You are on page 1of 51

SynopSYS Integrated Security & Building Management System

Architect & Engineer Specifications

January 2010

A&E Specifications

Page 1 / 51

www.riscogroup.com

Table of Contents
PART 1 - GENERAL ........................................................................................................................................... 5 1. 2. 3. 4. SUMMARY ................................................................................................................................................ 5 IMS DESCRIPTION.................................................................................................................................... 5 SUBMITTALS............................................................................................................................................ 5 QUALITY ASSURANCE............................................................................................................................. 8 MANUFACTURER QUALIFICATIONS ................................................................................................................................. 8 BIDDER QUALIFICATIONS ................................................................................................................................................ 8 5. 6. 7. 8. 9. DELIVERY, STORAGE & HANDLING......................................................................................................... 8 PROJECT CONDITIONS............................................................................................................................ 9 SEQUENCING........................................................................................................................................... 9 SCHEDULING ........................................................................................................................................... 9 WARRANTY.............................................................................................................................................. 9 IMS SOFTWARE WARRANTY .......................................................................................................................................... 9 CONTRACTOR INSTALLATION WARRANTY ...................................................................................................................... 9 10. 11. IMS STARTUP & COMMISSIONING........................................................................................................... 9 MAINTENANCE SERVICES....................................................................................................................... 9

PART 2 - PRODUCTS........................................................................................................................................ 12 1. 2. MANUFACTURER................................................................................................................................... 12 IMS FUNCTIONAL REQUIREMENTS....................................................................................................... 12 WORKSTATION MODULE ............................................................................................................................................... 12 REPORT GENERATOR MODULE .................................................................................................................................... 12 AUTHORIZATION MANAGER MODULE ........................................................................................................................... 12 ADMINISTRATE MODULE ............................................................................................................................................... 12 STUDIO MODULE ........................................................................................................................................................... 12 APPLICATION SERVER .................................................................................................................................................. 13 DEVICE SERVER............................................................................................................................................................ 13 DEPLOYMENT FLEXIBILITY ............................................................................................................................................ 13 ARCHITECTURE ............................................................................................................................................................. 13 DRAG & DROP TOOLBOX .............................................................................................................................................. 13 ICONS ............................................................................................................................................................................ 13 CUSTOMIZABLE LOGIC .................................................................................................................................................. 13 GRAPHICAL SYSTEM OVERVIEW .................................................................................................................................. 14 ALARM/EVENT LOGGING ............................................................................................................................................... 14 TEXT INSTRUCTIONS ..................................................................................................................................................... 14 VOICE ANNUNCIATION .................................................................................................................................................. 14 ALARM AND EVENT ATTRIBUTES .................................................................................................................................. 14 HIGHLIGHTING OF UNACKNOWLEDGED ALARMS:......................................................................................................... 15 PRE-DEFINED “CANNED” ALARM ACKNOWLEDGMENT RESPONSES ........................................................................... 15 REAL-TIME, LIVE VIDEO USER VERIFICATION .............................................................................................................. 15 ALARM MONITORING – COLUMN DISPLAY & CONFIGURATION .................................................................................... 15
A&E Specifications Page 2 / 51

www.riscogroup.com

REAL-TIME, DYNAMIC GRAPHICAL MAPS..................................................................................................................... 15 SORTING CAPABILITIES................................................................................................................................................. 16 FILTERING VIEWING OF EVENTS ................................................................................................................................... 16 3. IMS SERVER & CLIENT HARDWARE...................................................................................................... 16 IMS SERVER RECOMMENDED REQUIREMENTS: ........................................................................................................... 16 WORKSTATION RECOMMENDED REQUIREMENTS: ........................................................................................................ 16 .4 NET DVR INTEGRATION......................................................................................................................... 17 NET DVR GENERAL DESCRIPTION .............................................................................................................................. 17 NETWORK FUNCTION: ................................................................................................................................................... 18 COMPRESSION AND VIDEO QUALITY FUNCTIONS .......................................................................................................... 19 STORAGE FUNCTION ..................................................................................................................................................... 19 REMOTE CLIENT, WEB ACCESS AND LOCAL MONITOR .............................................................................................. 20 PREVIEW & PLAYBACK FUNCTION: ............................................................................................................................... 22 5. ACCESS CONTROL INTEGRATION ........................................................................................................ 23 GENERAL ........................................................................................................................................................................ 23 DESIGN OF THE INSTALLATION...................................................................................................................................... 23 MODULARITY ................................................................................................................................................................. 24 INTEGRATION................................................................................................................................................................. 25 OPERATING PRINCIPLES ............................................................................................................................................... 26 Geographic authorization ...................................................................................................................................... 26 Time related authorization..................................................................................................................................... 26 Access authorization groups................................................................................................................................. 27 Access authorization .............................................................................................................................................. 27 Additional functions ................................................................................................................................................ 27 Multi-card support per person............................................................................................................................... 28 ACCESS CONTROL HARDWARE..................................................................................................................... 29 ACCESS CONTROLLER .................................................................................................................................................. 29 INPUT/OUTPUT CONTROLLER ....................................................................................................................................... 32 LIFT CONTROLLER ........................................................................................................................................................ 33 NETWORK COMMUNICATION DESCRIPTION ................................................................................................................... 34 Cabling architecture: .............................................................................................................................................. 34 Communication Dispatcher ................................................................................................................................... 34 READER TECHNOLOGIES............................................................................................................................................... 35 INSERTION READERS ..................................................................................................................................................... 35 ACCESS CONTROL SOFTWARE...................................................................................................................... 36 ACCESS CONTROL MODULE .......................................................................................................................................... 36 Environment ............................................................................................................................................................ 36 Functions of access control software module .................................................................................................... 36 ADVANCED ACCESS CONTROL FUNCTIONS ................................................................................................................... 39 Logical control of position ...................................................................................................................................... 39 “Confirmation” cards............................................................................................................................................... 39 Access to sensitive areas using multiple cards (Multi-card access) ............................................................... 39 Multi-site management........................................................................................................................................... 39 Graphic monitoring module ................................................................................................................................... 40 Macro-instructions language................................................................................................................................. 40 TECHNICAL MONITORING OF THE SOFTWARE ............................................................................................................... 41 CRISIS MANAGEMENT ................................................................................................................................................... 41
A&E Specifications Page 3 / 51

www.riscogroup.com

ADDITIONAL SOFTWARE MODULES ............................................................................................................................... 42 FILTERS CRITERIA / REPORT GENERATION ................................................................................................................... 42 VISITOR MANAGEMENT MODULE ................................................................................................................................... 43 Advanced functionality of the visitor management software: ........................................................................... 43 Pre-visit management via Intranet ....................................................................................................................... 44 CARD PERSONALIZATION MODULE ................................................................................................................................ 44 EXTERNAL DATABASE INTERFACES .............................................................................................................................. 45 6. INTRUDER ALARM INTEGRATION ......................................................................................................... 46 INTEGRATED INTRUSION DETECTION INTERFACE ........................................................................................................ 46 SYSTEM MAIN PANEL.................................................................................................................................................... 46 7. 8. 9. 10. 11. FIRE ALARM INTEGRATION ................................................................................................................... 51 INTERCOM INTEGRATION...................................................................................................................... 51 BUILDING MANAGEMENT INTEGRATION.............................................................................................. 51 OTHER THIRD PARTY DEVICE INTEGRATION ....................................................................................... 51 EXECUTION (** TBD BY SPECIFIER)....................................................................................................... 51

A&E Specifications

Page 4 / 51

www.riscogroup.com

PART 1 - GENERAL 1. Summary
This document includes a general description, functional requirements, operational characteristics, and criteria for the Integrated Security & Building Management System, referred to in this document as Integrated Security Management System (IMS).

2. IMS Description
The Integrated Security Management System outlined in this section and detailed in Part 2 of this document is the key central component for managing physical security and the bridge between physical and logical security and between building management systems for this project. The system shall provide a variety of integral functions including the ability to track and interface alarms; to regulate access and egress; provide identification credentials; monitor, view, record and store digital surveillance video linked to IMS events. The IMS shall comprise of several software modules that work together seamlessly in a Client/Server architecture. Upgrades or expansion of the IMS to a larger size system in scale shall not require installation of a different and or new IMS application or require the administrator/operator to learn a different and or new interface from the previous version. The IMS shall be written using Unicode format. Unicode enables a single software product to be transported across multiple platforms and different languages without re-engineering. The IMS software shall be written to ISO Standards on Software Development.

3. Submittals
Drawings: Provide complete drawings which include the following: Indicate all system device locations on architectural floor plans. No other system(s) shall be included on these plans. Include full schematic wiring information on these drawings for all devices. Wiring information shall include cable type, conductor routings, quantities, and connection details at device Include a complete IMS one-line, block diagram. Include a statement of the system sequence of operation.

