GSM Gate Opener Free Call Wireless Door Access controller Remote Control system. www.topkodas.lt info@topkodas.lt Price list: Sample 99 EUR 10pcs 71 EUR 100pcs 49 EUR 1000pcs 36 EUR

Σχετικά έγγραφα
Control of electric gates and barriers via mobile phone Mobile web app Price list: Sample 99 EUR 10pcs 71 EUR 100pcs 49 EUR 1000pcs 36 EUR

Access control system Price list: Sample 99 EUR 10pcs 71 EUR 100pcs 49 EUR 1000pcs 36 EUR

Temperature control system Price list: Sample 99 EUR 10pcs 71 EUR 100pcs 49 EUR 1000pcs 36 EUR

Smart home solution. Price list: Sample 99 EUR 10pcs 71 EUR 100pcs 49 EUR 1000pcs 36 EUR

Pellet P50 FAN HEATER STOVE. NEW Fan heater Pellet stove P50.

Access Controller with RFID cards ibutton keys mobile web app

CONTINUING EDUCATION IN EMERGENCY CARE

Project Pavillion Vert Discrict Heating. Groupe Gambetta - Compte-R Le Grand Parc, Bondoufle, France PelleTech Idro 500 kw Αποτελέσματα ενεργειακής αναβάθμισης σε συγκρότημα διαμερισμάτων στην Γαλλία

Pellet P55 FAN HEATER PELLET STOVE. Fan Heater Pellet P55 stove.

ΕΠΙΣΚΟΠΗΣΗ. ΠΡΑΣΙΝΟ κουμπι. ΚΟΚΚΙΝΟ κουμπι

CYTA Cloud Server Set Up Instructions

O R A M A M I N I M A L F R A M E S A R C H I T E C T U R A L C A T A L O G U E

PortSip Softphone. Ελληνικά Ι English 1/20

A, B. Before installation of the foam parts (A,B,C,D) into the chambers we put silicone around. We insert the foam parts in depth shown on diagram.

Instruction Execution Times

the total number of electrons passing through the lamp.

Στο εστιατόριο «ToDokimasesPrinToBgaleisStonKosmo?» έξω από τους δακτυλίους του Κρόνου, οι παραγγελίες γίνονται ηλεκτρονικά.

TRIAGE IN MASS CASUALTIES: THE ROLE OF TEAMWORK

The challenges of non-stable predicates

[1] P Q. Fig. 3.1

(C) 2010 Pearson Education, Inc. All rights reserved.

Πίνακας περιεχομένων Αναβαθμισμένα χαρακτηριστικά...2 Λεπτομέρειες για την SD Cart...5 Time Stretch & Varispeed...9 Τρόποι ποδοδιακόπτη...

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007

Modbus basic setup notes for IO-Link AL1xxx Master Block

Αυτόνοµη συσκευή DVR τεσσάρων καναλιών DVR MXD-400. Οδηγίες Χρήσης

Math 6 SL Probability Distributions Practice Test Mark Scheme

Section 8.3 Trigonometric Equations

Connected Threat Defense

Ηλεκτρονική κλειδαριά ασφαλείας (με αποσπώμενο πληκτρολόγιο) για συστήματα ελέγχου πρόσβασης και έλεγχο ηλεκτρικών κλειδαριών.

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 6/5/2006

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 24/3/2007

WOODLOG BOILER. Wood burning boiler with automatic motorized air inlet.

NMBTC.COM /

ΟΔΗΓΙΕΣ ΧΕΙΡΙΣΜΟΥ GSM TCS-3

Δημιουργία Λογαριασμού Διαχείρισης Business Telephony Create a Management Account for Business Telephony

Elements of Information Theory


Ρύθμιση σε whitelist

Περιγραφή και Έλεγχος ιεργασιών

38BXCS STANDARD RACK MODEL. DCS Input/Output Relay Card Series MODEL & SUFFIX CODE SELECTION 38BXCS INSTALLATION ORDERING INFORMATION RELATED PRODUCTS

Εργαστήριο 9. Styling with Javascript

Capacitors - Capacitance, Charge and Potential Difference

Answer ALL questions. Write your answers in the spaces provided. You must write down all the stages in your working

Informative Leaflet on the Deposit Guarantee Scheme. Ενημερωτικό Δελτίο για το Σύστημα Εγγύησης των Καταθέσεων

Connected Threat Defense

AKC Spectrum Analyzer User s Manual.

