• No results found

TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management

N/A
N/A
Protected

Academic year: 2021

Share "TELECOM SECURITY & WORKFORCE MANAGEMENT SOLUTION. High Security Locks & Keys Access Control Time & Attendance Key Management"

Copied!
39
0
0

Loading.... (view fulltext now)

Full text

(1)

TELECOM SECURITY & WORKFORCE

MANAGEMENT SOLUTION

High Security Locks & Keys

Access Control

Time & Attendance

Key Management

(2)

Company Profile

Acsys is a global leader in the emerging field of mechatronics access

control. With technology originating from two famous French defense

contractors in 1999, Acsys products and solutions provide a powerful

means to control who goes where and when, indoors and outdoors,

without wiring and without reliance on a power supply.

A highly specialized international team delivers world-unique, patented

solutions. From the Code Generation System (CGS) and Keypad Key to

remote staff management via the AcsysMobile App, the modular, and

solution-oriented approach sets Acsys apart from other security

competitors. With top-tier clients in the public and private sectors

extending across telecommunications, banking, power, mining, logistics,

luxury shops, aviation and more. Acsys proves why it’s all about security

& productivity!

(3)

Market Scope

MINING

MILITARY

MUSEUMS

OFFICES

PORTS

LOGISTICS

RETAIL

GOVERNMENT

WATER

COMPANIES

ATM

WAREHOUSES

AIRPORTS

HOSPITALS

POWER

STATIONS

TELECOM

BANKS

GUARDING

RAIL

&METRO

RESIDENTIAL

CONTAINER

HOUSES

(4)

Telecom Solutions

Verify What Work was Done, Where, and When

Decide and Control Who Goes Where and When

No Copied Keys No Picked Locks

No More Tracking of Lost/Stolen Keys and

Lock Changes

High Security Lock & Key System Key Management System

Time & Attendance System Access Control System

(5)

Acsys System Introduction

LED light on the AcsysKeys gives user information: GREEN– ACCESS GRANTED

ORANGE – ACCESS DENIED AT THIS TIME

RED – ACCESS DENIED

4 blinks (color depending on the above) – LOW BATTERY

AcsysLocks CANNOT be BUMPED or PICKED and are very hard to DRILL

The COMMUNICATION between locks, keys, software and all its data is encrypted using 128-bit

AES ENCRYPTION, making the keys IMPOSSIBLE to COPY

Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in

various sizes All models are

Wire-Free EASY to Install EASY to Maintain

The ONLY power source for the Acsys system comes from the key. Typical Battery life-time = 2 years

Acsys Keys have a built-in CLOCK and CALENDAR So we can assign temporary access rights (Mon-Fri) and also limited in time (08:00 – 18:00)

The key has a chip that can be programmed to open one or up to 100,000 locks

The lock has a built-in chip that can be programmed to accept the entry of

1,000,000 keys

The key and lock each have a built-in MEMORY that keeps track of the last

1,000 events, WHO went WHERE and WHEN

LOST/STOLEN KEYS can be DELETED from the system and

from the locks where it had access

The Acsys keypad key is the best protection against lost/stolen keys. If someone finds a lost/stolen key, they cannot use it as a PIN is needed to be entered on to the key before usage. If someone inputs wrong PIN 5 times, the key will automatically be blocked and

Activity Reports Acsys Keys can be fitted with a Proximity / RFID

coil allowing the user to use the key as a badge (optional)

(6)

Why Acsys ?

USE ONE KEY FOR EVERY DOOR NO WIRING, EASY TO INSTALL ONE SOLUTION FOR EVERY PLACE NO MORE KEY BUNDLES

EASY TO CHECK WHERE THE KEY

WAS USED AND WHEN LOST ACSYSKEY=NO LOCK CHANGE MECHANICAL LOST KEY=LOCK CHANGE CONTROL WHERE AND WHEN USERS CAN ENTER VERIFY WHERE AND WHEN USERS CAN ENTER Activity

Reports Activity

Reports

Office Home Gates Containers Car Park

Mon– Fri

24hrs 365Days 24hrs 08:00-20:00 Mon—Fri

(7)

Acsys Mechatronic VS Traditional Mechanical

• Keys are usually distributed to users or stored in a central location, which requires people spend time to collect, return and manage those keys.

