded” mode (reads one or more site codes) if Communication Failure occurs between the Reader Controller and the Reader Interface (Note: Software Configurable per device).
Geoffrey Pre-Wired Enclosures Advantages: Pre-wired and pre-tested enclosures with on-board power supplies reduce setup times Plug & Use Design – Snap on/off board replacement with pre- wired field connectors (Supports reader heads, door strikes contact inputs, data and power) Excellent solution for consistent regional or nationwide installation Reduces manpower requirements during installation and decreased disruption in client’s daily business Makes service and maintenance easy because the enclosure gives consistency to every site and reduce the training curve for personnel
GIONX24 Input/Output Board
The GIONX24 is the Easy Way to Expand Elevator or Alarm Control Can Be Integrated Using the GIONX24. GIONX24 Elevator Control is subject to GRCNX Memory Requirements. GIONX24 can attached directly to a Parent GRCNX8/16 or to a Child GRCNX8/16. GRCNX Geoffrey GIONX24
GIONX24: To Easily Expand A System Provides 24 supervised contacts and 24 SP/DT Outputs Can be used as a child to a parent GRCNX8/16 in conjunction with other Reader Controllers and Reader Interfaces Any input can be associated with any output response or many output responses One or more GIONX24s can be used to provide alarm control or elevator floor control; each GIONX24 is capable of up to 24 floors (1 contact per floor subject to GRCNX memory requirements)
Serial connection A two door system can easily be expanded.
GXLT2: RS232 to RS485 Translator Features GXLT2 enables PC to communicate with up to 16 GRCNX2s Ideal, cost effective solution for smaller systems Directly communicates with the PC (Max distance: 50ft) Communication between the CIM and GXLT2 is via RS232 protocol. Communication between GXLT2 and GRCNX2 boards is via RS485 protocol Max distance between GXLT2 and GRCNX2: 4,000 feet
Simply put…Geoffrey Quick Install Saves hours of programming and verification time during setup Is designed exclusively to work with the GXLT translator board and the GRCNX2 Works with magnetic stripe, proximity, stand alone keypad and Wiegand output readers
How Quick Install Works: 1. The user is supplied with a database that has many essential access control features predefined 2. The database is consistent and organized – System Manager, Automatic Override, Manual Override Definition, Manual Override and Cardholder Definition Modules are virtually preprogrammed
Devices in the hardware map are color coded and easily customized: CIM-green CIM ports-red controllers-gray readers-yellow relays-dark blue contacts-maroon Quick Install
To “Activate” a device, simply type in the appropriate information and check “Installed”
Quick Install Features Each predefined override task has all necessary actions predefined as well –Example: Door contact open causes an alarm Description field names can be changed by the user to something more meaningful –Example: “RCNX2 #1; Reader 1” can be changed to “3 rd Floor Computer Room”
Quick Install Features Geoffrey guarantees to not have any programming or typographical errors during the initial setup Cards with encoded IDs are shipped with the system to be used in conjunction with Geoffrey supplied readers for testing.
Quick Install Limitations No Global Anti-Passback (Anti-passback can be obtained by creating one IN and one OUT reader on a GRCNX2) No global transaction across controller board (No triggered event on one controller board can cause an action on another controller board) Door Force Open will only work using the Geoffrey standard definition (The DOD must be defined on Input 2 or Input 4 for the RCNX2 boards. The GRCNX2 can distinguish between Door Open Detect and Door Forced Open and can be an alarmed event)
What is Redundant Recovery (RR)? An automated method of quickly reconfiguring Reader Controllers and Geoffrey software components to use an alternate SP, Data Directory, Server or CIM when some [catastrophic] failure occurs
Why do customers need RR? Minimize “down time” of Geoffrey system in a catastrophic situation Minimize the loss of data to only a few seconds or minutes instead of all data from failure to last backup which could be hours, days or weeks
How does Geoffrey RR work? Geoffrey has customized Microsoft ® SQL Server Replication technology to provide an application that requires little human intervention and allows for automated switchover of CIMs, SPs and/or Servers
Cardholder Transactions Manual Override Commands Alarmed Events Universal Triggers Workstations Main CIM Main SPMain Server Authorized Operator initiates Geoffrey RR Application to begin automatic switchover
Cardholder Transactions Manual Override Commands Alarmed Events Universal Triggers Workstations Authorized Operator initiates Geoffrey RR Application to begin automatic switchover Backup CIM correctly rerouted Backup SP All simultaneously re-addressed Backup Server All simultaneously re-addressed
Why is Human Intervention Required? RR does not monitor the Geoffrey system to determine communication failures and switch to alternate configurations automatically Some failures may not require the system to be switched over to the backup devices –temporary network traffic –a device rebooting –some other non-critical issue
How is RR initiated? RR procedures are initiated by a human operator via the RR Application – a separate application from the Geoffrey System Launcher that does not rely on communication with the SP. In an emergency, this communication may be lost.
