• No results found

TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

N/A
N/A
Protected

Academic year: 2021

Share "TELECOM SECURITY & USER MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management"

Copied!
39
0
0

Loading.... (view fulltext now)

Full text

(1)

TELECOM SECURITY & USER

MANAGEMENT SOLUTION

High Security Locks & Keys

Access Control

Time & Attendance

Key Management

(2)

Company Profile

Acsys is a global leader in the emerging field of mechatronics access

control. With technology originating from two famous French defense

contractors in 1999, Acsys products and solutions provide a powerful

means to control who goes where and when, indoors and outdoors,

without wiring and without reliance on a power supply.

A highly specialized international team delivers world-unique, patented

solutions. From the Code Generation System (CGS) and Keypad Key to

remote staff management via the AcsysMobile App, the modular, and

solution-oriented approach sets Acsys apart from other security

competitors. With top-tier clients in the public and private sectors

extending across telecommunications, banking, power, mining, logistics,

luxury shops, aviation and more. Acsys proves why it’s all about security

& productivity!

(3)

Telecom Solutions

Verify What Work was Done, Where, and When

Decide and Control Who Goes Where and When

No Copied Keys No Picked Locks

No More Tracking of Lost/Stolen Keys and

Lock Changes

High Security Lock & Key System Key Management System

Time & Attendance System Access Control System

(4)

Acsys System Introduction

LED light on the AcsysKeys gives user information:

GREEN– ACCESS GRANTED

ORANGE – ACCESS DENIED AT THIS TIME RED– ACCESS DENIED

4 blinks (color depending on the above) – LOW BATTERY

AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL

The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit

AES ENCRYPTION, making the keys IMPOSSIBLE to COPY

Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in

various sizes All models are

Wire-Free EASY to Install EASY to Maintain Acsys Keys can be fitted

with a Proximity / RFID coil allowing the user to use the key as a badge (optional)

The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years

Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 – 18:00)

The key has a chip that can be programmed to open one or up to 100,000 locks

The lock has a built-in chip that can be programmed to accept the entry of

1,000,000 keys

The key and lock each have a built-in MEMORY that keeps track of the last

1,000 events, WHO went WHERE and WHEN

LOST/STOLEN KEYS can be DELETED from the system and

from the locks where it had access

The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and

needed to be reset via the Acsysware management software. PL5 PL2 Button Lock Blind Lock Double Lock

Activity Reports

(5)

Why Acsys ?

USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES

EASY TO CHECK WHERE THE KEY

WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER Activity

Reports Activity

Reports

Office Home Gates Containers Car Park

Mon– Fri

24hrs 365Days 24hrs 08:00-20:00 Mon—Fri

(6)

Acsys Mechatronic VS Traditional Mechanical

• BTS sites require frequent maintenance/support and sometimes because the mast has stopped responding or ran out of power.

• Keys are usually distributed to users or stored in a central location, which require suppliers to spend time to collect and return those keys and requires operator to manage those keys.

• Keys are often copied leading to theft/degradation which has as a result that sites go offline or need unbudgeted maintenance leading to service interruption. • Once distributed there is no control over where and when the mechanical key is

used.

• There is little or no traceability on how long the supplier spent on site and this can have serious financial impact on operations, especially on remote sites.

• Mechanical locks are not safe and can be easily bumped/picked providing no security for the site.

• Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site.

• Despite high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs.

Acsys Mechatronic Solutions

• The Acsys solution offers controlled and secured access rights distribution. • Acsys locks CANNOT be picked or bumped and are very difficult to drill. • Keys are programmed ONLY when they need to be used and their access rights

are TIME-BASED, which means keys can ONLY be used when the operator has allowed them to work.

• The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed giving the operator CONTROL over the amount of time spent by supplier on site (and the cost of the intervention). • Keys cannot be copied, so no access is possible outside the access rights working

hours.

• If someone TRIES to access without having rights, that will be stored in the key and lock.

• Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. • If 3 WRONG codes are entered on Keypad/CGS key it will automatically DISABLE

itself.

