TELECOM SECURITY & USER
MANAGEMENT SOLUTION
High Security Locks & Keys
Access Control
Time & Attendance
Key Management
Company Profile
Acsys is a global leader in the emerging field of mechatronics access
control. With technology originating from two famous French defense
contractors in 1999, Acsys products and solutions provide a powerful
means to control who goes where and when, indoors and outdoors,
without wiring and without reliance on a power supply.
A highly specialized international team delivers world-unique, patented
solutions. From the Code Generation System (CGS) and Keypad Key to
remote staff management via the AcsysMobile App, the modular, and
solution-oriented approach sets Acsys apart from other security
competitors. With top-tier clients in the public and private sectors
extending across telecommunications, banking, power, mining, logistics,
luxury shops, aviation and more. Acsys proves why it’s all about security
& productivity!
Telecom Solutions
Verify What Work was Done, Where, and When
Decide and Control Who Goes Where and When
No Copied Keys No Picked Locks
No More Tracking of Lost/Stolen Keys and
Lock Changes
High Security Lock & Key System Key Management System
Time & Attendance System Access Control System
Acsys System Introduction
LED light on the AcsysKeys gives user information:
GREEN– ACCESS GRANTED
ORANGE – ACCESS DENIED AT THIS TIME RED– ACCESS DENIED
4 blinks (color depending on the above) – LOW BATTERY
AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL
The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit
AES ENCRYPTION, making the keys IMPOSSIBLE to COPY
Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in
various sizes All models are
Wire-Free EASY to Install EASY to Maintain Acsys Keys can be fitted
with a Proximity / RFID coil allowing the user to use the key as a badge (optional)
The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years
Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 – 18:00)
The key has a chip that can be programmed to open one or up to 100,000 locks
The lock has a built-in chip that can be programmed to accept the entry of
1,000,000 keys
The key and lock each have a built-in MEMORY that keeps track of the last
1,000 events, WHO went WHERE and WHEN
LOST/STOLEN KEYS can be DELETED from the system and
from the locks where it had access
The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and
needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock
Activity Reports
Why Acsys ?
USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES
EASY TO CHECK WHERE THE KEY
WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER Activity
Reports Activity
Reports
Office Home Gates Containers Car Park
Mon– Fri
24hrs 365Days 24hrs 08:00-20:00 Mon—Fri
Acsys Mechatronic VS Traditional Mechanical
• BTS sites require frequent maintenance/support and sometimes because the mast has stopped responding or ran out of power.
• Keys are usually distributed to users or stored in a central location, which require suppliers to spend time to collect and return those keys and requires operator to manage those keys.
• Keys are often copied leading to theft/degradation which has as a result that sites go offline or need unbudgeted maintenance leading to service interruption. • Once distributed there is no control over where and when the mechanical key is
used.
• There is little or no traceability on how long the supplier spent on site and this can have serious financial impact on operations, especially on remote sites.
• Mechanical locks are not safe and can be easily bumped/picked providing no security for the site.
• Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site.
• Despite high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs.
Acsys Mechatronic Solutions
• The Acsys solution offers controlled and secured access rights distribution. • Acsys locks CANNOT be picked or bumped and are very difficult to drill. • Keys are programmed ONLY when they need to be used and their access rightsare TIME-BASED, which means keys can ONLY be used when the operator has allowed them to work.
• The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed giving the operator CONTROL over the amount of time spent by supplier on site (and the cost of the intervention). • Keys cannot be copied, so no access is possible outside the access rights working
hours.
• If someone TRIES to access without having rights, that will be stored in the key and lock.
• Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. • If 3 WRONG codes are entered on Keypad/CGS key it will automatically DISABLE
itself.
Traditional Mechanical Locks Issues
Acsys Base Station Workflow Revolution
1. Mast down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request
2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ
4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ
Traditional Mechanical Base Station Support Workflow
Acsys Mechatronic Base Station Support Workflow
Key can be copied / lost / stolen
Key can be copied / lost / stolen
HQ
Technician1
2
3
4
5
Cell Tower A Cell Tower BHQ
Technician1
2
3
Cell Tower B Cell Tower A1. Master down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request
2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site
3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via AcsysCGS and/or AcsysMobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly.
The Monetary Benefits of Implementing the Acsys Solution
Safety
VALUE
A site that is well secured and well managed is a site that increases in value to operator and tenants!
Data
Cost Reduction
Efficiency
The Monetary Benefits Of Implementing The Acsys Solution
• As every user has a key the
downtime of towers is reduced as the O&M staff can now go directly to the site, no more time/energy/money wasted in collecting/returning /managing keys which is a win-win for both Operator/Towerco and O&M suppliers.