RR Status Monitor
What is the benefit of the RR Application? The RR Application aids the operator by only having to login to the RR Application. The Operator does not need to login to each individual workstation to change the Geoffrey Registry Settings All Reader Controllers are contacted and redirected to communicate with the alternate CIM
Geoffrey Redundant Recovery System Summary Minimize downtime Minimize loss of data Customized, reliable Microsoft technology Operator initiated to prevent erroneous or unnecessary switchover Reader Controllers and workstations are automatically re-addressed and directed to communicate with backup devices through RR application Alarms, transactions, triggers, etc are automatically rerouted to backup devices
16 th -17 th June 2003 Carmel Indiana Sample System Configurations
Biometric Reader #1 Mag Stripe Reader#4 iClass Reader #6 Proximity Reader #8 Reader #1 Reader #4 Reader #8 Geoffrey File Server Workstation 1 of 50+ ID Badging Station/ Workstation 48 of 50+ Workstation 49 of 50+ Proximity Reader #8 iClass Reader #6 Mag Stripe Reader#4 Biometric Reader #1 Elevator Reader
WAN ID Badging Station/ Workstation 48 of 50+ Workstation Redundant File Server Workstation File Server Workstation
16 th -17 th June 2003 Carmel Indiana Time Zones & Holidays
Americas File Server European/ African File Server Far East/ Australian File Server Wide Area Network Local Area Network
American Holiday Set: Jan 1 (New Year’s Day) Feb 17 (President’s Day) May 26 (Memorial Day) July 4 (Independence Day) Sept 1 (Labor Day) Oct 12 (Columbus Day) Nov 27 (Thanksgiving Day) Dec 25 (Christmas) Brazilian Holiday Set: Jan 1 (New Year’s Day) March 4 (Carnaval) April 18 (Good Friday) April 21 (Tiradentes) May 1 (Labor Day) Sept 7 (Independence Day) Nov 2 (All Souls Day) Dec 25 (Christmas) English Holiday Set: Jan 1 (New Year’s Day) April 18 (Good Friday) April 21 (Easter Monday) May 5 (Early May Bank Holiday) May 26 (Spring Bank Holiday) Aug 25 (Summer Bank Holiday) Dec 25 (Christmas) South African Holiday Set: Jan 1 (New Year’s Day) March 21 (Human Rights Day) April 21 (Family Day) April 27 (Freedom Day) May 1 (Workers Day) Sept 24 (Heritage Day) Dec 16 (Day of Reconciliation) Singapore Holiday Set: Jan 1 (New Year’s Day) Feb 1 (Chinese New Year) Feb 12 (Hari Raya Haji) May 1 (Labour Day) Aug 9 (National Day) Oct 24 (Deepavali) Nov 25 (Hari Ray Puasa) Dec 25 (Christmas) Australian Holiday Set: Jan 1 (New Year’s Day) Jan 27 (Australia Day) March 17 (Canberra Day) April 25 (Anzac Day) June 9 (Queen’s Birthday) Dec 25 (Christmas) Dec 26 (Boxing Day)
New York – GMT-05:00 Brazil GMT-03:00 London - GMT South African GMT+02:00 Singapore GMT+08:00 Sydney GMT+10:00
Main File Server – Dallas GMT-06:00 Los Angeles GMT-08:00 Denver GMT- 07:00 Chicago GMT- 06:00 New York GMT-05:00
16 th -17 th June 2003 Carmel Indiana Geoffrey Version 5.1 Software
Geoffrey Software: Features that Benefit You Compatibility –Standard Operating Systems – Windows 2000/NT/XP –ODBC compliant database (Microsoft SQL) –Auto backups available with SQL Agent Software –Convenient drag and drop features –Outlook bar navigation Expandability –Expansion can be over direct wire, dial up communication, local or wide area network Retrofit –Import existing personnel from other systems (e.g. Human Resources)
Geoffrey Software: Features that Benefit You Security Standards –Meets bank industry data center security standards –Secure individual administration rights over part or all of the system –Run secure individual reports by login Tools –Video imaging/Integrated Badging –Global anti-passback Options –Visitor tracking software – optional web interface available –Digital video retrieval for event/video recall –Customized user reports via Crystal Reports Writer –Software can run as a single client or multi-client
A look into Version 5.1: How Geoffrey Extends Time or Expires Cardholder Access Real Time or Pre-Set Activation, Extension or Expiration Change Access –System Wide –by Area –By Area Set –by Cardholder Category –By Individual Cardholder
A look into Version 5.1: Wizards Make it Easy Add new cardholders Duplicate access permissions for new cardholders Create and launch custom reports Easily operate optional guest pass software