Traditional Mechanical Locks Issues

(7)

Acsys Base Station Workflow Revolution

1. Mast down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request

2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ

4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ

Traditional Mechanical Base Station Support Workflow

Acsys Mechatronic Base Station Support Workflow

Key can be copied / lost / stolen

Key can be copied / lost / stolen

HQ

Technician

1

2

3

4

5

Cell Tower A Cell Tower B

HQ

Technician

1

2

3

Cell Tower B Cell Tower A

1. Master down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request

2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site

3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via AcsysCGS and/or AcsysMobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly.

(8)

The Monetary Benefits of Implementing the Acsys Solution

Safety

VALUE

A site that is well secured and well managed is a site that increases in value to operator and tenants!

Data

Cost Reduction

Efficiency

(9)

The Monetary Benefits Of Implementing The Acsys Solution

• As every user has a key the

downtime of towers is reduced as the O&M staff can now go directly to the site, no more time/energy/money wasted in collecting/returning /managing keys which is a win-win for both Operator/Towerco and O&M suppliers.

• The NOC now has control over which sites need servicing and when and can verify how much time users spent on site doing specific maintenances , which allows them to set KPI’s for certain tasks to increase operational efficiency.

• By using the Acsys App the users service time and location is logged, allowing the NOC to increase the amounts of sites that can be serviced in one day.

• As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized there is no more need to have security guards on site and unauthorized access is eliminated.

• As the system can automatically detect which site is being serviced, if the servicing time is abnormal (caused by a vendor being on site and injured) the NOC will be informed which in some cases can save lives.

Efficiency

Safety

• With mechanical systems when keys are lost/stolen/misplaced or copied usually time, energy, and money needs to be spent changing the locks, with the Acsys CGS system keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated.

• As the access to every asset is now remotely controlled, we see a great reduction in theft, which is often inside jobs due to the fact that keys are copied and then used post-maintenance to gain access to sites and assets. • Since the locks require no

maintenance and the keys only need battery replacement 1x/year the OPEX cost of running the Acsys system is minimal meaning little or no recurrent expenditure after deployment.

• Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced.

Cost Reduction

Data

• The NOC can view how long the users have spent on site doing specific maintenances , giving them a complete overview over billable hours.

• Through implementation of the Acsys solution access to site is simplified but now also logged in real-time, so adherence to SLA’s can now be verified, good suppliers rewarded and bad suppliers eliminated.

• As access to sites is controlled the false and real alarms can be differentiated.

• The software reports allow the NOC to detect abnormal patterns of user behavior and act upon them, collusion between employees to circumvent the system is impossible.

(10)

HOW TO PROGRAM KEYS & PROVIDE ACCESS

USB

IP

MOPRO

CUSTOMIZED

CGS

APP

IT’S ALL ABOUT

(11)

The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time.

Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit.

The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control.

The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s).

Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys.

Acsys CGS Solution (Remote Key Activation)

CGS Working Principle

ANY

PHONE PHONE ANY

SMS

OPERATOR

(12)

Remote key Activation (Call/SMS)

The CGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the NOC. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the NOC (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, for example 5 minutes, to allow for access to the site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG.

Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple sites and is especially useful when a user needs to access remote sites where there might not be any coverage.

At any time, all access logs of the key can be downloaded (using the USB/IP Programmer or the MoPro) to give the NOC a full overview of the following :

-Access request time

-Access request location (site/asset) -Time of Entry

-Time of Exit

-Attempted access to other sites/assets without authorization

Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at any time without prior approval of the NOC.

If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entering a special software generated code.

Code Generating System Need Access Get Code REAL-TIME REAL-TIME OPERATOR SMS

(13)

Remote key Activation (Call/SMS)

1. The user has a password key and needs access to

some locks

2. The user calls the operator, gives his password, and receives a

code to use the key

4. The user can now use the key on the specified locks for a defined duration

(5min/30min/1HR/8HRS)

3. The user inserts PIN code to use the key, GREEN

FLASH= can use the key

1. The user has a password key and needs access to

some locks

2. The user sends SMS and password requesting access and gets a code to

use the key

4. The user can now use the key on the specified locks for a defined duration

(5min/30min/1HR/8HRS)

3. The user inserts PIN code to use the key, GREEN

FLASH= can use the key

CALL

CODE

CODE

(14)

Acsys Smartphone Solutions

For contractors and vendors with smart phones, Acsys offers NOCs even more administrative flexibility and control with our newest innovation.