A&E Specifications

Page 5 / 51

www.riscogroup.com

disk space and memory size Description of site equipment and its configuration Network bandwidth. and requirements shall be included. Manuals: Final copies of the manuals shall be delivered within X (**X) days after completing the installation test. maintenance recommendations and parts list including wiring and connection diagrams modified to reflect as-built conditions. A system description including analysis and calculations used in sizing equipment required by the IMS. interfaces. The following information shall be supplied as a minimum: • • • • • • • • • Server(s) processor(s). The manual shall include names. The final copies delivered after completion of the installation test shall include all modifications made during installation. and telephone numbers of the contractor responsible for the installation and maintenance of the system and the factory representatives for each item of equipment for each system. Hardware Manual: The manual shall describe all equipment furnished including: A&E Specifications Page 6 / 51 www. and specific functions.Product Data : Provide complete product data that includes the following: Manufacturer’s technical data for all material and equipment at the system and sub system level to be provided as part of the IMS. design philosophy. latency and reliability requirements Backup/archive system size and configuration Start up operations System expansion capability and method of implementation System power requirements and UPS sizing Device / component environmental requirements (cooling and or heating parameters) A description of the operating system and application software. and acceptance testing. The manuals shall have a table of contents and labeled sections. A description of hardware and software functions.com . The manuals shall consist of the following: Functional Design Manual: The functional design manual shall identify the operational requirements for the system and explain the theory of operation. The description shall show how the equipment will operate as a system to meet the performance requirements of the IMS. addresses. checkout. Contract Close-Out Submittals: Provide X (**X) sets of hard copy manuals and X (**X) sets electronic format manuals including operating instructions.riscogroup. Each manual’s contents shall be identified on the cover.

com . start up. and shut down Reports generation Details on forms customization and field parameters Operators Manual: The operators manual shall fully explain all procedures and instructions for the operation of the system including: • • • • • • • • • • Computers and peripherals System start up and shut down procedures Use of system. The manual shall include: • • • • • Definition of terms and functions System use and application software Initialization. command. and applications software Recovery and restart procedures Graphic alarm presentation Use of report generator and generation of reports Data entry Operator commands Alarm messages and reprinting formats System permissions functions and requirements A&E Specifications Page 7 / 51 www.riscogroup. and operation. testing.• • • • • • General description and specifications Installation and check out procedures Equipment layout and electrical schematics to the component level System layout drawings and schematics Alignment and calibration procedures Manufacturers repair parts list indicating sources of supply Software Manual: The software manual shall describe the functions of all software and shall include all other information necessary to enable proper loading.

and wiring diagrams of the IMS to be used for record drawings. 5. Visual inspection of devices shall be performed to verify assembly according to defined procedures.riscogroup. IMS Manufacturer shall employ at a minimum the following methods for QA of component and assembly devices. the bidder shall have satisfactorily completed projects similar size. fault diagnosis. This set shall be accurately kept up to date by the Contractor with all changes and additions to the IMS. periodic preventive maintenance. Storage & Handling (**TBD by Specifier) A&E Specifications Page 8 / 51 www. As-Built Drawings: During system installation. and repair or replacement of defective components. End of line operational tests shall be performed to ensure product functionality has been correctly configured. The bidder shall furnish written proof of experience from three (3) references and proof of current accreditation/certification by the manufacturer for required training for sales/installation/service of the IMS and associated devices. the Contractor shall maintain a separate hard copy set of drawings. Individual functionality and system level regression testing shall be performed to ensure compliance with product specifications. elementary diagrams. Copies of the final as-built drawings shall be provided to the end user in BITMAP format. IMS Manufacturer’s manufacturing facilities shall be certified ISO-9000:2000 operations. scope and complexity as the system detailed in this specification. Quality Assurance Manufacturer Qualifications Manufacturer of the IMS shall be an established organization with referenced and documented experience delivering and maintaining Integrated Management Systems of equal or higher sophistication and complexity as compared to the system detailed in this specification. Delivery. 4. Single and multiple unit system tests shall be performed to mimic end-user installation configurations. A system burn-in period shall be utilized to screen for early life failures of electronic components. utilize ISO9000:2000 manufacturing procedures and maintain their ISO certifications. Local shall be defined as an area in a (**X) mile radius of installed location. Automated hardware and software testing shall be utilized to evaluate system performance under published operational loads and shall be compared to published system capabilities. The bidder shall also be a factory authorized local service organization that shall carry a complete stock of parts and provide maintenance for the IMS and related systems under this contract.com . Bidder Qualifications At the time of the bid.Maintenance Manual: The maintenance manual shall include descriptions of maintenance for all equipment including inspection.

Maintenance Services General Requirements: The Contractor shall provide all services required and equipment necessary to maintain the entire IMS in an operational state as specified for a period of **X year(s) after formal written acceptance of the system. and shall provide all necessary material required for performing scheduled service or other unscheduled work.11. Computers. Specific third party warranty details. IMS Startup & Commissioning (**TBD by Specifier) 11. Controllers. Warranty IMS Software Warranty IMS Software shall be warranted for a period of one (1) year from the date of shipment from the manufacturer to be free of defects and will function in substantial accordance to the published specification. Examples may include but not be limited to. etc. Sequencing (**TBD by Specifier) 8. which may then transfer third party warranties to the owner. Scheduling (**TBD by Specifier) 9.A of this specification and associated installation labor for a period of one (1) year from date of beneficial use. These products include but are not limited to devices that are directly interconnected to the IMS field hardware or computers and are purchased directly from the IMS manufacturer. Description of Work: The service and repair of the IMS including all equipment provided under this specification supplied by the successful contractor.riscogroup. or accompany such products. Biometric Devices. The contractor shall provide the manufacturer's required scheduled and unscheduled maintenance and all other work necessary to keep the IMS at its maximum performance. not covered under Part 1 Section 1. are either expressly stated on.6. terms and conditions. Contractor Installation Warranty Contractor shall warrant all equipment.com . or packaged with. Project Conditions (**TBD by Specifier) 7. Reader Heads. remedies and procedures. The warranty period may vary from product to product. 10. A&E Specifications Page 9 / 51 www. IMS Third Party Device warranties are transferred from the manufacturer to the contractor.

Emergency Service: The owner will initiate service calls when the IMS is not functioning properly. names of service personnel assigned to the task. its location. and shall organize cumulative records for each component. The Contractor shall deliver a record of the work performed within 5 days after work is accomplished. Perform diagnostics on all equipment. A continuous log shall be maintained for all devices. Operation: Performance of scheduled adjustments and repair shall verify operation of the IMS as demonstrated by the applicable tests of the performance verification test. and electrical and mechanical controls.Personnel: Service personnel shall be factory certified in the maintenance and repair of the equipment installed under this section of the specification. Schedule of Work: This work shall be performed during regular working hours. Qualified personnel shall be available to provide service to the complete IMS. excluding federal holidays. field hardware. date and time the call was received. Minor Inspections: These inspections shall include: Visual checks and operational tests of all console equipment. Monday through Friday. Run all system software diagnostics and correct all diagnosed problems. walk test. The owner shall be furnished with a telephone number where the service supervisor can be reached at all times. Check. Inspections: The Contractor shall perform two minor inspections at 6 month intervals (or more often if required by the manufacturer). the time and date work started. demonstrating that planned and systematic adjustments and repairs have been accomplished for the IMS. The form shall include the model and serial number identifying the component involved. The IMS shall be restored to proper operating condition within X hours after service personnel arrive on site. peripheral equipment. and if required by the manufacturers maintenance procedures. sensors.com . Complete logs shall be kept and shall be available for inspection on site. A&E Specifications Page 10 / 51 www. Records and Logs: The Contractor shall keep records and logs of each task. Service personnel shall be at site within X hours after receiving a request for service. Mechanical adjustments if required on any mechanical or electromechanical devices Major Inspections: These inspections shall include all work described under paragraph Minor Inspections and the following work: Clean all IMS equipment. and two major inspections offset equally between the minor inspections to effect quarterly inspection of alternating magnitude. and of any change in personnel. specific nature of trouble. Work Requests: The Contractor shall separately record each service call request on a service request form. including interior and exterior surfaces. instructions describing what has to be done. and the time and date of completion. The log shall contain all initial settings.riscogroup. the amount and nature of the materials used. The owner shall be advised in writing of the name of the designated service representative. calibrate each sensor. and for the complete system chronologically.

A&E Specifications Page 11 / 51 www. Software: The Contractor shall provide all software updates during the period of the warranty and verify operation in the system.System Modifications: The Contractor shall make any recommendations for system modification in writing to the Owner. fully coordinated with IMS operators. These updates shall be accomplished in a timely manner. shall include training for the new changes / features enabled. and other documentation affected.riscogroup. Any modifications made to the system shall be incorporated into the operations and maintenance manuals.com . No system modifications. and software documentation. shall be made without prior approval of the Owner. and shall be incorporated into the operations and maintenance manuals.

). A&E Specifications Page 12 / 51 www. The number of authority levels shall be virtually unlimited. add new users. search. detectors etc. add and modify user groups. doors. manage and control the security and building needs via “drill-down” site. control button. These shall include but not be limited to the following modules: Workstation Module This module enables Security Officers and their employees to monitor. viewing and exporting reports without interfering with ongoing workstation operation or using a workstation seat license. building and floor maps. to allow flexibility in preparing. The product/s specified shall be manufactured by a company whose quality system is in compliance with ISO 9001:2000. view maps. Manufacturer The IMS shall be the SynopSYS Integrated Security & Building Management Software manufactured by RISCO Group or equivalent. Reports shall be exportable in a periodic manner in Excel format or directly to standard printers. Authorization Manager Module Used by the Site administrator to define user roles and authority to perform actions. etc. input or output point. The reports shell be dynamic in which the enduser will be able to view the cardholders details and related video event.) and generation of one-time or periodic reports of events. The Report Generator shall be a separate module and shall run independently from the Workstation module. IMS Functional Requirements The IMS shall comprise of several software modules that work together seamlessly in a Client/Server architecture. events or specific devices (cameras. and different authority can be defined independently per user for each specific map. or camera within the IMS. setting-up.PRODUCTS 1. Studio Module Used by the integrator to design and build the project according to the requirements in a simple manner with a “drag and drop” toolbox. action. 2. etc. SMS/Email communication setup is also configured in this module.com .riscogroup. without interfering with ongoing workstation operation or using a workstation seat license. to allow flexibility for modifying or viewing authority levels. The devices run as a service with automatic restart in case of disconnection. The Authorization Manager shall be a separate module and shall run independently from the Workstation module. Report Generator Module Enabling set-up (filtering.PART 2 . Administrate Module This is a device configuration module which is used to configure the communication setup in each device.