• Keys are often copied leading to theft/degradation and as a result unbudgeted maintenance, leading to service interruption.

• Once distributed there is no control over where and when the mechanical key is used.

• There is little or no traceability on how long the user spent on a site and this can have serious financial impact on operations, especially on remote sites.

• Mechanical locks are not safe and can be easily bumped/picked providing no security for the site.

• Technicians sometimes leave the doors open, making it easy for thieves to enter and degrade/steal from the site.

• Despite security measures such as high walls, barbed wire and guards, thefts still occur on a daily basis as they are usually inside jobs.

Acsys Mechatronic Solutions

• The Acsys solution offers controlled and secured access rights distribution. • Acsys locks CANNOT be picked or bumped and are very difficult to drill.

• Keys are programmed ONLY when they need to be used and their access rights are TIME-BASED. The main advantage is that keys can ONLY be used during the time the operator has configured them to work.

• The Key memory will tell the operator WHEN the key was used (date/time) and when the lock was opened and closed, giving the operator CONTROL over the amount of time spent by suppliers on sites (and the cost of the intervention). • Keys cannot be copied, so no access is possible outside the access rights working

hours.

• If someone TRIES to access without having rights, that will be stored in the key and lock.

• Access can be granted to SPECIFIC SITES and SPECIFIC ASSETS on those sites. • If 3 WRONG codes are entered on the Keypad/CGS key it will automatically DISABLE

itself.

(8)

Acsys Base Station Workflow Revolution

1. Mast down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request

2. Technician picks up cell tower A key(s) from HQ and then go to site 3. Job completed at cell tower A and return key(s) to HQ

4.Pick up cell tower B key(s) from HQ and then go to site 5. Job completed at cell tower B and return key(s) to HQ

Traditional Mechanical Base Station Support Workflow

Acsys Mechatronic Base Station Support Workflow

Key can be copied / lost / stolen

Key can be copied / lost / stolen

HQ

Technician

1

2

3

4

5

Cell Tower A Cell Tower B

HQ

Technician

1

2

3

Cell Tower B Cell Tower A

1. Master down/Maintenance (e.g. refuel) at cell tower A. Technician receives a service call request

2. Technician receives access rights to open one or more locks via Acsys CGS and/or Acsys Mobile solution with his mobile phone when he has arrived on site

3. Job completed at cell tower A, Technician notifies HQ and receives access rights to lock-up via Acsys CGS and/or Acsys Mobile solution again. HQ gets real-time transaction logs. Technician moves on to the next site directly.

(9)

The Monetary Benefits of Implementing the Acsys Solution

Safety

VALUE

Data

Cost Reduction

Efficiency

(10)

The Monetary Benefits Of Implementing The Acsys Solution

• As every user has a key the

downtime of towers is reduced as the O&M staff can now go directly to the site, no more time/energy/money wasted in collecting/returning /managing keys which is a win-win for both Operator/Towerco and O&M suppliers.

• The NOC now has control over which sites need servicing and when and can verify how much time users spent on site doing specific maintenances , which allows them to set KPI’s for certain tasks to increase operational efficiency.

• By using the Acsys App the users service time and location is logged, allowing the NOC to increase the amounts of sites that can be serviced in one day.

• As Acsys keys are impossible to copy and Acsys locks are impossible to pick/bump or even vandalized there is no more need to have security guards on site and unauthorized access is eliminated.

• As the system can automatically detect which site is being serviced, if the servicing time is abnormal (caused by a vendor being on site and injured) the NOC will be informed which in some cases can save lives.