TCP/IP Πίνακας Συναγερμού Οδηγίες χρήσης

A browser-based digital signing solution over the web

65W PWM Output LED Driver. IDLV-65 series. File Name:IDLV-65-SPEC

Κωδικός QR ενεργοποίησης

1. Αφετηρία από στάση χωρίς κριτή (self start όπου πινακίδα εκκίνησης) 5 λεπτά µετά την αφετηρία σας από το TC1B KALO LIVADI OUT

HOWTO instal Joomla by A. Andreatos

VBA ΣΤΟ WORD. 1. Συχνά, όταν ήθελα να δώσω ένα φυλλάδιο εργασίας με ασκήσεις στους μαθητές έκανα το εξής: Version ΗΜΙΤΕΛΗΣ!!!!

Solar Laptop Charger with 2.5w/12000mah

65W PWM Output LED Driver. IDPV-65 series. File Name:IDPV-65-SPEC

ΠΡΟΣΟΜΟΙΩΣΗ ΘΕΩΡΙΑ 1. H αρχική οθόνη του Open Roberta lab

ΚΥΠΡΙΑΚΟΣ ΣΥΝΔΕΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY 21 ος ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ Δεύτερος Γύρος - 30 Μαρτίου 2011

SPEEDO AQUABEAT. Specially Designed for Aquatic Athletes and Active People

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

10 MERCHIA. 10. Starting from standing position (where the SIGN START ) without marshal (self start) 5 minutes after TC4 KALO LIVADI OUT

OUR PRODUCT RANGE.

PERI-HEPATIC URINOMA A CASE REPORT

ΓΡΑΜΜΙΚΟΣ & ΔΙΚΤΥΑΚΟΣ ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ

ΜΑΘΗΜΑ Άνοιγμα Της Εφαρμογής Υπολογιστικών Φύλλων. 2. Κύρια Οθόνη Της Εφαρμογής Υπολογιστικών Φύλλων ΣΤΟΧΟΙ:

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

ΜΑΘΗΜΑ Άνοιγμα Της Εφαρμογής Επεξεργασίας Κειμένου. 2. Κύρια Οθόνη Της Εφαρμογής Κειμένου ΣΤΟΧΟΙ:

Quick Installation Guide

TRC ELECTRONICS, INC LED Driver Constant Voltage 45W MEAN WELL IDLV-45 Series

Solutions IV Order Picking The next level. Dimitris Siapatis

Ενότητα 2 Εργαλεία για την αναζήτηση εργασίας: Το Βιογραφικό Σημείωμα

ΟΔΗΓΙΕΣ ΧΡΗΣΗΣ USE INSTRUCTIONS

IDPV-45 series. 45W PWM Output LED Driver. File Name:IDPV-45-SPEC S&E

How to register an account with the Hellenic Community of Sheffield.

PELLET BOILER SERIES. NEW PelleTech Rotomatic boiler series with built in burner and fuel tank.

Block Ciphers Modes. Ramki Thurimella

Μηχανική Μάθηση Hypothesis Testing

OWA-60E series IP67. 60W Single Output Moistureproof Adaptor. moistureproof. File Name:OWA-60E-SPEC

Jesse Maassen and Mark Lundstrom Purdue University November 25, 2013

Λευτέρης Κουμάκης ΠΟΛΥΜΕΣΙΚΕΣ ΥΠΗΡΕΣΙΕΣ ΣΤΗΝ ΥΓΕΙΑ

Δίκτυα Δακτυλίου. Token Ring - Polling

Τέτοιες λειτουργίες γίνονται διαμέσου του

USER MANUAL ΟΔΗΓΙΕΣ ΧΡΗΣΗΣ ΕΙΣΑΓΩΓΗ PREFACE. Ευχαριστούμε που αγοράσατε την συσκευή GPS Tracker. Παρακάτω θα βρείτε οδηγίες

SOAP API. Table of Contents

Εικονική Αναπαράσταση Νοηµατικής Γλώσσας στο ιαδίκτυο

ΜΑΘΗΜΑ 10 Ο ΟΡΓΑΝΩΣΗ ΤΗΣ Β ΓΙΑ ΧΡΗΣΤΕΣ (NON-EXPERTS) Α. ΗΜΙΟΥΡΓΙΑ ΠΙΝΑΚΑ ΕΠΙΛΟΓΩΝ 1. TOOLS DATA UTILITIES SWITCHBOARD MANAGER YES

ΑΥΤΟΜΑΤΟΠΟΙΗΣΗ ΜΟΝΑΔΑΣ ΘΡΑΥΣΤΗΡΑ ΜΕ ΧΡΗΣΗ P.L.C. AUTOMATION OF A CRUSHER MODULE USING P.L.C.

Εγκατάσταση λογισμικού και αναβάθμιση συσκευής Device software installation and software upgrade

TIME SWITCHES AND TWILIGHT SWITCHES

Summary of the model specified

Ενσωµατωµένα Υπολογιστικά Συστήµατα (Embedded Computer Systems)

τηριστικά Κάμερας P2P

Pelletech domestic heating units PELLET BOILERS

Section 7.6 Double and Half Angle Formulas

DC-DC Constant Current Step-Down LED driver LDD-300L LDD-350L LDD-500L LDD-600L LDD-700L CURRENT RANGE

Ειζαγωγή ζηο MATLAB (MATLAB Fundamentals)

SIMULATION MODELS IN EMERGENCY MEDICINE

The municipality of Apokoronas has created a new app for your smart phone.

