Presentation on theme: "an innovative solution by central control"— Presentation transcript:
1 an innovative solution by central control Questoran innovative solution by central control
2 Questor, innovative security solution The Questor high security lock is born out of a customer need to prevent frauds by modern organized delinquencyWith its innovative operating mode, the lock increases security for live and valuables significantlyBut the main task the Questor is to remote control the opening authorization of safes giving a full and centralized traceability.Its simplicity in usage results in saving a large amount of money for servicing and operation
3 Questor, innovative security solution Grief with keys? … then, its you we’re addressing!
4 Questor, innovative security solution And what about codes?Are they always kept secret?Are they changed regularly?Is the coding secure enough?When codes are not needed, are they always being erased?Does every code really belong to only one user?
6 Questor, innovative security solution OTC, the right solution!OTC means <One Time Combination>OTC codes can only be used onceAn OTC code is not valid for a second opening anymoreGenerated OTC codes change every timeOnce used, the OTC code expires
7 Questor, innovative security solution QUESTOR uses ICS!ICS means <Interactive Code System>ICS uses OTC codesICS requires the user to be on site at the lockICS is a new Kaba security concept
8 Operating modes The QUESTOR lock has two operating modes Mode Interactive Code SystemStandard (bank) modeThe lock can operate in either one or the other mode but never in both modes at the same time!
9 Interactive Code System Interactive Code System operating mode...Requires a dispatching center (or computer)Controls lock openings by remoteDoes not require any wiring to the lock at allAllows a total traceability of all events
10 Dispatching center The dispatching center consists of... A computer Management softwareElectronic protection keys (USB dongles)
11 ICS modeICS mode works...At the dispatching center, users and locks are registeredEach lock is identified by its unique serial numberUsers are identified by a four digits IDUser IDs can be created, changed and deleted at any time by the dispatching center
12 ICS modeICS mode works...At the lock, the user inserts its four digits IDThe lock answers with a question which the user transmits to the dispatching centerAfter the introduction of the question in the management software, a One Time Opening Combination (OTC) is issued by the softwareWhen the lock is closed again, the Questor generates a close seal which must be transmitted to the dispatching center
13 ICS example ...an examples for ICS mode operation: At the dispatching center, in the management software, mister Smith has the user ID 6053dispatching centerMister Smith, 6053
14 ICS exampleThe lock is waiting for a user ID input...
15 ICS example At the lock, the user inserts its unique user ID IdentificationMister Smith, 6053input 6053
16 ICS example The lock displays a request code (question) Mister Smith, 6053
17 ICS exampleThe lock is in count down, waiting for the input of the opening codelock displays count downfor code entrymaximum 2`30``
18 ICS exampleDuring this time, mister Smith transmits the question to the dispatching centerdispatching centerMister Smith
19 ICS exampleThe dispatching center returns a one time valid opening combinations (OTC)dispatching centerMister Smithanswer
20 ICS example Mister Smith inserts the opening combination into the lock Mister Smith222222<ENTER>
21 ICS example programmable from 1’ to 99’ If the opening combination is valid, the lock starts the counting down the opening time delay and then opensprogrammable from 1’ to 99’
22 ICS exampleAfter the lock has been closed again, it will automatically display a close seallock displaysclose seal
23 ICS exampleMister Smith transmits the close seal to the dispatching centerdispatching centerMister Smith
24 ICS example programmable from 1’ to 99’ The lock automatically blocks itself for a specified period of time („non return time delay“)programmable from 1’ to 99’
25 ICS exampleIf under duress, mister smith can modify the procedure of inserting his user IDUserIdentificationMister Smith, 60536053<ENTER>
26 ICS exampleThe lock answers, like normal, by displaying a request code (question). The system is aware of the duress situation.Mister Smith
27 ICS exampleBy remote, a one time valid combination with duress time delay is dispatchedMister Smith
28 ICS advantages ICS mode has the following advantages Dispatch an opening combination only in interaction with the dispatching centerThe opening combination is limited in timeSilent alarms for duress or attack are transmitted to the dispatching centerFull traceability of all events in the lock and at the dispatching center
29 electronic identifiers ICS advantagesThe QUESTOR concept does not use:keyselectronic identifierswires
30 Standard mode « standard » mode Operates like a standard electronic combination lockDifferent access levels (master, manager, user)Time delays, opening windowsPorgrammable in- and outputsAudit (event memory) with > 4’800 lines
32 Display Large iconographic display : time functions delays codes audit date /timemiscellaneouslockstatustextbatterystatusformatAM/PMattention !
33 Technical specifications A few technical specifications :Bolt and motor position controlled by infrared sensorsLow power consumptionPerpetual clockIntegrated alarm connectionsBolt manipulation detection
34 Technical specifications A few more technical specifications :Dual mode operation (4-eyes)Opening counterSilent alarmTwo level audio signal (beeper)Door contact input
35 Programming + Programming by lock keypad or software Activation by software+
36 Features Based on the SL 525, the QUESTOR offers: Motorized bolt Standard size (magic module)Large displayMultiple languages facilitiesAnd lots of other functions
37 Summer / winter time change Automated daylight saving time
38 Installation The QUESTOR is appropriate for all safes weapons fire ATM pharmaceuticalsDispatch Centerkeydeposit safedrop safeprivate