device server and client interface. network video recorders. Device Server A background Service that handles communication between the hardware devices and the application server. the relevant icon (reader. fire alarm panels (secondary monitoring only). Customizable logic The IMS shall include “behavior logic” modification screens in which device point behavior and action logic can be modified without any writing of code. etc.Application Server A background service that handles communication between the software modules and the database. Replacement of hardware controllers or devices (due to hardware malfunctions) with identical controllers shall not require any modifications in the project setup. The IMS shall be able to seamlessly interface with and monitor Access Control devices. Drag & Drop Toolbox The IMS shall include a “drag & drop” Tool Box for simple implementation and on-site modifications of the project. The system shall require that all connections to the database are performed through a trusted link from the client. recording. etc. without the need to use or generate additional icons per display variant. blinking rate.com . and then deployment with similar hardware onsite without the need to redesign parts of the project. The IMS shall be able to communicate with devices and controllers via TCP-IP/Ethernet. colour. camera. etc. and event notification rules. The properties can then be modified in a simple manner. All controller devices and their points (readers. armed. Deployment Flexibility The IMS shall enable Pilot deployment with Pilot hardware. The IMS shall allow but not require the separation of the database. Any device point can be “dragged and dropped” onto any map. customized icons can be created by the integrator by importing them from a graphic file. Event behavior logic shall allow addition and modification of event details. event display rules. When the device point is “dropped”.) will appear on the map and it’s default properties will be assigned. Additionally. Icons The icons displayed on the maps in the IMS shall be “point action based” to allow a virtually infinite number of variations to be displayed per icon. etc. A&E Specifications Page 13 / 51 www. cameras. control button. doors. application server. event handling. Device point Rules and Controls can be freely modified and added. accompanying text. zones. detector.riscogroup. Architecture All tasks shall be accessible from any client workstation on the network utilizing one or all of the following: Traditional client server architecture N-tier architecture where the IMS shall support the expansion of the system architecture and allow for enduser deployment based upon their system architectural needs.) in a simple manner according to customer requirements and preferences. digital video recorders intruder alarm systems. event instructions. RS-485 and RS232.) for each point per point state (alarmed. This server can be deployed on several computers according to communication considerations. and building management systems that are approved for use by the IMS manufacturer.) shall be displayed in the Tool Box in a tree structure. standby. The integrator shall be able to modify the icon display properties (size. ready.

System Administrators shall be able to modify a device that is depicted on the graphical system overview tree or see its properties by right clicking on the icon and the IMS shall bring them to the appropriate form. Display at one or more Alarm Monitoring client workstation. Alarm and Event Attributes System Administrator shall have the ability to configure how the IMS handles the annunciation of alarms on an individual basis. Access Control. to allow use of behavior logic defined for specific controllers in similar situations.com . A&E Specifications Page 14 / 51 www. Text Instructions The IMS shall allow for a set of text instructions to be associated with each alarm that arrives into the IMS. 6. Display text and audio instructions outlining the procedures to follow when responding to the alarm. Each alarm or event in the IMS shall have its own unique set of text instructions should the System Administrator desire. intrusion systems and BMS) and premises maps with devices elements embedded. Require the field device. The text instruction function shall allow the System Administrator to enter text for procedures to follow for each alarm that arrives at the Alarm Monitoring client workstations. 5. Allow System Operators to change the journal entry once the alarm has been acknowledged.riscogroup. Voice Annunciation The IMS shall allow for a customizable voice annunciation to be associated IMS alarms. Automatically call up the associated video recording. always be recorded in the database. Each alarm and/or event shall have the option(s) to: 1. 9. 8. Both the default and the custom behavior logic shall be exportable and importable.The behavior logic shall allow modification for all point types per controller (modification of default behavior). which generated the alarm to be restored to its normal state before the alarm is cleared. Password option to view the alarm. 2. and shall also allow specific modification for each and any point (Custom behavior modification). The customizable voice annunciation shall allow the System Administrator to record a voice annunciation of unlimited length. 4. 3. DVR. Alarm/Event Logging All alarms and events in the IMS shall by default. Graphical System Overview A graphical system overview shall include a graphical display representing all field devices (NVR.Fire alarm. Have a customized voice message annunciate at the client workstation. Automatically call up the associated cardholder record. Automatically call-up associated maps. 7.

Real-Time. Pre-Defined “Canned” Alarm Acknowledgment Responses The IMS shall have the capability for pre-defined alarm acknowledgment responses for alarms in the IMS. From the project design module. close video frame. 14. Alarm Monitoring – Column Display & Configuration The IMS shall allow System Administrators and System Operators to define which columns are displayed in the Alarm Monitoring Window and in which order. Map device icons shall have the ability to dynamically change shape and/or color to reflect the current state of the device. Real-Time. Moreover. Dynamic Graphical Maps The IMS shall support graphical maps that display device status. Automatically send an e-mail and SMS message. The IMS shall support the map formats listed below: • • • JPEG (. 13. 12. 11. the user shall be able to start/ stop record. Additional operators monitoring alarms shall be notified that the alarm has been marked “In Progress”. The maps may be configured to appear on command or when specified alarms are selected for acknowledgment. . view live video. Have the alarm. Require acknowledgment to clear. take snapshots and save it locally. dynamically in real-time. System Administrators and System Operators shall also be able to determine the column order.10. display an alternative flashing color coded bar across the alarm than for the original alarm color. automation rules can be created for starting recording according to pre/ post alarm parameters in the video system and directing PTZ cameras to predefined positions. 15. Live Video User Verification The IMS shall have the capability of interfacing to a video recording system and displaying video images next to a stored cardholder image record.bmp.com .riscogroup.jpg) TIFF (. when acknowledged.tif) Windows Bitmap (. Have the ability to mark an alarm as “In Progress” where the system shall silence any repeating audio notifications on the Workstation where the alarm was routed and remove the alarm sprite notification on the graphical map. An unlimited number of pre-defined responses shall be able to be configured for each alarm in the IMS. Highlighting of Unacknowledged Alarms: The IMS shall provide a Unacknowledged Alarm pop-up window that displays alarms that have been unacknowledged after a user defined period of time.dib) Page 15 / 51 A&E Specifications www. Have the alarm appear on the Alarm Monitoring window with a flashing colored coded bar across the alarm for high priority alarms. Password option to acknowledge the alarm. This feature shall be system configurable.

central station receiver alarms. approved for use with Microsoft Windows 2003 Server or Microsoft Windows XP Professional: IMS Server recommended requirements: • • • • • • • Operating System: Windows 2003 Server SP2or above DB : SQL Server (2005/2008) standard edition. access denied alarms.riscogroup. Filtering Viewing of Events The IMS shall allow System Operators to hide or view all events according to the following categories. The graphical maps shall have the ability to be printed to a local printer. asset alarms. There shall be no limit to the number of maps that shall be nested hierarchically with each other. CPU: Minimum Pentium 4 3GHz or AMD3500 RAM: Minimum 4GB Dual DDR. The IMS shall support user defined icons for field hardware devices.The IMS shall support the drill down method. system alarms. fire alarms. and transmitter alarms may also be filtered. duress alarms. Events can be associated to any of these categories: • • • • Warning Trouble Bypass Alarm 3. 400MHz Hard Disk: Minimum 40GB free space Network: Ethernet 10/100 adapter USB: Free port for Hardware License Key Workstation recommended requirements: • Operating System: Windows XP Professional SP2 or above Page 16 / 51 A&E Specifications www. and area control alarms. video event alarms. The IMS shall have the capability for filtering out alarm types from the Alarm Monitoring window. Sorting Capabilities The IMS shall allow System Operators to arrange the way that alarms and/or events in the Alarm Monitoring window are listed by sorting the alarms and events. intrusion detection alarms. intercom alarms. If applicable. Alarms that may be filtered are access granted alarms. IMS Server & Client Hardware The IMS Server shall be 100% IBM Personal Computer Standard compatible.com .

The Remote Client shall be connected to the NetDVR server by means of a TCP/IP network 6. A&E Specifications Page 17 / 51 www. 8 or 16 analog cameras and audio inputs up to 30/25 images per second (NTSC/PAL) per camera simultaneously with 4CIF resolution. The NetDVR shall be fully integrated with the IMS application 3. 4. 400MHz Hard Disk: Minimum 40GB free space Network: Ethernet port Display Card: DirectX 9 compatible 256MB Display Monitor: Dual-head displays of 19" 1280x1024 resolution or above For a PC that is both a Server and Workstation. playback.264 dual streams for viewing and storing. The NetDVR recording shall be to an internal hard disk drive (HDD) array. use Server requirements and add display card and monitor requirements of Workstation. The NetDVR video compression shall be H. 8. The NetDVR system shall operate over a local area network (LAN)/wide area network (WAN) to allow unlimited operators access through the facility. Net DVR Integration General Description 1. Encryption of each image shall be provided to prevent and/or detect manipulation of recorded images using separate authentication software also provided within the NetDVR system. The unit shall include a TCP/IP address for connection to the network. 2. The maximum allowable time for displaying a recorded video stream from any recorded camera shall not exceed 1 second from the time an operator initiates the desired function. residing on a separate computer. and live viewing) and operate under an embedded operating system. The network digital video recorder (NetDVR) shall be a video and audio recording system capable of storing and playing back digitized images from 4. 4. 9. providing the user the ability to view and control the DVR across a local or wide area network 5. 7. The system shall allow operators to view any camera recorded through the use of the Remote Client. The NetDVR architecture shall be of a distributed nature encapsulating the recording and storage of the video.• • • • • • CPU: Minimum Pentium 4 3GHz or AMD3500 RAM: Minimum 2GB Dual DDR.riscogroup. Web Access or Local Monitor. TheNetDVR shall support from 320 GB to 16 TB of total internal hard disk drive storage. The unit shall have triplex operation (record. audio and management data in a recording server and allowing access to recorded video and audio and/or to system management features through Remote Client software.com .