A look at Version 5.1: Tools & Options Auto schedule dial up updates to controllers “Advanced Find” allows quick and easy search of the database Optional Guest Pass System with Web Enabled Software and Wizard to easily add new guests
16 th -17 th June 2003 Carmel Indiana Security Tour
Security Tour Checkpoints Any card swipe or contact active can be a checkpoint Geoffrey allows and unlimited number of checkpoints to be entered into any tour A transaction is generated whether a checkpoint is reached or not
Security Tours Geoffrey allows and unlimited number of tours to be defined User Defined Tour Names User Defined number of minutes between each checkpoint – 1 minute minimum, virtually unlimited maximum Set read-only or administrative rights to each view of a tour and see all checkpoint readers/contacts regardless of system security permissions One cardholder walking per tour
Security Tour Transactions Color-coded transactions report: –Start/Stop –Paused/Resumed –Timed out –Out of sequence Standard reports available with software All transactions can be alarmed and fully integrated with Geoffrey Graphics Package
Security Tour – Out of Sequence Notification
Other Features Window of time (+/-) time for to each checkpoint Reader Initiated Start or Workstation Initiated Start Advanced find features included Right click to restart tour where “ out of sequence ” notification appeared allowing tour to continue without starting at initial checkpoint
Checkpoint #1 Checkpoint #2 Checkpoint #3 Checkpoint #7 Checkpoint #5 Checkpoint #4 Checkpoint #6 Security Desk 15 min (±5 min) 10 min (±5 min) 25 min (±10 min) 20 min (±7 min) 5 min (±2 min) 12 min (±2 min)
What Offline Lock Integration Means Combines the efficient system layout and easy programming with the convenience of offline lock capability No other parent device is required, the operator programs the offline lock into Geoffrey and then downloads the permissions to their PDA as usual and programs the individual offline locks.
Benefits: Program the online system and offline devices simultaneously Relock delay is user definable Unlimited number of credentials to be assigned to each cardholder including online access cards, ibutton or PIN or any combination (e.g. access card & PIN or ibutton & PIN). PIN only or PIN & card vary per offline device Each offline lock can have its own magnetic stripe template.
Benefits: Activation and expiration dates are user definable per credential. Offline credential expiration defaults to one year from the date of activation. Schlage offline locks support up to 16 interval time zones and 32 holidays intervals, the operator can create these time zones and holidays in Geoffrey and designate them as “offline”. Holiday function is programmed in Geoffrey as passage, secured, lockout, etc as modeled after LockLink Express®.
How programming works: Program credentials in Geoffrey Offline Lock Module will indicate that programming is necessary Download credentials to PDA via Uplink Program Offline Device
How transaction history works: Using PDA, download transactions from offline device Use Uplink to upload data to Geoffrey Offline Lock Module Offline Lock Module will synchronize data Operator is able to run reports on offline lock device transaction history and archived data
Online Support for the VIP Lock Complete monitoring of door from the lockset Door position, latch position, valid and invalid credential, request to exit mechanical key override contained in the door hardware Panel interface board connects to third party access control panel Panel interface board accommodates up to 4 VIP locksets Mortise, cylindrical and exit device lock applications Connect interface board directly to panel via RS485
Offline Support for the CL Lock Offline locking solution for college campuses Manage large student and faculty populations Lock and system software can accommodate an unlimited number of key cards and unique PIN codes Define access plan, user types, and campus locks via user-friendly GUI Lock definition feature allows you to restrict access based on gender and allows for ADA-specific timing. Access plan is customizable which allows the user to use their own nomenclature to name properties of their access plan.