We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byChloe Davidson
Modified over 3 years ago
Questor an innovative solution by central control
Questor, © Kaba The Questor high security lock is born out of a customer need to prevent frauds by modern organized delinquency With its innovative operating mode, the lock increases security for live and valuables significantly But the main task the Questor is to remote control the opening authorization of safes giving a full and centralized traceability. Its simplicity in usage results in saving a large amount of money for servicing and operation Questor, innovative security solution
Questor, © Kaba Grief with keys? … then, its you were addressing! Questor, innovative security solution
Questor, © Kaba And what about codes? Are they always kept secret? Are they changed regularly? Is the coding secure enough? When codes are not needed, are they always being erased? Does every code really belong to only one user? Questor, innovative security solution
Questor, © Kaba QUESTOR Questor, innovative security solution Patent pending
Questor, © Kaba OTC, the right solution! OTC means OTC codes can only be used once An OTC code is not valid for a second opening anymore Generated OTC codes change every time Once used, the OTC code expires Questor, innovative security solution
Questor, © Kaba QUESTOR uses ICS! ICS means ICS uses OTC codes ICS requires the user to be on site at the lock ICS is a new Kaba security concept Questor, innovative security solution
Questor, © Kaba The QUESTOR lock has two operating modes Mode Interactive Code System Standard (bank) mode The lock can operate in either one or the other mode but never in both modes at the same time! Operating modes
Questor, © Kaba Interactive Code System operating mode... Interactive Code System Requires a dispatching center (or computer) Controls lock openings by remote Does not require any wiring to the lock at all Allows a total traceability of all events
Questor, © Kaba The dispatching center consists of... A computer Management software Electronic protection keys (USB dongles) Dispatching center
Questor, © Kaba ICS mode works... At the dispatching center, users and locks are registered Each lock is identified by its unique serial number Users are identified by a four digits ID User IDs can be created, changed and deleted at any time by the dispatching center ICS mode
Questor, © Kaba ICS mode ICS mode works... At the lock, the user inserts its four digits ID The lock answers with a question which the user transmits to the dispatching center After the introduction of the question in the management software, a One Time Opening Combination (OTC) is issued by the software When the lock is closed again, the Questor generates a close seal which must be transmitted to the dispatching center
Questor, © Kaba Mister Smith, 6053 ICS example...an examples for ICS mode operation: At the dispatching center, in the management software, mister Smith has the user ID 6053 dispatching center
Questor, © Kaba ICS example The lock is waiting for a user ID input...
Questor, © Kaba User Identification ICS example At the lock, the user inserts its unique user ID Mister Smith, 6053 input 6053
Questor, © Kaba ICS example The lock displays a request code (question) Mister Smith,
Questor, © Kaba The lock is in count down, waiting for the input of the opening code ICS example lock displays count down for code entry maximum 2`30``
Questor, © Kaba ICS example During this time, mister Smith transmits the question to the dispatching center Mister Smith dispatching center
Questor, © Kaba ICS example The dispatching center returns a one time valid opening combinations (OTC) Mister Smith answer dispatching center
Questor, © Kaba ICS example Mister Smith inserts the opening combination into the lock Mister Smith
Questor, © Kaba programmable from 1 to 99 ICS example If the opening combination is valid, the lock starts the counting down the opening time delay and then opens
Questor, © Kaba ICS example After the lock has been closed again, it will automatically display a close seal lock displays close seal
Questor, © Kaba ICS example Mister Smith transmits the close seal to the dispatching center Mister Smith dispatching center
Questor, © Kaba programmable from 1 to 99 ICS example The lock automatically blocks itself for a specified period of time (non return time delay)
Questor, © Kaba ICS example If under duress, mister smith can modify the procedure of inserting his user ID User Identification Mister Smith,
Questor, © Kaba ICS example The lock answers, like normal, by displaying a request code (question). The system is aware of the duress situation. Mister Smith
Questor, © Kaba ICS example By remote, a one time valid combination with duress time delay is dispatched Mister Smith
Questor, © Kaba ICS advantages ICS mode has the following advantages Dispatch an opening combination only in interaction with the dispatching center The opening combination is limited in time Silent alarms for duress or attack are transmitted to the dispatching center Full traceability of all events in the lock and at the dispatching center
Questor, © Kaba The QUESTOR concept does not use: keyselectronic identifierswires ICS advantages