Introducing AcsysMobile, a multifunctional site security, user management, and ERP platform. This frontend software can be combined with our Acsysware Telecom backend software to provide a total security and staff management solution specifically designed for the telecom industry. When the AcsysMobile app for Android is combined with our other new innovation, the Acsys MoPro, the platform’s full power can be harnessed. MoPro, short for Mobile

Programmer, is a hardened and stylish key carrying case and protective pouch, that doubles as a programmer to connect an AcsysKey directly to a smart phone for programming via the AcsysMobile app. This is achieved via a micro-USB connector built into the MoPro to form a direct connection with the chip inside the user’s AcsysKey.

AcsysMobile plus Acsys MoPro means NOC’s no longer require contractors to visit their offices or any other set location for key programming or downloading of access logs which can now be done remotely.

Apart from the above, Acsys’s Mobile Programming Solutions offer a multitude of other possibilities to optimize operational efficiency, reduce OPEX, prevent theft and make sure that SLA terms are met.

NOC

ACSYS APP

CONTROL WHO GOES WHERE, WHEN AND

FOR HOW LONG BASED ON:

+

ASSIGNED TASK

LOCATION

(15)

Acsys Mobile Smartphone APP

Locate App users

in real-time

Be informed when a

user arrives on-site

Verify how long the user was on-site

Assign tasks to

users in real-time

Get alerts when a user leaves a site

Remotely Control what

site and asset(s) can be opened and for

how long

Obtain pictures of executed jobs from the site

Get user reports from the site

Allow users to have access to

technical datasheets

ACSYS APP for

remote site and user control

App stores all key data in case of

network failure

Fully redundant solution when

used with CGS

(16)

Acsys Smartphone APP UI

(17)

1. The Acsys Mobile Smartphone App for Android is a revolution in terms of real-time remote key and lock control.

2. This Access solution is called “Location-Based” as access and related CGS code will only be issued if and when the user smartphone GPS has reached the desired location.

3. The Acsys Mobile App is a fully customize-able EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App.

4. When a user accepts a task that has been assigned to him, the NOC will be informed. 5. When the user arrives on site, and he is on the desired location (based on his real-time

smartphone GPS location), a CGS code will be automatically sent to the user allowing him to OPEN the site and start his duties, The NOC will also be informed of user arrival. 6. Upon completion of his tasks, the user can send Pictures/Reports of his executed tasks in

real-time to the NOC after which a LOCKING code will be issued.

7. The real-time report and information is perfect to check COMPLIANCE with SLA terms.

Location-base Remote Key Activation (APP)

Control Center

Upload and Send Access Logs Grant and Program Access Rights

GPS

Authorize Access

(18)

Location-base Remote Key Activation (APP)

1. NOC gets notification of event that requires actions of

user

2. NOC sends out task + information to the user

through Acsys App

3. When the user arrives on location, his GPS position is transmitted through Acsys App

4. If the user is in correct location Acsys CGS will automatically issue an OPEN

CODE to open the locks

8. The NOC knows when the event was created, when the user went/left site in one

report

7. The user locks all the assets

where he was given access 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user

5. When the user is finished he logs in the Acsys App and reports the event closed +

comments

NOC

NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity Reports

(19)

Acsys

Mo

bile

Pro

grammer (MoPro)

The Acsys MoPro (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with micro USB connection to facilitate communication between the Acsys Key and ANY Android-based Smartphone.

MoPro is Acsys’s solution to streamlining Operation & maintenance while increasing security. The Acsys MoPro allows technicians at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the NOC. At the same time the NOC can control each and every access right, effectively creating a real-time, remote key and user management platform.

MoPro removes the need to plug in the key in USB/IP programmers.

It is the best answer for site security, MTTR tracking, and supplier management anywhere, anytime, without wires.