Efficiency

Safety

• With mechanical systems when keys are lost/stolen/misplaced or copied usually time, energy, and money needs to be spent changing the locks, with the Acsys CGS system keys can only be activated through the software meaning that if a key is lost / stolen / unreturned only the software needs to be updated.

• As the access to every asset is now remotely controlled, we see a great

reduction in theft, which is often inside jobs due to the fact that keys are copied and then used post-maintenance to gain access to sites and assets. • Since the locks require no

maintenance and the keys only need battery replacement 1x/year the OPEX cost of running the Acsys system is minimal meaning little or no

recurrent expenditure after deployment.

• Through a better management of the sites, insurance premiums in some countries can be significantly lowered as the risk for the insurance company is reduced.

Cost Reduction

Data

• The NOC can view how long the users have spent on site doing specific maintenances , giving them a

complete overview over billable hours.

• Through implementation of the Acsys solution access to site is simplified but now also logged in real-time, so adherence to SLA’s can now be verified, good suppliers rewarded and bad suppliers eliminated.

• As access to sites is controlled the

false and real alarms can be differentiated.

• The software reports allow the NOC to detect abnormal patterns of user behavior and act upon them,

collusion between employees to circumvent the system is impossible.

(11)

HOW TO PROGRAM KEYS & PROVIDE ACCESS

USB

IP

MOPRO

CUSTOMIZED

CGS

APP

IT’S ALL ABOUT

(12)

The Acsys Code Generating System (CGS) is a simple, yet powerful way to manage access to remote sites and assets in real-time.

Through a phone and an Acsys CGS Key with Keypad, the NOC can grant access rights in real-time and be notified on site arrival and exit.

The CGS solution is offered exclusively by Acsys and is unique approach to remote site access control.

The concept is simple, every user now has a key, but none of the keys can be used UNTIL a random, single-usage, time-limited code is created by the software for the key(s).

Whenever a user requires Access to a site or asset, he needs to request the code by call/sms to the NOC and upon verification of the user credentials the code will be issued to the user who in turn enters it on the key allowing him to have access and ONLY on the site and assets where the NOC wants the user to have access. The Acsys CGS solution is the safest and most convenient way to control access to remote sites and assets and the best way to REDUCE DOWN-TIME by allowing users to get to the site without the need for picking-up or returning keys.

Acsys CGS Solution (Remote Key Activation)

CGS Working Principle

ANY

PHONE PHONE ANY

SMS OPERATOR

(13)

Remote key Activation (Call/SMS)

The CGS concept is similar to token creation systems seen in online banking. Whenever a user needs to use a key, he needs to make a code request to the NOC. When his access is validated a random, 6-digit time limited code is delivered to the user. This request can be made via calling an operator (manual) or by sending an SMS to the NOC (automated). When the user receives the code, he enters it on the key and only then the key will become useable. Usually the key is activated for a fixed amount of time, for example 5 minutes, to allow for access to the site/assets and will become the ENTRY ACCESS LOG. Upon completion of his work a second code is requested which will become his EXIT ACCESS LOG.

Alternatively a key can be activated for longer periods (10 min/30 min/8 hours) and this for specific or multiple sites and is especially useful when a user needs to access remote sites where there might not be any coverage.

At any time, all access logs of the key can be downloaded (using the USB/IP Programmer or the MoPro) to give the NOC a full overview of the following :

-Access request time

-Access request location (site/asset) -Time of Entry

-Time of Exit

-Attempted access to other sites/assets without authorization

Because the key can only be activated upon request and when a code has been issued by the software, there is no threat of lost/stolen keys nor is there a risk that the user will be able to use the key at any time without prior approval of the NOC.

If 3 wrong codes are input into the keypad, the key will block itself providing a high level of security against fraudulent usage; the key can be reset either locally or remotely after entering a special software generated code.