• The NOC now has control over which sites need servicing and when and can verify how much time users spent on site doing specific maintenances , which allows them to set KPI’s for certain tasks to increase operational efficiency.
• By using the Acsys App the users service time and location is logged, allowing the NOC to increase the amounts of sites that can be serviced in one day.
• As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized there is no more need to have security guards on site and unauthorized access is eliminated.
• As the system can automatically detect which site is being serviced, if the servicing time is abnormal (caused by a vendor being on site and injured) the NOC will be informed which in some cases can save lives.
Efficiency
Safety
• With mechanical systems when keys are lost/stolen/misplaced or copied usually time, energy, and money needs to be spent changing the locks, with the Acsys CGS system keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated.
• As the access to every asset is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used post-maintenance to gain access to sites and assets. • Since the locks require no
maintenance and the keys only need battery replacement 1x/year the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment.
• Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced.
Cost Reduction
Data
• The NOC can view how long the users have spent on site doing specific maintenances , giving them a complete overview over billable hours.
• Through implementation of the Acsys solution access to site is simplified but now also logged in real-time, so adherence to SLA’s can now be verified, good suppliers rewarded and bad suppliers eliminated.
• As access to sites is controlled the false and real alarms can be differentiated.
• The software reports allow the NOC to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible.
HOW TO PROGRAM KEYS & PROVIDE ACCESS
USB
IP
MOPRO
CUSTOMIZED
CGS
APP
IT’S ALL ABOUT
The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time.
Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit.
The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control.
The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s).
Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys.
Acsys CGS Solution (Remote Key Activation)
CGS Working Principle
ANYPHONE PHONE ANY
SMS
OPERATOR
Remote key Activation (Call/SMS)
The CGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the NOC. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the NOC (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, for example 5 minutes, to allow for access to the site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG.
Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple sites and is especially useful when a user needs to access remote sites where there might not be any coverage.
At any time, all access logs of the key can be downloaded (using the USB/IP Programmer or the MoPro) to give the NOC a full overview of the following :
-Access request time
-Access request location (site/asset) -Time of Entry
-Time of Exit
-Attempted access to other sites/assets without authorization
Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at any time without prior approval of the NOC.
If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entering a special software generated code.
Code Generating System Need Access Get Code REAL-TIME REAL-TIME OPERATOR SMS
Remote key Activation (Call/SMS)
1. The user has a password key and needs access to
some locks
2. The user calls the operator, gives his password, and receives a
code to use the key
4. The user can now use the key on the specified locks for a defined duration
(5min/30min/1HR/8HRS)
3. The user inserts PIN code to use the key, GREEN
FLASH= can use the key
1. The user has a password key and needs access to
some locks
2. The user sends SMS and password requesting access and gets a code to
use the key
4. The user can now use the key on the specified locks for a defined duration
(5min/30min/1HR/8HRS)
3. The user inserts PIN code to use the key, GREEN
FLASH= can use the key
CALL
CODE
CODE
Acsys Smartphone Solutions
For contractors and vendors with smart phones, Acsys offers NOCs even more administrative flexibility and control with our newest innovation.Introducing AcsysMobile, a multifunctional site security, user management, and ERP platform. This frontend software can be combined with our Acsysware Telecom backend software to provide a total security and staff management solution specifically designed for the telecom industry. When the AcsysMobile app for Android is combined with our other new innovation, the Acsys MoPro, the platform’s full power can be harnessed. MoPro, short for Mobile
Programmer, is a hardened and stylish key carrying case and protective pouch, that doubles as a programmer to connect an AcsysKey directly to a smart phone for programming via the AcsysMobile app. This is achieved via a micro-USB connector built into the MoPro to form a direct connection with the chip inside the user’s AcsysKey.
AcsysMobile plus Acsys MoPro means NOC’s no longer require contractors to visit their offices or any other set location for key programming or downloading of access logs which can now be done remotely.
Apart from the above, Acsys’s Mobile Programming Solutions offer a multitude of other possibilities to optimize operational efficiency, reduce OPEX, prevent theft and make sure that SLA terms are met.