Questor, © Kaba « standard » mode Operates like a standard electronic combination lock Different access levels (master, manager, user) Time delays, opening windows Porgrammable in- and outputs Audit (event memory) with > 4800 lines Standard mode
Questor, © Kaba Codes
Questor, © Kaba Large iconographic display : format AM/PM text attention ! battery status lock status date / time functions delayscodesaudit miscellaneous Display
Questor, © Kaba A few technical specifications : Bolt and motor position controlled by infrared sensors Low power consumption Perpetual clock Integrated alarm connections Bolt manipulation detection Technical specifications
Questor, © Kaba A few more technical specifications : Dual mode operation (4-eyes) Opening counter Silent alarm Two level audio signal (beeper) Door contact input Technical specifications
Questor, © Kaba Programming Programming by lock keypad or software Activation by software +
Questor, © Kaba Based on the SL 525, the QUESTOR offers: Motorized bolt Standard size (magic module) Large display Multiple languages facilities And lots of other functions Features
Questor, © Kaba Summer / winter time change Automated daylight saving time
Questor, © Kaba weapons pharmaceuticals key deposit safe ATM fire drop safe private Dispatch Center Installation The QUESTOR is appropriate for all safes
Questor, © Kaba Applications For Cash In Transit companies
Questor, © Kaba For local and federal police branches Applications
Questor, © Kaba For military applications Applications
Questor, © Kaba For security companies Applications
Questor, © Kaba For secret services Applications
Questor, © Kaba Questor is certified by : a product of Certifications
Questor, © Kaba QUESTOR is based upon : A new KABA security philosophy A new, unique operating mode A significant increase in security Big reduction in cost of ownership High level of security Key facts
Questor, © Kaba Authorize and control the access to all your safes by remote, without any wire, thanks to QUESTOR
Thank you for your attention
6/1/20141 Training S2 Training Guide OVERVIEW –1. …. –2. –3. DESKTOP.
Please, select a question: How does a personal account work? How to apply to a job offer? How to send a spontaneous application? How to recover your password?
10/12/20141Chem-160. Covalent Bonds 10/12/20142Chem-160.
6/2/20141 Database System DICT:501 Md. Ariful Islam Khandaker Assistant Professor, IICT. KUET.
Introduction to TCP/IP and OSI model 1/12/20141Mr. Naresh Sharma,
Evaluating Proposals And Suppliers December 10, Paul J. Brennan, CPPO The New York State Association of Municipal Purchasing Official’s.
Database Modelling Week 2: Directed Reading Relational Database Design Nick Rossiter October 3,
February 22, /2/ AN INTRODUCTION TO COMPUTER TECHNOLOGY This lesson introduces key concepts related to how computers work. Computer-related.
6/13/20141 Thin Brick Faced Precast ASV Ladysmith, Virginia American Stone Virginia, LLC.
6/3/20141 PSUs CS 587 Chapter 9, Disks and Files The Storage Hierarchy Disks Mechanics Performance RAID Disk Space Management Buffer Management Files of.
Database Modelling Lecture 1: Introduction to Databases Akhtar Ali 25 August
6/1/20141 Medication Training Curriculum to Recertify Medication Assistants.
The Evergreen State College 6/3/2014The Evergreen State College1 Click to start.
Session Agenda What is WebCRD? The four ways to place an order Placing an order from an application Uploading a document Placing a Catalog order.
Rev Monday, January 13, Foundations, Technology, Skills Tools.
Charge Module Design, Implementation, and Troubleshooting November 11, 2011 Presenter: Tracy Kimble.
12/10/20141 Pricing policy Dr. Vesselin Blagoev. 12/10/20142 Pricing methods Cost Competition Marketing Pricing methods.
HVAC Contractor Strategic Business Planning Strategic Planning Process Goal Setting Sales Plan Service/Projects Construction Fabrication Operations Engineering.
Teamwork 101 By Tracy L. Chenoweth. 2/28/20142 How would you define teamwork?
Device Drivers cs423, Fall 2007 Klara Nahrstedt/Sam King 6/6/20141.
& The ‘All-in-One’ Combination Locks SL 523 SL 525.
Institute for Defense Analyses 4850 Mark Center Drive Alexandria, Virginia Open Source Software (OSS or FLOSS) and the U.S. Department of Defense.
Session # 2 [Introduction to Computers] What is Computer ? A computer is a machine that manipulates data according to a list of instructions. Machine.
Institute for Defense Analyses 4850 Mark Center Drive Alexandria, Virginia Open Source Software (OSS or FLOSS), Government, and Cyber Security.
Responsibility By: Tracy L. Chenoweth. 2/28/20142 Opening Question When you think of the word responsibility what kinds of things come to mind? Lets collectively.
Welcome Welcome to the next session in the professional development program focused around the 9-12 Mathematics Standards. 3/1/20141Geometry.
Albany Park Community Center THE CONCUSSION CRISIS : What you don’t know can hurt you!! Presented by March 29, 2014 Copyright: Sports Brain, LLC
1 A Review of the Architecture and the Underlying Protocols in the Telephone Network Dipak Ghosal Department of Computer Science University of California.
© 2017 SlidePlayer.com Inc. All rights reserved.