REPORTS

Grant and Program Access Right

MoPr

o

Upload and Send Access Logs CONTROL CENTER

GET CODE REQUEST CODE

ASSIGNED TASK

+

+

LOCATION Bluetoot h OR

(20)

Acsys

Mo

bile

Pro

grammer (MoPro)

1. NOC gets notification of event that requires actions of

user

2. NOC sends out task + information to the user

through Acsys App

3. When the user arrives on location, his GPS position is transmitted through Acsys App

4. If the user is in correct location Acsys CGS will automatically issue an OPEN

CODE to open the locks

8. The NOC knows when the event was created, when the user went/left site in one

report

7.The user inserts his key in the MoPro and the access logs

(ENTRY/EXIT) of his Key are downloaded to the App and

sent to the NOC

6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user and the

user closes the locks

5. When the user is finished he logs in the Acsys App and reports the event closed +

comments

NOC

NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity Reports

(21)

Local Programming (USB/IP)

Control Center Acsys software

Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Regional HQ 1 VPN VPN

USB

IP

USB Computer Activity Reports Regional HQ Refueling company Maintenance company Guarding company

CENTRAL LOCATION

MUTIPLE LOCATION

Regional HQ Refueling company Maintenance company Guarding company

CENTRAL LOACTION PROGRAMMING(USB):

The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key’s memory. Logs of the key’s usage can be downloaded to the database in exactly the same way.

MUTIPLE LOCATION PROGRAMMING(IP):

IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company’s operations (for convenient downloading/uploading).

Acsys Locks Acsys Keys

(22)

Local Programming (USB/IP)

1. The user has an Acsys key,

with NO access rights to the key when inserted into 2. Access rights are uploaded the USB/IP Programmer

3. The key downloads the TIME LIMITED access right from the USB/IP programmer

ex 8:00-12:00 lock 24/25/32

4. The user opens the lock within the fixed time

(08:00-12:00)

8. Access logs are automatically downloaded and

any remaining rights are deleted from the key

7. The user goes back to the office, inserts the key into the

USB/IP programmer

6. The user finishes work and

locks the door/gate maintenance(ex 8:00 - 12:00) 5. The user carries out the Control Center Activity Reports

(23)

Acsysware Architecture

Multi-Site/Country/Operator

Country A

Country B

Country C

Country D

HQ NOC

Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 Region 1 Region 2

Program

and

Audit

keys in a combination of

USB/LAN/CGS/BLUETOOTH/3G depending on the needs

Global access And audit Reports

National access And audit Reports

Regional access And audit Reports

Request & validation

Req ues t & v al id at io n Si te A cc es s

(24)

Acsysware introduction

Acsys Telecom is a Key and Lock Management System specifically designed for Telecom and Tower Companies. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsys Telecom provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks.

The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods AES-128 bit which prevents key duplication.

Acsys Telecom is supported by one of the most scalable and most stable database MS SQL Server 2008 R2 which permits the software platform to be installed across the network. The Acsys Telecom wizard-like experience is designed to carry out error-free management of the keys and the locks.

Acsys software platform comes with the standard Acsys Telecom software system. All features are added as modules such as the Acsys CGS +, Acsys IP Server, Acsys SMS Gateway Server without any modification or re-installation of the

Combined with various technology, Acsysware developed a variety of flexible system (such as USB Programmer, IP Programmer, Calling, SMS, Smartphone App and MoPro ) according to different industry characteristics.

Server Acsysware CGS CALL CGS SMS CGS APP MoPro USB/IP PROGRAMMER CGS Module Watch Dog Module

Human Resources Module Activity Report Module Server Acsysware

Architecture

(25)

Acsysware Report

The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new Email notification services, the reports can be sent to individual users or user groups on daily, weekly and monthly basis.

Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS + platform is a newly designed revolutionary module which provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the job sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin point the location where and by whom the maintenance is taken place.

Live Dashboard

Reporting Tool

(26)

Acsys Customized Solutions

Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements.

Whether integrating with other on-site security equipment, lifecycle management or site monitoring systems, asset-specific mechanical integrations, high security solutions that require multiple person presence for access (see ‘Stackable Key Solution’), anti-destructive technology to secure your locks (see ‘High Security Hasp Solution’) and beyond, Acsys takes pride in going the extra mile. We don’t just collect invaluable customer input, but utilize it to solve issues that our clients may have formerly thought unsolvable.

If you don’t see something that perfectly fits your unique situation, don’t worry, we are happy to discuss how to make something that does.