playback and parameters setup 4. 13. FTP. Using a standard Web browser. remote playback. The NetDVR shall display an event popup on the VGA monitor in response to an alarm or any internal event. UDP. 16. remotely monitor and display live video for up to 16 cameras. 24. 23. The NetDVR shall support internet explore for network preview. Pelco P or other third party protocols.10. and operate the unit. 2. remote parameters setup. 11. 20. The NetDVR shall support remote upgrade DVR firmware. A&E Specifications Page 18 / 51 www. or USB mouse. and search viewing based on camera. Administrators may utilize user management and view the system audit trail and perform everything all other users may do. The NetDVR shall support all mainstream network protocols (ARP. IGMP. The NetDVR shall provide remote PTZ control and remotly get alarm information of NetDVR. motion. emergency agent. RTP.). The remote client shall provide capability to operate the Net DVR and interface simultaneously with up to many servers within the family of NetDVR models. The NetDVR’s VGS output shall provide flexibility for the user. etc. 16. The NetDVR incorporate real-time live viewing. time. The NetDVR shall be based on a Embedded operating system 22. 21. camera tamper detection and signal loss detection to allow fast visual verification of related events and camera tampering during playback of the recorded images. SNMP. 12. and alarm functions. Log file of all NetDVR activities should be supported Network function: 1. 4. 14. remote control keypad. 18. The NetDVR shall support event notifications by e-mail. The system shall provide PTZ camera control capabilities using RS-232/RS-485 or IP commands incorporate Pelco D. date. The system shall provide pre-defined access levels to specific users. RARP. The system shall enable the user to allocate cameras into logical groups. broadband dial-up access (PPPoE protocol) and narrowband transmission (PPP protocol). The NetDVR shall incorporate a USB port for exporting video and support an optional installation of a CD-RW. PPP. division format on the main monitor. The system shall provide a time synchronization mechanism that will keep all clients and servers in the system synchronized to the same time. the Web client shall be able to connect to one DVR server. or sounder functionality. 19. playback viewing. The monitor output shall be adjustable to display in full. and download the recorded files local disk 3.riscogroup. DHCP. Remote software shall include a remote client and Web client. 17. 15. HTTP. and 1+7. The system shall include internal video motion detection. TCP. 9.com . IP. The Net DVR shall support operation using the front panel. PPPoE.

Export of video or snapshots to external media with watermark 4. The Net DVR shall support DHCP method. The NetDVR video preview and playback screen support position configurable OSD&LOGO. 5.M. 7.com . tampering detection for intentional camera blocking. support 4 SATA HDD and each HDD can support up to 2000GB with SATA CD-R/W for backup 2. 6.A. 8. Once an IP device has been configured for DHCP Net DVR can use either the IP address of the device or the DNS name for access. video signal loss detection. Compression is available with both variable bit rate and variable frame rate per channel. Eight (4) SATA interface. The NetDVR support various video analysis alarms.riscogroup. the NetDVR shall provide dualstream per channel with sub stream that support CIF/QCIF compression resolution. The NewtDVR shall support Disk pre-allocation and multi-division technology to prevent disk fragmentation and prolongs the hard disk’s life-span. To overcome bandwidth limitations for remote viewing and playback. The Net DVR shall utilize a Watermark mechanism during the recording process which ensures that an image has not been edited.R. damaged.5. The Net DVR shal support the following resolution and Frame Rate options: • • • • • 4CIF: 704*576 (PAL) or 704*480 (NTSC) at up to 25 (PAL) or 30 (NTSC) fps 2CIF: 704*288 (PAL) or 704*240 (NTSC) at up to 25 (PAL) or 30 (NTSC) fps DCIF: 528*384 (PAL) or 528*320 (NTSC) at up to 25 (PAL) or 30 (NTSC) fps CIF: 352*288 (PAL) or 352*240 (NTSC) at up to 25 (PAL) or 30 (NTSC) fps QCIF: 176*144 (PAL) or 176*120 (NTSC) at up to 25 (PAL) or 30 (NTSC) fps Storage function 1.264 video compression algorithm and each channel can be real time (PAL is 25FPS and NTSC is 30FPS). 4. or altered after watermarking. The NetDVR support multi-zone motion detection and mask sensitive area. • • The NewtDVR shall provide various pre-installed storage configuration Eight (8) SATA interface. support 8 SATA HDD and each HDD can support up to 2000GB. 2. The NetDVR provides high quality H. 3. 3. 5. Compression and video quality functions 1. The NetDVR shall support various record modes: • Continuous 24/7 recording Page 19 / 51 A&E Specifications www. The NetDVR HDD protection support HDD sleep mode and S.T function. A tool that confirms the authentication of the video footage shall be available.

7. When a video display window is showing live the video playback menu shall consist of: play/pause. The video display can be configured for camera live sequence view 7. 6. USB hard disk and USB CD-R/W for backup. A&E Specifications Page 20 / 51 www. The video display area shall allow viewing 1. 12. 8. One mouse click shall enable the user go tile mode to a large screen mode (only one window in the video display area). The NetDVR shall allow exporting of video footage or snapshots to other networking access media with watermark Remote Client. the main palette that displays the different video sources. 8. Web Access and Local Monitor 1. 1+9. The Remote Client shall provide Control of all features with a PS/2 mouse and access to any part of the NetDVR system’s functionality in a maximum of 2 mouse clicks. Scheduled recording Motion alarm recording with pre and post configurable video footage External alarm recording with pre and post configurable video footage Motion & alarm recording with pre and post configurable video footage Manual recording The NetDVR shall provide ability to record in cycle (FIFO – first in first out) and non-cycle mode. 3. The NetDVR support USB flash disk. 2+17 or 1+21 video display concurrently. Viewing video shall be possible in the ways: dragging and dropping a camera from the cameras panel into the video display area or double-clicking on a camera in the cameras panel. stop. the secondary palette that displays PTZ or audio controls and a date time area. 15. 9. 1+7.• • • • • 6. Service Pack 2 and meet the following minimum specifications : 2. a video display area. Upon any event the NetDVR shall support a popup screen with the video from the relevant camera. 4. The main screen in the Remote Client shall consist of a main toolbar. 2+8. The mail menu panel shall display the camera tree by group or by name. 10. 5. 4+9. 4. 16. The video status display shall enable the user to immediately notice if live video is being displayed (or playback). The client software shall operate on Windows XP. rewind and load video. 1+12. The Remote Client shall provide a secure login mechanism that requires user-name and password to access the system and a minimum of seven levels of security-protected passwords and accessibility to the NetDVR system features. 11. Initiate predefined video sequence and activate an output alarm 8.riscogroup.com . 1+16. specific position of a PTZ camera.

19. DVD-RW. or x hours. 14. frame rate. local HDD. external USB or HDD. The latest events/query results panel shall enable toggling between the display of the 50 latest events in the system and event search query results. CD-RW. 17. setting user name and password. or to an email. 21. The record manual event button shall enable marking the video with a manual event tag. The event query screen shall enable the user to query the event database according to time/date. The playback speed control shall enable viewing the video at variable speeds. setting the users authorization level and setting the accessible cameras for a selected user.13. The time range in the event query screen will enable to perform a quick search on the last x days. The events button on the main toolbar shall provide for bringing up the latest events/query results panel onto the main palette (choosing events as the video sources). The user manager shall enable the administrator to manage user accounts and privileges. local HDD. brightness. 24. The ‘motion detection’ detector screen shall allow setting multiple regions of interest. deleting existing users. external USB or HDD. on video images. 28. 29. and exporting a still image shall be enabled in a Bitmap or JPEG file exported to any accessible destination. a continuous search between to date/time entrees and a daily search between the 2 times specified.com . The PTZ control panel shall include buttons for setting and calling presets. In scheduled recording modes the settings will allow configuring no recording. contrast. 22. The PTZ button on the main toolbar shall provide for displaying the PTZ control panel onto the secondary palette. It shall also enable entering a searchable text description/reason. The video options screen shall provide for locking video (onto the hard drive) and for exporting video segments out of the system. or to an email. 25. CD-RW. A&E Specifications Page 21 / 51 www. The Remote Client shall provide the capability of digitally zooming. contrast and color of each camera. patterns and auxiliary functions on the camera. continuous recording and event recording in the same schedule according to user defined times and at any mix. 23. The full screen button shall provide for displaying the video on full screen. minimal time between events settings and sensitivity settings. 18. The ‘motion detection’ detector screen shall also provide graphical ability to define the motion detection region 27. or printer. 26. The user may set the channel name. 16. DVD-RW. 15. The user manager shall provide for adding new users. video quality.riscogroup. camera. user definable ranging from 30 times slower (frame-by-frame) to 30 times faster. or word document. The latest events/query results panel shall enable access to the event query screen. event type and extra (text) information. 20. Exporting video shall be enabled to a MPEG 4 file onto any accessible destination. The configuration screen shall enable setting daily and weekly schedule recording modes or continuous mode.

etc.com . Support one main monitor and VGA. frame by frame. Supports Camera grouping in which cameras in the system can be logically grouped and assigned. Support one channel playback. 31. 5. 3. pause. Preview & Playback function: 1. slow. Use define preview layout. Support one spot monitor for preview and playback.riscogroup.30. A&E Specifications Page 22 / 51 www. Support playback fast. regardless of its associated NetDVR to improve user flexibility. forward. The exit button on the main toolbar shall force the user to exit the Remote Client with confirmation menu. 2. 4. backward.