ΑΓΓΛΙΚΑ Ι. Ενότητα 7α: Impact of the Internet on Economic Education. Ζωή Κανταρίδου Τμήμα Εφαρμοσμένης Πληροφορικής

ΕΛΕΓΧΟΣ ΑΝΤΛΙΟΣΤΑΣΙΟΥ ΜΕ ΔΕΞΑΜΕΝΗ ΜΕΣΩ GSM CHECK IN TANK PUMPING THROUGH GSM

FHL Wind Data Logger By FURUNO Hellas SA

Transcript:

Price list: Sample 99 EUR; 10pcs 71 EUR; 100pcs 49 EUR; 1000pcs 36 EUR

1 Application examples 1.1 One or multiple door control with app User2 ON ON ON OFF OFF OFF Gate Barier Database User1 Out1 User2 Out1 Out2 Out3 Out1 Out2 Gate Out3 Barier When the user activates the output from app, the information is sent to the door controller. The controller compares data to a list of authorized users in the database. If there is a match, the controller will send a signal to release the door lock, gate, or barrier. Could be specified which user will control which output. For example, the first user can control only the first door (Out1), and the second user can control door lock, gate, barrier (Out1, Out2, Out3).

1.2 Door control during specified time interval with RFID card Figure 1 Door control during specified time interval It is possible to set a certain time and date interval during which the user will be able to control the door using an RFID card. After and before the specified time and date range, the card will become inactive. The date, time interval, card number information could be set via, PC via internet, GSM network or connected the module to the computer via mini USB cable. The field temporary should be market. Regarding user table Temp - means temporary date limited access, You have to check this to enable reservation Date/Time interval. En- User enable/ Suspended. This function is not working now is reserved for furfure use. Figure 2 Web APP interface.add/edit/delete User. Figure 3 Configuration example 2 Logging entry, exit and other events. Monitoring.

Figure 4 The example of logging events and system monitoring Entry, exit, alarms is recorded to the log file and to the memory of controller. Events log buffer contains up to 2048 events. Unlimited events can be logged in SERA Cloud Linux server. All events can be monitored in Standard web browser or in Android App. The log file is saved. If the AC power is loss, events is saved to the memory of the controller. Then, once the communication with the system PC or controller is re-established, the log of access and alarm events will be uploaded with date & time stamp. It is possible to chronologically register up to 2048 time stamped records (if more events needed, it is possible log events to the server). System events reflects: Contact ID code, event, time, and note. It is possible to save the event log to.log file or clear it. The event log allows the system to automatically replace the oldest records with the latest ones. Outputs state monitoring could be performed via, PC or SMS message. 8 user's numbers for remote monitoring purpose identified as Users from 1 through 8. When the number is set, the user will be able receive the input alarm SMS text messages from the system. It is possible to control up to 6 doors, connected to Out1 Out4, I/O1 I/O2 outputs of the controller. Reader Door hardware Door contact... Reader Door hardware Door contact One or more s (ibutton probes) and the relevant door hardware are connected to the controller. Control of the door hardware is run from the controller to the access point and will act depending on signals from the controller. controller hold information required to decide whether a user is allowed through a door. Subject to how the controller communicate, alarm events may be passed to controller. This communication can be used for event driven actions, such as activating a sounder in a different area. Door 1 Door 4 Figure 5Door control example 2.1 What could be controlled