Code Generating System Need Access Get Code REAL-TIME REAL-TIME OPERATOR SMS

(14)

Remote key Activation (Call/SMS)

1. The user has a password key and needs access to

some locks

2. The user calls the operator, gives his password, and receives a

code to use the key

4. The user can now use the key on the specified locks for a defined duration

(5min/30min/1HR/8HRS)

3. The user inserts PIN code to use the key, GREEN

FLASH= can use the key

1. The user has a password key and needs access to

some locks

2. The user sends SMS and password requesting access and gets a code to

use the key

4. The user can now use the key on the specified locks for a defined duration

(5min/30min/1HR/8HRS)

3. The user inserts PIN code to use the key, GREEN

FLASH= can use the key

CALL

CODE

CODE

(15)

Acsys Smartphone Solutions

For contractors and vendors with smart phones, Acsys offers customers even more administrative flexibility

and control with our newest innovation.

Introducing AcsysMobile, a multifunctional site security, user management, and ERP platform. This front end software can be combined with our Acsysware backend software to provide a n industry specific, total security and staff management solution.

When the AcsysMobile app for Android is combined with our other new innovation, the Acsys MoPro, the platform’s full power can be harnessed. MoPro, short for Mobile Programmer, is a hardened and stylish key carrying case and protective pouch, which doubles as a programmer to connect an AcsysKey directly to a smart phone for programming via the AcsysMobile app. This is achieved via a micro-USB connector built into the MoPro to form a direct connection with the chip inside the AcsysKey.

AcsysMobile plus Acsys MoPro means customers no longer require contractors to visit their offices or any other set location for key programming or downloading of access logs; it can now be done remotely.

Apart from that, Acsys’s Mobile Programming Solutions offer a multitude of other possibilities to optimize operational efficiency, reduce OPEX, prevent theft and make sure that SLA terms are met.

CONTROL CENTER

+

ASSIGNED TASK LOCATION USER ACSYS APP

CONTROL WHO GOES WHERE, WHEN AND FOR HOW LONG

(16)

SETUP

MAIN MENU

TICKET LIST

GET CODE

Acsys Mobile Smartphone APP

Locate App users in real-time;

Assign tasks to users in real-time;

Be informed when a user arrives on site;

Remotely Control what site and asset(s) can be

opened and for how long;

Get alerts when a user leaves a site

Fully redundant solution when used with CGS

App stores all key data in case of network failure

Allow users to have access to technical datasheets

Get user reports from the site

Obtain pictures of executed jobs from the site

Verify how long the user was on-site

(17)

1. The Acsys Mobile Smartphone App for Android is a revolution in terms of real-time remote key and lock control.

2. This Access solution is called “Location-Based” as access and related CGS code will only be issued if and when the user smartphone GPS has reached the desired location.

3. The Acsys Mobile App is a fully customize-able EVENT MANAGEMENT and TICKETING tool, allowing the NOC to issue tasks to users through the Smartphone App.

4. When a user accepts a task that has been assigned to him, the NOC will be informed. 5. When the user arrives on site, and he is on the desired location (based on his real-time

smartphone GPS location), a CGS code will be automatically sent to the user allowing him to OPEN the site and start his duties, The NOC will also be informed of user arrival. 6. Upon completion of his tasks, the user can send Pictures/Reports of his executed tasks in

real-time to the NOC after which a LOCKING code will be issued.

7. The real-time report and information is perfect to check COMPLIANCE with SLA terms.

Location-base Remote Key Activation (APP)

Control Center

Upload and Send Access Logs Grant and Program Access Rights

GPS

Authorize Access

(18)

Location-base Remote Key Activation (APP)

1. NOC gets notification of event that requires actions of

user

2. NOC sends out task + information to the user

through Acsys App

3. When the user arrives on location, his GPS position is transmitted through Acsys App

4. If the user is in correct location Acsys CGS will automatically issue an OPEN

CODE to open the locks

8. The NOC knows when the event was created, when the user went/left site in one

report

7. The user locks all the assets

where he was given access 6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user

5. When the user is finished he logs in the Acsys App and reports the event closed +

comments

NOC

NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity Reports

(19)

Acsys Mobile Programmer (MoPro)

The Acsys MoPro (Mobile Programmer) is a MOBILE KEY PROGRAMMER outfitted with Bluetooth connection to facilitate communication between the Acsys Key and ANY Smartphone.