ACCESS CONTROL INTEGRATION General The project consists of installing a system for controlling access by use of Readers and Controllers that activate various access.5. Exit: a pushbutton or request-to exit unit and a reader if exit control is required (option). A monitoring switch providing the status of the door. etc. regardless of the load on the communication network or on the system’s main control unit (computer). * NOTE: The Controller shall be able to have a maximum of 4 readers A&E Specifications Page 23 / 51 www. A detectable waiting period may only occur when an anti-passback function has been configured. The principle of distributed intelligence means that under no condition will a Controller have to interrogate any concentrator or central processing unit in order to authorize the opening of the controlled access. turnstiles.com . Passing an authorized card through the reader results in an immediate command to open the controlled access. In order to be able to offer the best guarantees with regard to reliability. egress and locking systems: electrical locks. security and simplicity. The Controllers shall be CE Marked. ventilation outlets. or in a rare case where the administrator of access authorization management has selected this configuration option in the management system for a specific part of the installation. continuously operating at 12 V and opening when there is a power failure. Design of the Installation Each monitored access shall be equipped with: Electronics Controllers managing up to two entrance/exit doors* or up to four ordinary entrance doors (with distributed intelligence in all cases) Entry: a card reader outside the protected area. the installation of the Access Control system shall be designed in accordance with the principle of distributed intelligence. An electrical system for locking and unlocking the door. parking barriers.riscogroup.

in addition to entry (if the Controller manages one or two doors). codes. All the Controllers shall be connected to a main management PC via a reliable communication link (Ethernet. etc. the same Controller shall enable a different command relay to be activated. a management capacity of 15 Controllers per loop is advised to maintain adequate response times.).). This connection shall serve three objectives: Enabling the configuration data to be downloaded into the Controller to allow distributed intelligence (cards. an unlimited number of loops can be used. the system’s operation shall not be affected and the Controller’s response time shall remain the same (due to the principle of distributed intelligence). A&E Specifications Page 24 / 51 www. The switching power supply of a Controller shall be sufficient to operate a 12V locking system. All Controllers shall support a keypad. etc. The power supply shall be backed up by battery. There shall be no limit to the number of Controllers that the installation can contain. depending upon the direction of passage (one relay for entry and another for exit).). etc. Controllers shall easily be added or removed from the installation at any time. Should directional obstacles (turnstiles. Enabling the information to be retrieved by the PC (events.riscogroup. schedules. Modularity The principle of distributed intelligence and the type of communication used shall enable the broadest possible modularity.Comments: All Controllers shall be able to support a reader for exit.). Enabling PC commands to be sent to the Controller (unlocking. etc.com . Nevertheless. alerts. etc. single-person locks. in order to enable the use of personal identification numbers (PIN) in addition to the card. Should this connection be interrupted.) be used. at the entrance as well as at the exit.

Integration The system shall be comprised of an integrated solution for managing access. and can use the same management PC.). card personalization and visitor management. The integration of a graphic management software (**SynopSYS – Delete product name if spec needs to be generic) for protection and security resources. store them and print cards. The visitor management system shall be able to generate paper or adhesive cards as well as regular access control tags. which shall ensure the synthesis of information from the different asset and people protection systems. etc. emergency exits. These tags will be automatically validated on the company access control system according to the visit needs.com .) The display and management of security and safety elements (fire-fighting resources. timetables. The integration of an optimized visitor management system (**MaxVisit – delete product name if spec needs to be generic) thereby making it possible to rapidly enroll and edit the visitor cards. The graphic management software shall also enable (among other functionality): The display of alerts on a map The selection of the events and alerts to be displayed The programming of an order of precedence of the alerts The acknowledgement of the alerts The processing of the alerts Automatic actions and/or transmissions in the absence of an operator The integration of information from other systems by controller contacts and software integration (intrusion alarm systems. This system uses the same card and the same database. fire alarm systems. The solution shall be part of a comprehensive and integrated system that enables future development and expansion of the system.riscogroup. Building Managements systems. and is able to display the sites and action resources available to him. alerts. NVR and DVR systems. displays to the operator the instructions to be applied in case of an alarms and events. etc. all using a common database and enabling use of different cards technologies. A&E Specifications Page 25 / 51 www. Management of visitor’s history shall also be possible. The system shall enable: The integration of a card identification management system with photos (**MaxImage – delete references to product names if spec needs to be generic) which makes it possible to capture photographs.

etc. One schedule shall allow definition of three authorized timeframes per day. service people. Time related constraints shall be based upon the following principle: The timetables shall be sorted according to different categories (known as “access types”). 16 types of access shall be available. exception management is anticipated (for one time events. which define the authorized access zones for certain categories of people.) and makes it possible to individually program authorized access for each card (reader-by-reader and/or by reader group). Each card shall be identified by an Access Authorization Group (AAG) which classifies the reader groups and the types of access. A card shall only be authorized for the access assigned to a specific group and within a specific timeframe. they shall be definable minute-by-minute. These timeframes shall be configurable in the software at any time.500 reader groups. for all days of the week including holidays. This principle enables flexible and easy management of access authorizations and does not require individual reprogramming for each card in the event of changes in the organization.com . 36 holidays shall be programmable. An access shall be part of several reader groups. contactors. There shall be 299 schedules available. This principle enables flexible and easy management of access authorizations and does not require individual reprogramming for each card in the event of changes in the organization. A&E Specifications Page 26 / 51 www. Nonetheless. thereby allowing different access authorizations for each door for the defined categories of people. There shall be up to 1. Time related authorization The access authorizations can be limited to specific times during the day.riscogroup. An authorized access schedule shall be assigned to each access type in each Controller.Operating principles The authorization for card access shall depend upon the following criteria: Geographic authorization Time-related authorization Beginning and end dates and times for the validity of the card for the whole installation Beginning and end dates and times for the validity of the card at certain specific doors Geographic authorization Accesses shall be sorted by reader groups.

A Controller can be deactivated thereby restricting access. This key function in the software enables. Access authorization All of the parameters that make it possible to define the programming of a card will be sorted into “access authorization groups”. as well as changes in the allocation of personnel. An “access authorization” covers the following parameters: A Controller group One type of access The use of a PIN (personal identification number) Triggering automatic commands when the card is presented (for instance.com . Each card can be assigned an individual selection of access authorizations or a group of access authorizations. among others. A&E Specifications Page 27 / 51 www. for different installation areas. Additional functions A “highly privileged” (VIP) type of access shall make it possible to associated permanent access (24 hours / 7 day a week) to a card for all doors or areas of authorized geographical access. even for “highly privileged” cards. An access authorization group may contain an unlimited number of access authorizations.Access authorization groups Different access authorizations may be grouped into “access authorization groups” to simplify enrollment and management. and deactivating all logical entries and exits. Thus. it shall be possible to schedule different starting and expiration validity dates and times for the card. triggering an additional relay on the controller) The authority to send commands from the keypad The validity starting date and time The validity expiration date and time A selection of access days Each card can have an unlimited number of access authorizations.riscogroup. Similarly. different and very specific authorizations and behaviors for different areas of the installation shall be programmable. provisional planning of the authorizations and provisional management of the irregularities.

proximity card and barcode card. This broadens the range of card technologies that may be assigned to and used by single person (vehicle tag and card. Each of these cards and codes shall have its own access authorizations. (**Delete screen image if spec needs to be generic) Moreover. It also allows to easily manage cases where people forgot or temporarily lost their cards.riscogroup.). These cards must be able to be verified simultaneously or individually. etc. it must be possible to refer to recent events linked to a person in the persons screen.Multi-card support per person Each person may receive up to four cards (with or without PIN [personal identification number]) and one unique PIN code. A&E Specifications Page 28 / 51 www.com .

for example).000 people / 2. A&E Specifications Page 29 / 51 www.com . etc.Access Control Hardware Access Controller Access Controller . (**Please contact RISCO Group for more information). Stand-alone logical operation (the Controller does not interrogate any concentrator or PC for access authorization. for doubtful situations.) The possibility to connect different reader technologies to the same Controller (proximity and barcode. denied accesses. The Controller shall be CE marked. etc.Main Capabilities Management and control 1 to 4 doors 1 to 2 turnstiles 4 relays.500 transactions: authorized accesses. alerts.500 events Performance monitoring and alert Communication 4800 & 9600 bauds (Keyfree) TCP/IP (option) RS232 (option) WiFi (option) Security Detecting when switching to backup battery operation Detecting low backup battery power Detecting low lithium battery power The Access Controller (**KF-R7 – delete product name if spec needs to be generic) shall ensure control over one or two accesses (reader + keypad at entry or at entry/exit) or four entry accesses. * NOTE: the number of people retained by the Controller may be reduced when very specific software functions are used.riscogroup.000 cards* A buffer memory which can retain the last 2. The Controller’s main operational features shall be: The capacity to handle and process 22. The possibility to function in a centralized mode (a specific mode in which management software generates an exception to the access authorization. except in specific cases). 4 readers and 8 inputs Memory: 22.

door forced open The possibility of connecting a keypad to use PIN codes The use of PIN codes can be imposed individually (on a card-by-card basis) The use of PIN codes can be imposed on a reader by reader basis The use of PIN codes can be subject to an individual usage schedule (on a reader by reader basis) The use of the PIN code can be imposed for single direction monitored access only (entry or exit) The card can be invalidated for after the introduction of three wrong PIN numbers (card + code) A&E Specifications Page 30 / 51 www. open too long.com . for instance. closed.riscogroup. etc. opening of a gate only if a car is present) subject to an individual activation schedule Additional entrances whose use is subject to an individual activation schedule (one schedule per entry) Option to display of the status of the entries on an intelligent synoptic chart Configurable outputs: Door activation relay Specific alarm relay Ancillary command relay (configured as an exit relay in the case of reader module for a directional barrier) Individual relay configuration LED status display of the relays Remote-controlled operation of the relay via software Managing a door alarm: door open too long. subject to an individual activation schedule For controlling the status of the door (open.Scheduling capacity according to the following breakdown: 14 access profiles (access types) One reader schedule One schedule for free access One schedule for free exit One schedule for conditional contact One schedule for the use of PIN (personal identification number) One schedule for the use of the logical position (anti-passback) One schedule for activation per entry Three timeframes per day 36 holidays Configurable inputs: For free access. door not opened following presentation of a valid card. subject to an individual activation schedule For free exit.) For managing locks or barriers (conditional sensors or inputs allowing.