(27)

Battery/AVR/3G/4G/LTE Cabinet Lock

Wide Variety of Handles

Replace

mechanical lock

with an

Acsys Blind Lock

Close Open

Open Close

360°

Acsys Blind Lock Other Models

(28)

High Security HASP for Front Gate and Storage Rooms

THE SAFEST PADLOCK

IN THE WORLD

STEP 1

STEP 2

STEP 3

STEP 4

Bolted

Bolted

and

welded

(29)

By integrating the Acsys IP Programmer with existing RSM (remote

site monitoring) devices, we have created a HotSpot scenario with

the following advantages :

1. Users are able to download access rights and upload access logs of

their key at any of the installed sites

2. The NOC can get real-time notification of

arrival/presence/departure

3. The NOC can update key access rights remotely without having to

ask the user to come to an office. (for example allow a supplier of

Cluster Nr 1 to get temporary/extended access to Cluster Nr 2)

1. IP 66 Rating

2. Power and data come from RSM unit 3. Self-shutting design

4. Easy to use

5. Visual aids to inform user of status 6. Real-time connection with NOC

7. Real-time notification of user arrival/departure

RSM Integration Solution

The Acsys OUTDOOR IP Key Programmer

Compatible with:

CONTROL CENTER RMS OPTIONAL ALARM ELECTRIC FENCE CCTV ENABLE/ DISABLE

(30)

The Acsys LAN Lock solution is a unique solution developed by Acsys specifically

for Huawei 4G LTE cabinets. Those cabinets have a built-in modem which allows

connections from 1/3 party devices including the Acsys Lan Lock. The main

advantage of this solution are that it is fully redundant, it allows the NOC to be

alerted in real-time when the lock is opened, allows the NOC to refuse access in

real-time and allows for controlled access even when the LTE cabinet is not

operational offering a total and fully redundant solution for controlled access

4G/LTE Cabinet Real Time Solution

1. NOC gets notification of event that requires actions of

user

2. The user is notified and goes on-site with a

pre-programmed key

3. The user arrives on-site and

opens the lock 4. When the key is inserted the NOC gets an ALERT that the door has been OPENED

6. In case the Cabinet is not functioning, Access can still be

granted remotely (CGS-App) and the lock opened as the

key powers the lock

5. When work is complete the key is inserted in the lock again

the NOC gets an ALERT that the door has been CLOSED

NOC

7. After completion of maintenance a report will be issued to the NOC informing them when the event was

created, and when the user arrived/left the site

Activity Reports REAL-TIME IP REAL-TIME IP REAL-TIME IP REDUNDANT SOLUTION

(31)

The stackable key solution is another

world-unique Acsys development as it offers a

previously unknown level of control over

access to high-value or sensitive sites.

The SK solution works as a bank safe where

two keys are required but only requires one

lock instead of two and can also be used on

padlocks so the solution is available for indoor

and outdoor applications.

The system can be programmed so that up to

5 keys need to be used in order to open 1 lock

The solution can be used in conjunction with

Acsys CGS remote key activation.

Acsys Stackable Key Solution

CONCEPT

EXAMPLE

Worker alone cannot open the lock!

Manager alone cannot open the lock!

Worker & Manager together

Worker ,Manager & Security staff together

use 3 keys to open a lock

Worker Manager Worker Manager Security Worker Manager

OR

1

2

1

2

3

(32)

On-site Time & Attendance Solution

TOWER

GENERATOR

BTS SHELTER

FUEL TANK

LTE CABINET

BATTERIES

1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives on-site to report to duty, he inserts his key in logger

3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays on-site.