MoPro is Acsys’s solution to streamlining operations & maintenance while increasing security. The Acsys MoPro allows users at remote locations to download access rights as well as upload all of their previous access logs in REAL-TIME to the control center. Since the control center can control each and every access right, effectively creating a real-time, remote key and user management platform.

MoPro removes the need to plug in the key in USB/IP programmers. It is the best answer for site security, MTTR tracking, and supplier management anywhere, anytime, without wires.

Grant and Program Access Right

MoPro

Upload and Send Access Logs CONTROL CENTER

GET CODE REQUEST CODE

ASSIGNED TASK

+

+

LOCATION Bluetooth USER

(20)

Acsys Mobile Programmer (MoPro)

1. NOC gets notification of event that requires actions of

user

2. NOC sends out task + information to the user

through Acsys App

3. When the user arrives on location, his GPS position is transmitted through Acsys App

4. If the user is in correct location Acsys CGS will automatically issue an OPEN

CODE to open the locks

8. The NOC knows when the event was created, when the user went/left site in one

report

7.The user inserts his key in the MoPro and the access logs

(ENTRY/EXIT) of his Key are downloaded to the App and

sent to the NOC

6. When the task is closed, the Acsys CGS will then send a LOCK CODE to the user and the

user closes the locks

5. When the user is finished he logs in the Acsys App and reports the event closed +

comments

NOC

NOC SUPPLIER SITE A CENTER Task completed OPEN CODE SITE A Latitude longitude LOCK CODE SITE A Activity Reports

(21)

Local Programming (USB/IP)

Control Center Acsys software

Country HQ LAN/WAN ZONE A LAN/WAN ZONE B Regional HQ 1 VPN VPN

USB

IP

USB Computer Activity Reports Regional HQ Refueling company Maintenance company Guarding company

CENTRAL LOCATION

MUTIPLE LOCATION

Regional HQ Refueling company Maintenance company Guarding company

CENTRAL LOCATION PROGRAMMING(USB):

The most basic way to program Acsys locks and keys is using a programmer connected directly to the USB port on any computer running the Acsysware client. This requires the physical presence of the key at the time of programming. Access rights are created in the software and uploaded to the programmer. By simply inserting the key into the programmer, access rights are uploaded to the key’s memory. Logs of the key’s usage can be downloaded to the database in exactly the same way.

MULTIPLE LOCATION PROGRAMMING(IP):

IP Programmers allow for distributing access rights across a network. It allows for access rights to be created and downloaded later, as well as real-time notification of site access by a user. As each programmer has its own IP address, an access right can be assigned to one specific programmer (to require presence at a specific location) or to all programmers across a company’s operations (for convenient downloading/uploading).

Acsys Locks Acsys Keys

(22)

Local Programming (USB/IP)

1. The user has an Acsys key,

with NO access rights to the key when inserted into 2. Access rights are uploaded the USB/IP Programmer

3. The key downloads the TIME LIMITED access right from the USB/IP programmer

ex 8:00-12:00 lock 24/25/32

4. The user opens the lock within the fixed time

(08:00-12:00)

8. Access logs are automatically downloaded and

any remaining rights are deleted from the key

7. The user goes back to the office, inserts the key into the

USB/IP programmer

6. The user finishes work and

locks the door/gate maintenance(ex 8:00 - 12:00) 5. The user carries out the

Activity Reports

ADMINISTRATOR CONTROL SERVER CENTER

(23)

Acsysware Architecture

Multi-Site/Country/Operator

Country A

Country B

Country C

Country D

HQ NOC

Region 1 Region 2 Region 1 Region 2 Region 1 Region 2 Region 1 Region 2

Program

and

Audit

keys in a combination of

USB/LAN/CGS/BLUETOOTH/3G depending on the needs

Global access And audit Reports

National access And audit Reports

Regional access And audit Reports

Request & validation

Req ues t & v al id at io n Si te A cc es s

(24)

Acsysware introduction

Acsys Telecom is a Key and Lock Management System specifically designed for Telecom and Tower Companies. It manages electronic keys and mechatronic locks patented by Acsys Technologies Ltd. Acsys Telecom provides an intuitive and comprehensive user interface which allows a user to easily manage the keys and the locks.