etc. TTL inputs configured as NO/NC Detecting 220VAC power failure and switching to backup battery operation Detecting low backup battery power Detecting low lithium battery power (RAM protection) A&E Specifications Page 31 / 51 www. per door Saving events in case of power failure Real-time clock LED watchdog for the electronic components A network loop bypass relay making it possible to isolate the Controller from the communication loop in the case of power failure.riscogroup.com . The possibility of activating the Controller’s command relay from an optional keypad to which it is connected An individual authorization for using these commands can be selected (per card and per reader) The possibility of disabling an access (halt / resume free access) Possibility of selecting the types of events to be stored.The possibility of triggering automatic functions by activating the relay with the use of PIN code and card The possibility of activating a logical control of geographical position (anti-passback) for 199 area zones. This prevents a badge to be re-presented within a specified time on the reader. subject to an individual activation schedule (on a reader by reader basis) The possibility of activating an anti-timeback functionality (on a reader by reader basis). The possibility of using a coerced code without changing the number of keypad keystrokes used.

riscogroup.com . Alarm point groups can be configured to activate / disconnect automatically or manually The groups may trigger relays on specific Controllers (sounder. The Controller’s main operational features shall be: 24 configured inputs: Protected TTL inputs configured as NO/NC Subject to an individually activated schedule (on an input by input) Able to launch one or several of the Controller’s 24 output relays. etc.) even when not communicating with the server The groups may be controlled via key contacts 24 configured outputs (relays with 250V 8A power): Individual configuration of the relays LED status display of the relays Buffer memory retaining the last 1. transmitter.500 events Remote-controlled operation of the relay via software Relays configured as NO/NC The connection blocks of the Input/Output Controller shall be “unpluggable” in order to simplify maintenance. The Controller shall be CE marked.Input/Output Controller The Input/Output Controller (**KF-24/24 Input/Output – Delete product name if spec needs to be generic) shall be an electronic remote control and acquisition unit with 24 inputs / 24 relay outputs. operating in accordance with the principle of distributed intelligence. A&E Specifications Page 32 / 51 www.

Following are the main operational features: Stand-alone operation (the Controller does not interrogate a concentrator or a PC for access authorization. 2 and 3 only) Automatic bypass function (mode 1 only) • • • In case a breakdown is detected In case of a power failure In case a specific input is closed Each floor appears in the software by name Priority mode A technical failure output (absence of 12V or current failure) Note: In order to be able to install the Controller in the equipment room. and the reader in the lift cubicle.riscogroup. and shall operate in accordance with the principle of distributed intelligence. The Lift Controller (**KF-Lift . except in specific cases). reader distance extension modules shall be used (**KF Far – HD Far .com .Lift Controller The access control system shall also make it possible to manage lifts (elevators).delete product names if spec needs to be generic) A&E Specifications Page 33 / 51 www. A larger number of floors shall be manageable by installing additional Lift Controllers in series. Floor-by-floor control • Each floor is considered as a door • A name is assigned to each floor in the software Ability to adapt to different types of lifts by using four operating modes 16 available schedules: • • • One schedule per floor for free access One reader schedule 14 types of access schedules per floor The possibility to track floors selected by a person (modes 1.delete product name if spec needs to be generic) shall be capable of managing a minimum of 12 floors. The Controllers shall be CE marked.

an automatic bypass system in each Controller shall remove this Controller from the loop and allows the communication loop to remain operational.com . where each Controller restores the signal. • • • • • • Cabled link (bus with RS-232 or USB link) Ethernet link addressing TCP/IP 10/100 Mbits Optical fiber link Specialized lines WiFi PSTN link Communication of the Controllers with each other and with the PC shall be accomplished by a double current loop. To ensure a high level of security when managing communication with the Controllers connected to an Ethernet TCP/IP network. proper operation of the system in lifts or in zones with strong electrical or electromagnetic interferences. The cable between the various Controllers shall be a two-pair cable.riscogroup. Communication Dispatcher The solution shall include communication dispatchers for providing the following functionality: • • • • Enabling Star cabling architecture Providing LED display of the communication status with each Controller connected Enabling quick identification of any defective Controller in case of failure and allowing to manually isolate (via a simple switch on the dispatcher) one or several Controllers from the network Enabling gradual setting up of the installation should this be necessary A&E Specifications Page 34 / 51 www. it is recommended to use a 9/10th notched cable. The distance between two Controllers shall be up to 600m on a 9/10th copper cable. for example. This method is highly protected against external interference and enables. Should a Controller network be created. it shall possible to encrypt this communication (3-DES encryption).Network communication description Cabling architecture: All of the following solutions shall be possible within a single installation. Once such a Controller returns to normal operation.5 km by adding modem line drivers Should any Controllers fail or encounter a power failure. The communication network is opto-coupled. This distance may be increased to +/. the same system shall automatically enable reintegration of the Controller into the communication loop.

returning the card and opening the barrier After insertion of a “visitor” card.Reader technologies The access control system shall enable use of the following different means for identification: Identification by card: Magnetic readers Contact-less readers (Wiegand) Read/write readers (Mifare. The following functions shall be configurable with regard to an insertion reader. Insertion readers Insertion readers may also be integrated into the system. keeping the card and opening the barrier A&E Specifications Page 35 / 51 www. taking the parking exit as an example: • • After insertion of an “employee” card.riscogroup.com . i-Class. Legic) Infrared (barcode) readers Hyper frequency readers Remote radio control readers • Biometric Identification Hand Fingerprint (integration of the Sagem biometric module within the access control software: enrollment in a single software) Eye (iris) All these identification means may be combined in the same installation.

etc. Managing card status: Active Inactive Lost Stolen Returned Out of service Not returned A&E Specifications Page 36 / 51 www. The access control software shall enable: Loading the data into the Controller intelligent synoptic and presence charts or panels. as they depend on the size and functionality of the installation). The database used shall be a standard one. etc. and not exclusively that of the software’s creator. written in an advanced language (C and C++). English. Managing the different types of communication.com . multi-user and client/server configurations.). as well as to manage the events.Access Control Software Access control module Environment The access control software module (**MaxiTalk – delete name if spec needs to be generic) shall be flexible and user-friendly. Dutch.riscogroup. Sending PC commands to the Controller (unlocking. 2003 and XP for single-user. These links open up potential opportunities for dynamic compatibility between the integrated Keyfree system software and the client’s internal databases and tools. alerts. without going through the process of exporting the data. The software shall be available for Windows 2000. (**Please consult RISCO Group regarding for PC requirements. Several languages shall be available (multilingual software): French.). Optimizing the rate of communication for the start-up phase Setting the date and time of the installation and automatic changing of summer and winter time. Retrieving data from the Controller using the PC (events. The availability of an ODBC access to the database shall expose it to external databases and tools via ODBC links. Functions of access control software module The basic function of the software shall be to offer a user-friendly interface in order to be able to program the system. German. Italian (**For additional languages: please contact RISCO Group for further information).

Each card can be for different identification technologies The definition of access authorization consists of the following parameters: One reader group One access type The use of a PIN code Launching automatic commands The authorization to execute commands from the keypads Date and time for the beginning of the validity Date and time for the expiration of the validity A selection of access days The definition of access authorization groups to simplify card management The definition of zones enabling logical control of geographical position. Managing schedules (up to 3 cycles per day) in which the following are selected: The schedules used for the configuration The schedules used for the deferred and the automatic processes (for instance. Programming up to 4 access cards and one access code for each person Each of these cards or codes has its own access authorization Each card or code may be verified simultaneously or individually.riscogroup.Managing access: Per Controller Per reader groups Per person Per groups of people Using cards and/or PIN codes Etc.com . Up to 36 holidays Event management and monitoring: Intrusion alarms Open door alarms Technical alarms Etc. printing the list of people on-site every Monday morning at 9:00 AM) Each reader’s individual schedule: Access schedules for the access types Free access schedule Free exit schedule Schedule for using the PIN codes Schedule for activating anti-passback Schedules for activating the sensors Etc. A&E Specifications Page 37 / 51 www.