NOC
ACSYS APP
CONTROL WHO GOES WHERE, WHEN AND
FOR HOW LONG BASED ON:
+
ASSIGNED TASK
LOCATION
Acsys Mobile Smartphone APP
Locate App users
in real-time
Be informed when a
user arrives on-site
Verify how long the user was on-site
Assign tasks to
users in real-time
Get alerts when a user leaves a site
Remotely Control what
site and asset(s) can be opened and for
how long
Obtain pictures of executed jobs from the site
Get user reports from the site
Allow users to have access to
technical datasheets
ACSYS APP for
remote site and user control
App stores all key data in case of
network failure
Fully redundant solution when
used with CGS
Acsys Smartphone APP UI
1. The Acsys Mobile Smartphone App for Android is a revolution in terms of real-time remote key and lock control.
2. This Access solution is called “Location-Based” as access and related CGS code will only be issued if and when the user smartphone GPS has reached the desired location.
3. The Acsys Mobile App is a fully customize-able EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App.
4. When a user accepts a task that has been assigned to him, the NOC will be informed. 5. When the user arrives on site, and he is on the desired location (based on his real-time
smartphone GPS location), a CGS code will be automatically sent to the user allowing him to OPEN the site and start his duties, The NOC will also be informed of user arrival. 6. Upon completion of his tasks, the user can send Pictures/Reports of his executed tasks in
real-time to the NOC after which a LOCKING code will be issued.
7. The real-time report and information is perfect to check COMPLIANCE with SLA terms.
Location-base Remote Key Activation (APP)
Control Center
Upload and Send Access Logs Grant and Program Access RightsGPS
Authorize Access
Location-base Remote Key Activation (APP)
1. NOC gets notification of event that requires actions of
user
2. NOC sends out task + information to the user
through Acsys App
3. When the user arrives on location, his GPS position is transmitted through Acsys App
4. If the user is in correct location Acsys CGS will automatically issue an OPEN
CODE to open the locks
8. The NOC knows when the event was created, when the user went/left site in one
report
7. The user locks all the assets
where he was given access 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user
5. When the user is finished he logs in the Acsys App and reports the event closed +
comments
NOC
NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity ReportsAcsys
Mo
bile
Pro
grammer (MoPro)
The Acsys MoPro (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with micro USB connection to facilitate communication between the Acsys Key and ANY Android-based Smartphone.
MoPro is Acsys’s solution to streamlining Operation & maintenance while increasing security. The Acsys MoPro allows technicians at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. At the same time the NOC can control each and every access right, effectively creating a real-time, remote key and user management platform.
MoPro removes the need to plug in the key in USB/IP programmers.
It is the best answer for site security, MTTR tracking, and supplier management anywhere, anytime, without wires.
REPORTS
Grant and Program Access Right
MoPr
o
Upload and Send Access Logs CONTROL CENTERGET CODE REQUEST CODE
ASSIGNED TASK
+
+
LOCATION Bluetoot h ORAcsys
Mo
bile
Pro
grammer (MoPro)
1. NOC gets notification of event that requires actions of
user
2. NOC sends out task + information to the user
through Acsys App
3. When the user arrives on location, his GPS position is transmitted through Acsys App
4. If the user is in correct location Acsys CGS will automatically issue an OPEN
CODE to open the locks
8. The NOC knows when the event was created, when the user went/left site in one
report
7.The user inserts his key in the MoPro and the access logs
(ENTRY/EXIT) of his Key are downloaded to the App and
sent to the NOC
6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user and the
user closes the locks
5. When the user is finished he logs in the Acsys App and reports the event closed +
comments
NOC
NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity ReportsLocal Programming (USB/IP)
Control Center Acsys software
Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Regional HQ 1 VPN VPN
USB
IP
USB Computer Activity Reports Regional HQ Refueling company Maintenance company Guarding companyCENTRAL LOCATION
MUTIPLE LOCATION
Regional HQ Refueling company Maintenance company Guarding companyCENTRAL LOACTION PROGRAMMING(USB):
The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key’s memory. Logs of the key’s usage can be downloaded to the database in exactly the same way.
MUTIPLE LOCATION PROGRAMMING(IP):
IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company’s operations (for convenient downloading/uploading).
Acsys Locks Acsys Keys
Local Programming (USB/IP)
1. The user has an Acsys key,
with NO access rights to the key when inserted into 2. Access rights are uploaded the USB/IP Programmer
3. The key downloads the TIME LIMITED access right from the USB/IP programmer
ex 8:00-12:00 lock 24/25/32
4. The user opens the lock within the fixed time
(08:00-12:00)
8. Access logs are automatically downloaded and
any remaining rights are deleted from the key
7. The user goes back to the office, inserts the key into the
USB/IP programmer
6. The user finishes work and
locks the door/gate maintenance(ex 8:00 - 12:00) 5. The user carries out the Control Center Activity Reports
Acsysware Architecture
Multi-Site/Country/Operator
Country A
Country B
Country C
Country D
HQ NOC
Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 Region 1 Region 2
Program
and
Audit
keys in a combination of
USB/LAN/CGS/BLUETOOTH/3G depending on the needs
Global access And audit Reports
National access And audit Reports
Regional access And audit Reports
Request & validation
Req ues t & v al id at io n Si te A cc es s
Acsysware introduction
Acsys Telecom is a Key and Lock Management System specifically designed for Telecom and Tower Companies. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsys Telecom provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks.