The Acsys system solves all issues related to mechanical locking systems such as bumping locks, lost keys, etc. Furthermore, it provides a revolutionary platform to control who, where, when and how each lock is accessed by a key user. Acsys hardware and software is protected with the most powerful and standardized encryption methods AES-128 bit which prevents key duplication.

Acsys Telecom is supported by one of the most scalable and most stable database MS SQL Server 2008 R2 which permits the software platform to be installed across the network. The Acsys Telecom wizard-like experience is designed to carry out error-free management of the keys and the locks.

Acsys software platform comes with the standard Acsys Telecom software system. All features are added as modules such as the Acsys CGS +, Acsys IP Server, Acsys SMS Gateway Combined with various technology, Acsysware developed a variety of flexible system (such as USB Programmer, IP Programmer, Calling, SMS, Smartphone App and MoPro ) according to different industry characteristics.

Server Acsysware CGS CALL CGS SMS CGS APP MoPro USB/IP PROGRAMMER CGS Module Watch Dog Module

Human Resources Module Activity Report Module

Server Acsysware

Architecture

(25)

Acsysware Report

The reporting tool provides up to date information about all activities performed on the hardware and the software such as; access logs, keys and locks list, deleted keys and locks list, transfer keys operations, account operations, user code requests. All reports can be exported in multiple formats such as PDF, XLS and CSV formats. Furthermore with the new Email notification services, the reports can be sent to individual users or user groups on daily, weekly and monthly basis.

Live Dashboard is provided through the Acsys CGS+ platform. The Acsys CGS + platform is a newly designed revolutionary module which provides up-to-date real time information of keys and locks activities. The dashboard identifies the location of each locks, the location of each key user and their activities on and off the sites. Through the power of the integrated Google maps GIS system, the control center can quickly pin point the location where and by whom the maintenance is taken place.

Live Dashboard

Reporting Tool

(26)

Acsys Customized Solutions

Acsys is first and foremost a solution provider. Our products are designed to be modular, from our keys to our software, all Acsys technology can be swapped out or combined together to form the ideal solution for even the most challenging customer requirements.

Whether integrating with other on-site security equipment, lifecycle management or site monitoring systems, asset-specific mechanical integrations, high security solutions that require multiple person presence for access (see ‘Stackable Key Solution’), anti-destructive technology to secure your locks (see ‘High Security Hasp Solution’) and beyond, Acsys takes pride in going the extra mile. We don’t just collect invaluable customer input, but utilize it to solve issues that our clients may have formerly thought unsolvable.

If you don’t see something that perfectly fits your unique situation, don’t worry, we are happy to discuss how to make something that does.

(27)

Battery/AVR/3G/4G/LTE Cabinet Lock

Acsys Blind Lock

360° turn

Wide Variety of Handles

Replace

mechanical lock with

an Acsys Blind Lock

(28)

High Security HASP for Front Gate and Storage Rooms

THE SAFEST PADLOCK

IN THE WORLD

Bolted and welded

Bolted

1. Install HASP on gate, using stainless steel

bolts and/or weld to the frame. 2. Close the gate.