A&E Specifications Page 38 / 51 www. based upon a variety of selection criteria The possibility to export reports in Microsoft Word and Microsoft Excel format as well as in HTML format.riscogroup. by person. All the printed reports can use filters that make it possible to select the components to be printed.com .) In alphabetic order In chronological order For a period freely determined by the user Lists of people In alphabetic order By card number By reader group By access type Etc.Selecting events to be stored Relay commands Defining the connection between card presentation and commands The authorization to activate/deactivate other systems (authorization on a card-bycard basis) by using the auxiliary command relay Direct enrollment by card reader (option) Storing and retrieving encoded data Generating lists : Lists of events (by type. Managing user and passwords Accessing the session by user name + case sensitive password Five password levels An unlimited number of passwords Display the previous use of the software (user log file) Display the list of users currently using the software LDAP (Lightweight Directory Access Protocol) authentication Administrative breakdown of the database Five personalized levels (departments. services. etc.) An unlimited number of categories for each level The configuration of a description of the personnel in 50 customized fields The principle of distributed intelligence makes it possible to use this software on a non-dedicated PC (A PC that is used for other tasks and not always on site). etc. by timeframe.

riscogroup. ensuring that someone accompanies them. that enables multi-site management of access control systems. For example. this function is used to authorize visitor access to sensitive areas in the building. Multi-site management The system shall include an advanced Multi-site management function regarding the user passwords. It shall be possible to define a usage schedule to determine. This function is used. to ensure the presence of two people when accessing a sensitive room. alarms and visitor management and includes: User rights based upon a password A multi-criteria filter can be attributed to each user Filtering criteria using any combination of: The password levels The people The readers The reader and access authorization groups. The anti-passback function shall be programmable by the access control software which defines the different zones (up to 199 configurable zones per user) as well as the Controllers which are not taken into account for this function. or use of the same card by two people to enter or exit.com .Advanced access control functions Logical control of position The system shall enable an anti-passback (logical control of position) function to be initiated: For certain accesses For a section of the user population (for example. Access to sensitive areas using multiple cards (Multi-card access) Multi-card access shall consist of defining that the passage through an access requires presentation of up to 10 cards. Controller by Controller. Geographical zones A&E Specifications Page 39 / 51 www. the option to deactivate antipassback for security personnel or the General Manager). and shall prevent use of a card to enter or exit a zone where logically it should not be. and by defining the maximum time between presentation of each card. A timed anti-passback function (enabled on each reader independently) shall also be available (enabling to deny access to a card presented twice within a configurable period of time). “Confirmation” cards This function shall enable verifying and authorizing the passage of a person "requiring confirmation" by presenting a “confirmation” card. for example. the periods during which the anti-passback function will be active. The anti-passback function shall verify the logical position of a card for all those zones in which it is activated.

Macro-instructions shall enable to adapt the system to installation specifications and to adapt and simplify the user interface of the operators. or manually from a management PC. A&E Specifications Page 40 / 51 www.riscogroup. Access to the software shall be by customized password. with the option of defining multiple environments (filtering events. the origin of the alarm points. without software engineering intervention. etc. selecting colors. monitoring a selected population.Graphic monitoring module A Graphic monitoring module (**MaxiMon – delete name if spec is generic) shall enable display of all or selected events with customized graphic monitoring: By color (Windows Palette) The possibility to affix a photo to an event card The possibility to configure the maximum number of events to avoid displaying too much detail.com . intended for advanced users to enables creating a macro-instructions library to program actions and reactions in different components of the integrated system. and to place the monitoring option in “pause” mode. It shall be possible to trigger the macro-instructions automatically upon receipt of an event.) Macro-instructions language The system shall include a macro-instructions language.

The latter type.com . terror attack. Windows).Technical monitoring of the software When the installation consists of several management PC’s.) crisis level management will be integrated into the access control software. shall be used internally by the access control manufacturer. It shall also be possible to program the automatic sending of an email message when an internal technical problem is detected in the system. Linux. to decide which events will be logged and where they will be located in a “syslog” database. Crisis Management In order to be able to rapidly modify the access authorizations in the event of a crisis (strike. notification. etc. for example. thereby allowing the authorized person on site to change personnel access parameters. The types of logs shall be: urgent. The first seven log types are standard and used by the syslog protocol on all the larger servers (AIX. to monitor and manage the communications between the controllers and the server remotely from a PC located in the IT department. error. alarm. critical. An application that makes it possible to monitor all communications from a remote station shall also be available with the possibility. demonstration. The five-level crisis management shall meet requirements of DEFCON. It shall be possible to monitor the proper operation of each software program and generate error messages in case of failures (hardware and software monitoring). The error messages shall be displayed on the management PC’s. information and debug. ISPS. bug. A&E Specifications Page 41 / 51 www. the system administrator must be kept informed of any technical problems throughout the installation. Vigipirate standards. UNIX. Managing event logs in the database The software shall include the possibility to manage event logs.riscogroup. if required. warning.

The operator may view a live video of a person presenting his card. backups. together with a database image and the personal information linked to the card presented.) Possibility to define a number of alerts and a number of events online Possibility to define the number of days online Interactive access control module used when video verification for doubtful situations is required. Printing may be performed continuously. with or without sorting criteria. on any printer (networked on local) as long as a Windows printer driver is available.Net Filters criteria / Report generation The software shall enable creating filters and generating reports according to the following specific criteria: Name Card Controller Controller group Access type Type of events Date or period Five additional criteria that are opened in a multi-criteria selection process These different criteria may be combined. A&E Specifications Page 42 / 51 www. Internet/Intranet server module. or processing libraries created and carried out automatically (using the deferred processing module) or manually by the operator. This module enables Web access for visit planning and macro-trigger (using Maxiweb) and card and person management using Maxi. etc.riscogroup. It can be directly interfaced with the PC or using the output of a Video matrix.Additional software modules The following additional software modules shall be integrated to simplify project implementation: ASCII import/export module Management of people present in areas (people count) Deferred processing module (automation of reports.com . purges.

Possibility to detect who added or modified a scheduled visit and when was this done Possibility to automatically or manually send an email with the visit details to the host person alerting him/her of the visit. a conference. Each visitor can be assigned a card with access authorizations based upon: A reader or group of readers An access type A start and/or expiration date and time Advanced functionality of the visitor management software: • • Multi-site management of visitors (visitors are received at the reception center at X or Y location) Unwanted visitors: the screen shall become red if the designated visitor appears on the list of excluded persons (unwanted visitors).riscogroup. • • • • A&E Specifications Page 43 / 51 www.Visitor management module Visitor management software (**MaxVisit – delete name if spec needs to be generic) that uses same database as the access control module shall be available.com . This visitor management software shall make it possible to assign access authorizations (using predefined profiles) to visitors.) The visitor management module shall be able to list all scheduled visits in chronological order. in which visitor names are in random order or in chronological order to select a visitor. It also enables to assign authorization based on a predefined access profile associated to the host being visited. Printing cards sequentially and automatically in alphabetical order (for printing cards for a meeting. etc.

and on the other hand. It shall also be possible to customize the pages to include. The system can also acquire a signature (in addition to a photo) to be printed on the card. the data shall be entered only once. Standard HTML pages shall be included in the module.com . for instance. etc.) A 160*200 pixel format shall be used for the personnel file (conversion to this format is not included. The inserted data are. The package shall enable to use existing photo files in BMP or JPG format and re-using the current photo material if compatible. (This shall be confirmed after analysis of the technical documentation.riscogroup. Card personalization module The solution shall include a card-personalization module (**MaxImage – delete name if spec needs to be generic) that enables: Video camera capture Digital storage of photos Printing of cards The database shall be shared with the Access Control module (**MaxiTalk – delete name if spec needs to be generic) . if needed. the information regarding the visitor (name. scheduled arrival and departure dates and times). shall be the host’s name and password which has to be verified on the Intranet. drivers. available via Intranet at all the office PC terminals. company logo or other customer specific data if needed. The data will be verified and automatically transferred to the Access Control visitor database by the Access Control HTTP server. It shall also allow to query the database for ongoing and future visits. shall make it possible to introduce a future visit into the visitor management database. in case current photos need to be used). surname. company. A&E Specifications Page 44 / 51 www. This will enable the receptionist to permanently access the list of expected visitors and prepare their cards.Pre-visit management via Intranet A pre-visit management module. on the one hand. The module shall enable inserting scheduled visits via an HTML page that can be accessed from a browser.

one file per person. The ACC interface specification is available upon request. It shall enable to output Access Control events to external customer applications in realtime using a predefined protocol. title. describing the identity of the person and his/her access authorizations.. for example. 4- ODBC link The software application shall be accessible via an ODBC link.External database interfaces The system shall provide an integrated solution for managing access. one file shall contain all records to import. timetables. using external applications: 1- ASCII files interface This interface shall enable the access control applications to import and export data in ASCII format (one line per record). card personalization and visitors. by using a single central database and allowing use of many different card technologies. The General Interface protocol definition is available upon request. This interface allows importing personal information (name. the information will be dealt with in real-time. etc. This interface shall function in real time. . change and delete records in the system’s database.) but does not enable real-time validation of cards on the Controllers.com . or to generate them elsewhere and transfer them to the specified directory using FTP. etc.) Note: It shall be possible to generate the ACC files directly in the specified directory. Controller groups.riscogroup. 2- ACC interface: ASCII files interface ACC is an ASCII file.e. start and expiration dates for the verification. This interface shall enable to verify information by using the access control parameters (i. department. which shall enable. 3- General interface A general interface shall enable communication with the software application using TCP/IP or RS232 interface. time periods. to display the table content in Excel or adding a record from an external application A&E Specifications Page 45 / 51 www. Once the file(s) have been placed in the specified directory (the directory location can be configured). Several standard interfaces in the application shall make it possible to add. import will be performed and card validation on the Controllers will also be done automatically. alerts.