The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods AES-128 bit which prevents key duplication.
Acsys Telecom is supported by one of the most scalable and most stable database MS SQL Server 2008 R2 which permits the software platform to be installed across the network. The Acsys Telecom wizard-like experience is designed to carry out error-free management of the keys and the locks.
Acsys software platform comes with the standard Acsys Telecom software system. All features are added as modules such as the Acsys CGS +, Acsys IP Server, Acsys SMS Gateway Server without any modification or re-installation of the
Combined with various technology, Acsysware developed a variety of flexible system (such as USB Programmer, IP Programmer, Calling, SMS, Smartphone App and MoPro ) according to different industry characteristics.
Server Acsysware CGS CALL CGS SMS CGS APP MoPro USB/IP PROGRAMMER CGS Module Watch Dog Module
Human Resources Module Activity Report Module Server Acsysware
Architecture
Acsysware Report
The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new Email notification services, the reports can be sent to individual users or user groups on daily, weekly and monthly basis.
Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS + platform is a newly designed revolutionary module which provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin point the location where and by whom the maintenance is taken place.
Live Dashboard
Reporting Tool
Acsys Customized Solutions
Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements.
Whether integrating with other on-site security equipment, lifecycle management or site monitoring systems, asset-specific mechanical integrations, high security solutions that require multiple person presence for access (see ‘Stackable Key Solution’), anti-destructive technology to secure your locks (see ‘High Security Hasp Solution’) and beyond, Acsys takes pride in going the extra mile. We don’t just collect invaluable customer input, but utilize it to solve issues that our clients may have formerly thought unsolvable.
If you don’t see something that perfectly fits your unique situation, don’t worry, we are happy to discuss how to make something that does.
Battery/AVR/3G/4G/LTE Cabinet Lock
Wide Variety of Handles
Replace
mechanical lock
with an
Acsys Blind Lock
Close Open
Open Close
360°
Acsys Blind Lock Other Models
High Security HASP for Front Gate and Storage Rooms
THE SAFEST PADLOCK
IN THE WORLD
STEP 1
STEP 2
STEP 3
STEP 4
Bolted
Bolted
and
welded
By integrating the Acsys IP Programmer with existing RSM (remote
site monitoring) devices, we have created a HotSpot scenario with
the following advantages :
1. Users are able to download access rights and upload access logs of
their key at any of the installed sites
2. The NOC can get real-time notification of
arrival/presence/departure
3. The NOC can update key access rights remotely without having to
ask the user to come to an office. (for example allow a supplier of
Cluster Nr 1 to get temporary/extended access to Cluster Nr 2)
1. IP 66 Rating
2. Power and data come from RSM unit 3. Self-shutting design
4. Easy to use
5. Visual aids to inform user of status 6. Real-time connection with NOC
7. Real-time notification of user arrival/departure
RSM Integration Solution
The Acsys OUTDOOR IP Key Programmer
Compatible with:
CONTROL CENTER RMS OPTIONAL ALARM ELECTRIC FENCE CCTV ENABLE/ DISABLEThe Acsys LAN Lock solution is a unique solution developed by Acsys specifically
for Huawei 4G LTE cabinets. Those cabinets have a built-in modem which allows
connections from 1/3 party devices including the Acsys Lan Lock. The main
advantage of this solution are that it is fully redundant, it allows the NOC to be
alerted in real-time when the lock is opened, allows the NOC to refuse access in
real-time and allows for controlled access even when the LTE cabinet is not
operational offering a total and fully redundant solution for controlled access
4G/LTE Cabinet Real Time Solution
1. NOC gets notification of event that requires actions of
user
2. The user is notified and goes on-site with a
pre-programmed key
3. The user arrives on-site and
opens the lock 4. When the key is inserted the NOC gets an ALERT that the door has been OPENED
6. In case the Cabinet is not functioning, Access can still be
granted remotely (CGS-App) and the lock opened as the
key powers the lock
5. When work is complete the key is inserted in the lock again
the NOC gets an ALERT that the door has been CLOSED
NOC
7. After completion of maintenance a report will be issued to the NOC informing them when the event was
created, and when the user arrived/left the site
Activity Reports REAL-TIME IP REAL-TIME IP REAL-TIME IP REDUNDANT SOLUTION
•
The stackable key solution is another
world-unique Acsys development as it offers a
previously unknown level of control over
access to high-value or sensitive sites.