4. In case of emergency, if the guard need access to the site, he can request CGS code and enter site

5. During monthly site audit, the guard’s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer

6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) 30 MINUTES

CGS

ADVANTAGES:

· NO CABLE · NO POWER · NO BATTERY · NO MAINTENANCE

CONTROL:

· PREVENTIVE MAINTENANCE · SCHEDULED MAINTENANCE · EMERGENCY MAINTENANCE · ADHERENCE TO SLA

(33)

1. The user has a keypad key

and needs access to ladder 2. The user sends SMS or CALL to gets a code to use the key to open

3. The user inserts PIN code to open the ladder’s Lock for a defined duration (5min/30min/1HR/8HRS)

4. The NOC notified in real-time and a report shows ladder’s using

Ladder Access Control & Safety Solution

In order to further increase

safety on the workplace, Acsys

and Karam(www.karam.in)

have designed the world’s first

integrated fall prevention

solution combined with

real-time access control. There by

preventing un-authorized

people from ascending the

mast. The solution allows the

NOC to control in real-time and

wirelessly who is ascending

which mast and for what

reason, at the same time

ensuring the user is properly

fastened to the fall prevention

equipment before starting this

ascent.

CODE SMS/CALL

Activity Reports

Unlock the ladder’s lock, the user can go up after turning the steps horizontally

(34)

Acsys Key Specifications

• Key is impossible to copy • Key in Reinforced ABS, UV proof,

IP55,RoHS

• Stainless steel blade • Powered by 2x LR1 batteries

• Battery autonomy 2 years/25k openings

• Operating Temperature from -10C to

+65C

• Logs last 1000 operations • 4 Status LED (Access/No

access/Restricted Access/Low battery)

PASSWORD IKEY CGS IKEY PASSWORD AKEY WITH LCD FINGERPRINT KEY CGS AKEY PASSWORD AKEY

OPTIONAL

USE YOUR KEY AS A BADGE

Acsys Key Proximity/RFID

Acsys ProxKey

(35)

Acsys Cylinder Locks Specifications

• Locks are impossible to pick/bump

• Brass with stainless steel plating

• Power comes from key (no battery)

• No Wiring

• EURO-DIN standard

• Operating temperature -20°C to +85°C

• Logs last 1000 operations

• Sizes from 3cm to 14cm

Padlocks

Cylinder Locks

Button Lock

Double Lock

Blind Lock

(36)

Acsys Padlocks Specifications

• Padlocks are impossible to pick/bump • Brass with stainless steel plating

• Power comes from Key (no battery)

• Operating temperature from -20°C to +85°C

• Logs last 1000 operations

PL2

PL5

• Padlocks are impossible to pick/bump • Brass with stainless steel plating

• Power comes from Key (no battery)

• Operating temperature from -20°C to

+85°C

(37)

Other Products Specifications

• Reinforced ABS, UV proof

• IP 55, RoHS

• Powered by USB (USB)

• Powered by DC Power supply

Mobile Programmer (MoPro)

USB/IP Programmer

• Reinforced ABS, UV proof

• IP 55, RoHS

• Powered by Micro USB

(38)

Quality Assurance and Awards

Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000.

Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA.

Our chief engineers come from varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise. We follow ISO standards and our products comply with CE, RoHS, EN, GA and FCC is certifications.

The greatest testament to our standards of excellence are the 10s of 1000s of locks deployed across telecom, government, and military clients in Europe, Africa, and the Middle East over recent years.

(39)

REAL

TIME UNIQUE WORLD WIRE FREE

REDUCE DOWN-TIME/PREVENT THEFT

SMS KEY

References

Related documents

Account Settings Change User Name Change Email Change Password Remove Contacts ேமலதிகமாக FollowBack FailWhale Oauth JustUnfollow Fllwrs

Pet cats outnumber pet dogs for the first time in the uk 1995 1713 A proposed law to prevent the abuse of horses is laughed down in Parliament when a member facetiously proposes that

After 10 minutes, one representative from each small group will share the images in the online meeting platform and explain to the unit how each image portrays perseverance. As in

Insă o comunicare cu un grad înalt distanţă-putere dă ran­ dament numai atunci când ascultătorul este capabil de aten­ ţie maximă şi numai atunci când cele două

Other sources of power include knowledge (as information) and personal contacts and alliances. information or internal contacts. Greiner and Schein’s work demonstrates

• But as long as the applied force does not increase, the value of static friction itself will stay the same • Static friction is always equivalent to applied force as long as

Engineered water-lubricated system designed to dissipate bearing heat, reduce friction and expel grit and marine contaminates extending life of bearings and journal.. How

The firm offers experience and expertise in a wide range of legal disciplines, ranging from Consultations in all aspects of Corporate Law, Labour Issues, specialized and