(29)

The Acsys LAN Lock solution is a unique solution developed by Acsys specifically

for Huawei 4G LTE cabinets. Those cabinets have a built-in modem which allows

connections from 1/3 party devices including the Acsys Lan Lock. The main

advantage of this solution are that it is fully redundant, it allows the NOC to be

alerted in real-time when the lock is opened, allows the NOC to refuse access in

real-time and allows for controlled access even when the LTE cabinet is not

operational offering a total and fully redundant solution for controlled access

4G/LTE Cabinet Real Time Solution

1. NOC gets notification of event that requires actions of

user

2. The user is notified and goes on-site with a

pre-programmed key

3. The user arrives on-site and

opens the lock 4. When the key is inserted the NOC gets an ALERT that the door has been OPENED

6. In case the Cabinet is not functioning, Access can still be

granted remotely (CGS-App) and the lock opened as the

key powers the lock

5. When work is complete the key is inserted in the lock again

the NOC gets an ALERT that the door has been CLOSED

NOC

7. After completion of maintenance a report will be issued to the NOC informing them when the event was

created, and when the user arrived/left the site

Activity Reports REAL-TIME IP REAL-TIME IP REAL-TIME IP REDUNDANT SOLUTION

(30)

RSM Integration Solution

GENERATORS FUEL TANK

BATTERIES BTS

BTS

AcsysRSM solution integrated hardware &

software, it is a easy to install , easy to use,

maintenance free, remote sites/asset

monitoring system, include Fuel tank/genset

/Shelter monitoring ,Hybrid power

management & Green power management

etc… , which can compatible with

Mainstream RSM brand, such as Invendis,

Kentrox, Sagemcom, Inala and Qowwisio.

(31)

The stackable key solution is another

world-unique Acsys development as it offers a

previously unknown level of control over

access to high-value or sensitive sites.

The stackable key solution works as a bank

safe where two keys are required but only

requires one lock instead of two and can also

be used on padlocks so the solution is

available for indoor and outdoor applications.

The system can be programmed so that up to

5 keys need to be used in order to open 1 lock

The solution can be used in conjunction with

Acsys CGS remote key activation.

Acsys Stackable Key Solution

CONCEPT

EXAMPLE

Worker alone cannot open the lock!

Manager alone cannot open the lock!

Worker & Manager together

Worker ,Manager & Security staff together

use 3 keys to open a lock

OR

Worker Manager Security Worker Manager Worker Manager

(32)

On-site Time & Attendance Solution

TOWER

GENERATOR

BTS SHELTER

FUEL TANK

LTE CABINET

BATTERIES

1. The guard has key for T&A but no access rights to locks on-site 2. When the guard arrives on-site to report to duty, he inserts his key in logger

3. The guard needs to re-insert his key at certain time interval (e.g. 30 minutes) to make sure he stays on-site.

4. In case of emergency, if the guard need access to the site, he can request CGS code and enter site

5. During monthly site audit, the guard’s attendance information can be download from T&A logger or guard can upload key event log on USB/IP programmer

6. After the logs have been uploaded, a full report shows the guard attendance on site(when/where/how long) 30 MINUTES

CGS

ADVANTAGES:

· NO CABLE · NO POWER · NO BATTERY · NO MAINTENANCE

CONTROL:

· PREVENTIVE MAINTENANCE · SCHEDULED MAINTENANCE · EMERGENCY MAINTENANCE · ADHERENCE TO SLA

(33)

1. The user has a keypad key

and needs access to ladder 2. The user sends SMS or CALL to gets a code to use the key to open

3. The user inserts PIN code to open the ladder’s Lock for a defined duration (5min/30min/1HR/8HRS)

4. The NOC notified in real-time and a report shows ladder’s using

Ladder Access Control & Safety Solution

In order to further increase

safety on the workplace, Acsys

and Karam(www.karam.in)

have designed the world’s first

integrated fall prevention

solution combined with

real-time access control. There by

preventing un-authorized

people from ascending the

mast. The solution allows the

NOC to control in real-time and

wirelessly who is ascending

which mast and for what

reason, at the same time

ensuring the user is properly

fastened to the fall prevention

equipment before starting this

ascent.