•
The SK solution works as a bank safe where
two keys are required but only requires one
lock instead of two and can also be used on
padlocks so the solution is available for indoor
and outdoor applications.
•
The system can be programmed so that up to
5 keys need to be used in order to open 1 lock
•
The solution can be used in conjunction with
Acsys CGS remote key activation.
Acsys Stackable Key Solution
CONCEPT
EXAMPLE
Worker alone cannot open the lock!
Manager alone cannot open the lock!
Worker & Manager together
Worker ,Manager & Security staff together
use 3 keys to open a lock
Worker Manager Worker Manager Security Worker Manager
OR
1
2
1
2
3
On-site Time & Attendance Solution
TOWER
GENERATOR
BTS SHELTER
FUEL TANK
LTE CABINET
BATTERIES
1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives on-site to report to duty, he inserts his key in logger3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays on-site.
4. In case of emergency, if the guard need access to the site, he can request CGS code and enter site
5. During monthly site audit, the guard’s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer
6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) 30 MINUTES
CGS
ADVANTAGES:
· NO CABLE · NO POWER · NO BATTERY · NO MAINTENANCECONTROL:
· PREVENTIVE MAINTENANCE · SCHEDULED MAINTENANCE · EMERGENCY MAINTENANCE · ADHERENCE TO SLA1. The user has a keypad key
and needs access to ladder 2. The user sends SMS or CALL to gets a code to use the key to open
3. The user inserts PIN code to open the ladder’s Lock for a defined duration (5min/30min/1HR/8HRS)
4. The NOC notified in real-time and a report shows ladder’s using
Ladder Access Control & Safety Solution
In order to further increase
safety on the workplace, Acsys
and Karam(www.karam.in)
have designed the world’s first
integrated fall prevention
solution combined with
real-time access control. There by
preventing un-authorized
people from ascending the
mast. The solution allows the
NOC to control in real-time and
wirelessly who is ascending
which mast and for what
reason, at the same time
ensuring the user is properly
fastened to the fall prevention
equipment before starting this
ascent.
CODE SMS/CALL
Activity Reports
Unlock the ladder’s lock, the user can go up after turning the steps horizontally
Acsys Key Specifications
• Key is impossible to copy • Key in Reinforced ABS, UV proof,
IP55,RoHS
• Stainless steel blade • Powered by 2x LR1 batteries
• Battery autonomy 2 years/25k openings
• Operating Temperature from -10C to
+65C
• Logs last 1000 operations • 4 Status LED (Access/No
access/Restricted Access/Low battery)
PASSWORD IKEY CGS IKEY PASSWORD AKEY WITH LCD FINGERPRINT KEY CGS AKEY PASSWORD AKEY
OPTIONAL
USE YOUR KEY AS A BADGE
Acsys Key Proximity/RFID
Acsys ProxKey
Acsys Cylinder Locks Specifications
• Locks are impossible to pick/bump
• Brass with stainless steel plating
• Power comes from key (no battery)
• No Wiring
• EURO-DIN standard
• Operating temperature -20°C to +85°C
• Logs last 1000 operations
• Sizes from 3cm to 14cm
Padlocks
Cylinder Locks
Button Lock
Double Lock
Blind Lock
Acsys Padlocks Specifications
• Padlocks are impossible to pick/bump • Brass with stainless steel plating
• Power comes from Key (no battery)
• Operating temperature from -20°C to +85°C
• Logs last 1000 operations
PL2
PL5
• Padlocks are impossible to pick/bump • Brass with stainless steel plating
• Power comes from Key (no battery)
• Operating temperature from -20°C to
+85°C
Other Products Specifications
• Reinforced ABS, UV proof
• IP 55, RoHS
• Powered by USB (USB)
• Powered by DC Power supply
Mobile Programmer (MoPro)
USB/IP Programmer
• Reinforced ABS, UV proof
• IP 55, RoHS
• Powered by Micro USB
Quality Assurance and Awards
Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000.
Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA.
Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications.
The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years.
REAL
TIME UNIQUE WORLD WIRE FREE
REDUCE DOWN-TIME/PREVENT THEFT
SMS KEY