Rex motion Magnetic lock Contact Figure 6 Door control example control Out 1 Out 2 Out 3 Out 4 Figure 7 Access control example Micro Speaker Request to enter/ exit Door Status Monitoring. A door contact is used for sensing opening and closing of a controlled door. Door contacts are used to monitor events such as: Door forced alarm a door being opened without the use of the or normal egress device Door held alarm someone holding the door for another party or blocking the door for delivery or to return later if they have no card. Door contacts are recommended for higher grades of security BS EN 60839-11- 1 requires the monitoring of doors in grades 2 to 4. Lock Status Monitoring. Lock monitoring is used to indicate whether a closed door is locked or not. This is not an alternative to monitoring the door and should only be used in addition to door contacts. Egress devices. Having replaced (or disabled) standard lock sets in most access control installations, a means of providing controlled and authorized egress may be required so that any door monitoring contact is isolated for the approved period of the door release. This is commonly achieved with a simple Request-to-Exit switch, a movement sensor or a. Micro speaker. The system utilizes tele communications between visitors and residents for granting access. The four relay output channels can be programmed to control electric door strikes, magnetic locks, or barrier gates. Micro and speaker control. Entrance control includes barriers, automatic gates, and doors. The entrance control product increases the security level of the access control system by either providing a physical barrier to restrict unauthorized access or by providing a method of detecting unauthorized access and generating an alarm. 800 users could control access via and/ or with ibutton, RFID, key button. When the number is set, the user will be able to control the system by app, SMS text messages as well as by free of charge call. The module allows to assign one or several outputs to a certain user. By default, the system ignores any incoming call and SMS text message from a non-preset number as well as it rejects the SMS text messages containing wrong SMS password even from a preset user's number. Automatic output control is possible: control the door or gate, when the inputs of the module is activated. Turns ON the output (-s) for the preset time period (pulse) resulting in the gate opening or closing, depending on the current gate state. Typically, the inputs are used to receive notifications regarding jammed gate or gate state. Each input s sensitivity level can be customized by a delay time. If an input is left triggered until the delay time expires, the input is considered violated. Each input has a name that can be customized, for example: Gate Open. Once disabled, input alarm event will no longer be followed by an SMS text message. The system comes equipped with internal real-time clock (RTC) that keeps track of the current date and time. 2.2 Door control methods

Door4 Up to 800 users is able to control the door with: - Wiegand keypad/ RFID ; - - Mobile The door could be controlled via app, short call, SMS, ibutton key, RFID card. RFID When ibutton, RFID or key button codes is entered, the users will be able to control the outputs. Door1 Call User ibutton key Door2 SMS Door3 Up to 800 users for control purpose Keypad codes RFID cards Mobile Magnetic contact ibutton Keys Keypad RFID GSM Network In 1 In 2 D1 D2 D3 Out 1 Out 2 Out 3 Siren Figure 9 Door control methods Figure 8Door control example Unlimited ibutton probes could be connected to the controller. It is possible to specify which door the user can access. D 1 D 2 D 3 In 1 Out 1 In 2 Out 2 In 3 Out 3 In 4 Out 4 Keypad RFID Figure 10 multiple door control example Arm/Disarm, door control by standard web browser. It is possible to connect to the module via Sera Cloud service and arm, disarm the system and control the door from the computer, via standard web browser. Arm/Disarm, door control from Android app. It is possible to arm, disarm the system and control the door from, Android app. Arm/Disarm by call It is possible to arm, disarm the system and turn OFF the alarm by dialing the system s number from any of 800 available user numbers The system ignores any incoming calls from a non-listed number.the call is free of charge as the system rejects it and carries out arming/disarming procedure afterwards. If there is more than one listed user dialing to the system at the same time, the system will accept the incoming call from the user who was the first to dial while other user (-s) will

be ignored. To disable/enable arming or disarming for certain listed user numbers, please mark near ARM/DISARM in the Users & Remote control window Arm/Disarm by sms The system ignores any incoming SMS text messages from a non-listed number as well as it rejects the SMS text messages containing wrong SMS password even from a listed user number. To arm the system by SMS text message, send the following text to the system s number USER 000000 030 ST 030= command code (Change security system s mode (ARM/DISARM/STAY/SLEEP) ST = Security system mode 0-DISARM, 1-ARM,2-STAY,3-SLEEP Arm/Disarm by keypad To arm/ disarm the system by Wiegand Keypad, enter User/Master Code To cancel the arming process: Enter the user/master code again during exit delay countdown. Disarming the System and Turning OFF the Alarm To disarm and turn OFF the alarm, enter any out of available user codes or master code using the number keys on the keypad. Arm/Disarm by ibutton key To arm or disarm the system and turn OFF the alarm, touch the ibutton key by any of 800 available. When the ibutton is touched to the ibutton key for arming/ disarming, the system will proceed arming/ disarming process. Arm/Disarm by RFID key card, keyfob To arm/ disarm the system with RFID keycard, touch 1 of 800 RFID keycard to the Wiegand keypad. When the RFID keycard is touched to the for arming/ disarming, the system will proceed arming/ disarming process. 2.3 Lift control example V V Lift Control restrict access to unauthorized floors (e.g. hotel floors) D R Elevator car Floor 3 ibutton probe 1 Lift control is an extension to the concept of access control, using the user s to grant access to floors, rather than granting access through a door. For instance a token is fitted in each lift cab, using technologies compatible with the rest of the system. Depending on the user s access rights, access to one or more floors may be granted. If the user does not have access to a given floor, the button for that floor is disabled. Free access is sometimes provided to allow anyone access to certain floor(s) (e.g. ground floor). For maximum flexibility, the lift control system may be capable of controlling multiple lift shafts simultaneously. Floor 2 ibutton probe 2 Floor 1 ibutton probe 3 Figure 11 Lift control example