CODE SMS/CALL

Activity Reports

(34)

Acsys Key Specifications

• Key is impossible to copy

• Key in Reinforced ABS, UV proof, IP55,RoHS • Stainless steel blade

• Powered by 2x LR1 batteries

• Battery autonomy 2 years/25k openings • Operating Temperature from -10°C to +65°C • Logs last 1000 operations

• 4 Status LED (Access/No access/Restricted) Access/Low battery

AKEY KEYPAD LCD

AKEY KEYPAD

AKEY NORMAL

=

ACSYS KEY PROXIMITY/RFID ACSYS PROXKEY

(35)

Acsys Cylinder Locks Specifications

• Locks are impossible to pick/bump • Brass with stainless steel plating • Power comes from key (no battery) • No Wiring

• EURO-DIN standard

• Operating temperature -20°C to +85°C • Logs last 1000 operations

• Sizes from 3cm to 14cm

Padlocks

Cylinder Locks

Button Lock

Double Lock

Blind Lock

(36)

Acsys Padlocks Specifications

PL2

PL5

• Padlocks are impossible to pick/bump • Brass with chrome plating with plastic cover

finished

• Power comes from Key (no battery)

• Operating temperature from -20°C to +85°C • Logs last 1000 operations

• Padlocks are impossible to pick/bump • Brass with chrome plating

• Power comes from Key (no battery) • Operating temperature from -20°C to

+85°C

(37)

Other Products Specifications

Mobile Programmer (MoPro)

USB/IP Programmer

• Reinforced ABS, UV proof • IP 55, RoHS

• Powered by USB (USB) • Powered by DC power supply

• Reinforced ABS, UV proof • IP 55, RoHS

• Optional belt clip • Recharge able battery

3G Programmer

• Reinforced ABS, UV proof • IP 55, RoHS

• Powered by 6 Volt power adapter or by built-in battery

(38)

Quality Assurance and Awards

Acsys Technologies Ltd follows the strictest manufacturing codes and QC procedures. For example, Acsys locks are guaranteed for 100,000 openings yet have been successfully tested for over 400,000.

Acsys is the only mechatronic lock manufacturer to have completed 96 hours of salt spray testing on its locks. Water testing, drop testing, and more are all conducted to ensure smooth performance under the most rugged conditions. Locks are under warranty for 2 years and keys for 1 year. Warranty can be extended if combined with an Acsys SLA.

We follow ISO standards, and our chief engineers come from a varied disciplines, yet offer over 20 years of combined mechatronic lock and key expertise.

Our products comply with CE, RoHS, EN, GA and FCC certifications.

The greatest testament to our standards of excellence are the tens of thousands of locks deployed in recent years among industrial, government, and military clients across Europe, Africa, and the Middle East.

(39)

REAL

TIME UNIQUE WORLD WIRE FREE

REDUCE DOWN-TIME/PREVENT THEFT

SMS KEY

References

Related documents

As the Director of Employee Services and Labor Relations at the Highline School District, I am primarily responsible for the development and implantation of human resource

where the authors showed that if Y is a separable, reexive Banach space so that every normalized, weakly null tree in Y has a branch equivalent to the unit vector basis of ` p , then

Likewise, Ugarteche (2018) points out the importance of replacing the term financial system with the notion of financial complex. The metamorphosis from system to complex

As indicated by Boski, it is not true that the humanitarianism of Polish culture is in con- tradiction with democracy (unless one focuses exclusively on its liberal

Frederick [26] made a numerical study of natural convection of air in a differentially heated cubical enclosure with a thick fin placed vertically in the middle of the hot wall;

The Perfect Prediction is the measure of the number of times a similarity metric correctly identified the nearest neighbor of an active user at the 1 st position in the predicted

%aebc& 'uhu Pbhs Fofcksks (kmkf Foarefokh (ufcktftki Mfhra %aebc& 'uhu Pbhs Fofcksks (kmkf Foarefokh (ufcktftki Mfhra `fo bmkmfhra). `fo bmkmfhra)

That can be proved by the fact that the Chair of Social Work and Social Technologies at YSU which is the leader of Social Work education in Armenia is taking part