they shall have the ability to be linked to digital video and/or global I/O. A&E Specifications Page 46 / 51 www. Areas. 40 zones or 128 zones depending on the model required. The Bus test validates correct Bus wiring and module communication. System Communication Bus The system shall employ standard non-shielded.riscogroup. The Bus architecture shall be in any combination of “daisy chain”. and they shall be stored in the IMS database.6. The communication quality shall be displayed on the keypad in percentages ranging from 0% to 100% for each of the modules on the bus. programmable switched auxiliary power supply for smoke detectors. and 6 programmable outputs: one 3A relay. Relays and Doors as ‘enabled’ or ‘disabled’. in order to enable rapid and error free configuration and installation. The Intruder Detection System shall be an electronically supervised. 4 conductor wire RS485 bus for powering and communicating with hardwired system expansion modules. auxiliary power for powering security detection devices. integral supervised digital communicator. Intrusion detection panel devices (zones. and allows extending the length of the Bus wiring. System Main Panel The main panel shall have 8 hardwired zones and have a maximum expansion capacity of 16 zones. INTRUDER ALARM INTEGRATION Integrated Intrusion Detection Interface The IMS shall provide seamless integration with intrusion detection panels. All Status Information for Intrusion Detection Systems shall be able to be displayed. The main panel shall include automatic fuses except for the battery fuse. The IMS shall allow for the configuration of Intrusion Detection Zones. Relays and Doors. Operators shall have the ability to mark intrusion detection Zones.com . detectors and sounders. and four 70mA outputs. spur or star configuration. The IMS shall be able to report status information for the Intrusion Detection Devices. battery backed-up intruder alarm system with multiple expansion capabilities. This shall allow for the ability to monitor intrusion detection alarms in real time inside the IMS Alarm Monitoring module and allow for command and control of supported intrusion detection. A bus test feature shall be available to check the communication quality between the panel and each module on the Bus. Areas. All zones shall be fully supervised and programmable. The system shall have an auto-install feature capable of recognizing the connected modules upon power-up. relays) shall be definable and added to the IMS database. Panel shall be complete with integral power supply and supervised battery charger. one 500mA. saves maintenance time by enables pinpointing intermittent malfunctions or faulty wiring from a remote PC or from the keypad. Once alarms are brought into IMS. Communication with the intrusion detection panel shall be a LAN connection.

com . 32 Bus detectors can be installed directly on the main panel bus. All modules can be installed within the main panel standard enclosure. authentication and substitution protection. up to 32 detectors on each Bus zone expander. Active IP anti-mask and proximity anti-sabotage. The Bus detectors shall include remote parameter setting and diagnostic capabilities via the Bus from the keypad or U/D software . Bus zone expanders shall enable installing up to 128 Bus detectors. Remote control of parameters shall include detection sensitivity. Available Bus detectors shall include: • • • • An outdoor volumetric detector with 2 PIR channels and 2 microwave channels. A high ceiling dual technology detector for installation up to 8. which allows the addition of a door/window contact or any other relay detector saving on the wiring back to the panel.6m (28ft high) An industrial detector with 2 PIR and 2 microwave channels Commercial dual technology and PIR Quad detectors that include an extra zone input. Compatible with 10BaseT and 100BaseT full duplex Simulatneous multichannel communication: event reporting and Uplaod/download at the same time Event message reporting to email addresses Supports DHCP Supports project integration with 3rd party applications using Modbus or XML protocols Fully supervised accessory on the main panel bus Installed in the main panel enclosure GSM/GPRS Module A&E Specifications Page 47 / 51 www.Addressable Bus Detectors and Sounders Up to 128 Addressable Bus detectors can be installed on the system communication Bus. IP module The IP module shall provide the following functionalities: • • • • • • • • Full SSL security layer with 256bit AES encryption.riscogroup. LED on/off and microwave range. Remote diagnostic capability shall include voltage input measurement to the detector and signal and noise level from each PIR and microwave sensor in the detector. Cipher key can be changed frequently. External Communication The system shall include a built-in PSTN dialer and optional IP and GSM/GPRS communication modules.

Reporting shall be via any of the PSTN. A touch-screen LCD keypad with blue backlight with or without a proximity reader shall be available. The system shall support optional “disabling” of the keypads during arming periods for higher security. Keypads shall have 4 one-touch buttons that may be programmed for one-touch operation of predefined macro sequence. The system shall include a prerecorded word library and allow customized messages for zones. Keys shall be backlit for low light level ease of use. Interactive Voice Module An optional interactive voice module shall provide remote system control and voice status via any touch-tone or mobile telephone. A&E Specifications Page 48 / 51 www. IP/GSM Receiver An IP/GSM Receiver software application shall be available for central stations. Automation An optional X-10 expansion module shall be available capable of controlling up to 16 X-10 control devices by event and by schedule. Keypads The system shall accommodate up to 16 keypads. Separate account numbers shall be available for each partition with additional backup accounts.A GSM/GPRS module shall provide the following functionalities: • • • • • Reporting via GSM. outputs and common system message. The software shall transfer the encrypted events received via IP GSM or SMS to existing Monitoring Software applications. The voice module shall include a full voice menu guide enabling the user to listen to and select the required. and shall have call saving features. partitions. In this mode the keypad will be disabled according to a schedule and immediately upon arming. confirmed by return SMS Upload/Download support Central Station Reporting The system shall support Contact ID and SIA reporting formats and shall be capable of being programmed to call up to 3 telephone numbers. System shall be capable of listen-in and speak-in capability to the premises. Automation shall be controllable via any keypad or remote touchtone telephone. All schedules shall be programmable via the LCD keypads and via downloading either locally or remotely.riscogroup.com . and will be enabled at a scheduled time. IP or GSM communication channels. GPRS or SMS channels 128bit AES encryption for GPRS and SMS reporting SMS and email messages SMS operation of the panel. LCD keypads shall have a display capacity of 32 alphanumeric characters with adjustable contrast. The system shall be programmable for multiple or split reporting. Scheduling The system shall provide for up to 32 weekly time schedules with two intervals per day.

The wireless threshold level shall be automatically calibrated per receiver according to the measured environmental noise level. Noise level. Partitions The system shall be programmable for up to 8 fully independent partitions. and arming/disarming from outside the protected A&E Specifications Page 49 / 51 www. combination of partitions. smoke. low battery. Keypads shall be assignable to any partition.riscogroup. The system shall be supervised for AC loss. Wireless transmitters shall be supplied with a longlife lithium battery. up to the maximum expansion capability of the control panel. The system shall be capable of hardwired and wireless expansion in any mix that suits the application. tamper. Each partition shall have its own account code. Each code can be assigned to one of several authority levels and to multiple partitions. 4 button rolling-code and zone keyfobs. Frequency generation shall be PLL based for high stability and precision in either 433MHz or 868MHz bands. False Alarm Prevention The system shall include the following false alarm prevention features: audible exit delay. The wireless transmitters shall be dipswitch free and have a preprogrammed address (1 out of 16 million codes) that is learned by the system during installation. outdoor volumetric and beam detectors. magnetic contact and special purpose transmitters. enabling installation and calibration without using a separate signal strength meter. For access control an additional 900 access user codes shall be provided. The RS485 bus shall be supervised for low voltage and presence of each defined expansion module and keypad. swinger shutdown programmable by zone. by adding 8 and/or 16 zone receiver expansion modules. double knock. PIR and PIR Pet friendly detectors. The following wireless transmitters shall be available: Universal. Supervision time of the wireless transmitters shall be programmable. Additional power supplies shall be supervised for AC loss. audible exit fault. Each zone in the system shall be assignable to one or more partitions. A double code option shall be available tat requires 2 users to enter their code in order to disarm the system. Wireless detection devices shall be supervised for presence and low battery. The system shall include signal jamming indication and transmitter low battery indication. auxiliary output failure. Batteries shall be supervised for low power and be short circuit protected. and loss of sounder loop integrity.Hybrid Wireless Expansion The panel shall be expandable to a maximum of 120 supervised and programmable wireless zones. User Codes The system shall provide for up to 99 user codes selectable as either 4 or 6 digits. Digital alarm communicators shall be supervised for phone line trouble and failure to communicate.com . gas and flood detectors. or the whole system. cross zoning. panic transmitters. The keypads shall support 4 level one-touch partial arming. arm/disarm bell squawk. pulse count by zone. Groups In each partition the zones shall be assignable to 4 groups enabling 4 levels of quick partial arming in each partition. soak test by zone. Supervision Each zone in the system shall be fully supervised. and shall be adjustable in order to reduce jamming from high incidental environment noise. transmission delay. Wireless receiver modules shall have an internal antenna for higher security. threshold level and transmitter signal level shall all be displayable on the system’s keypads.

including access control events. LCD keypad programming shall have a "Menu and tree structure” and not be “Address & Data” based. Access control shall allow users to arm/disarm the security system while locking/unlocking the doors from outside the protected space. Access control functions shall be fully programmable through any system keypad and either locally or remotely using the upload/download software. and up to 25 weekly schedules with 2 intervals per day. Access control modules shall contain non-volatile memory to retain all schedules and programming even if AC and battery power is lost. up to 16 user groups with different access levels. The software shall work both locally via a local adaptor to a USB or RS232 port of a PC. and holiday schedules. Up to 999 users may be accommodated. user actions. system events. System Printer The system shall be capable of supporting parallel printers installed anywhere on the bus. Each module shall be able to store the most recent 1000 events. The events may be read from the system’s LCD keypad or uploaded via the upload/download software and printed for further analysis.riscogroup. All significant events shall be printed as they occur. and scheduled events. The access control module shall be able to support magnetic. touch or Wiegand technology readers. restores. including arming.com . or remotely via a A&E Specifications Page 50 / 51 www. Each access control module shall have a “request-to-exit” input. bar code. alarms. troubles. proximity. bypassing. requirements. Integrated Access Control The system shall support up to 8 dual reader access control modules for a total of 16 readers. time. and if applicable. System Programming The system shall be fully programmable via the LCD keypads or the upload/download software. and a door strike output. System Event Buffer The system shall have the capability to store up to 999 events. a reader input. Quick shortcuts shall be available to each option of the menu in order to facilitate quicker service phone calls and faster programming and fault diagnosis. partitions. zones. and resets. in order to allow simple programming of the system without continuous reference to the installation manual. the affected partition and user involved. disarming. Access control software shall be an integral part of the main panel software and shall provide the following functions: capacity for 999 cards. All system programming shall be maintained in a non-volatile memory such that program information in maintained even if all AC and battery power in removed. Each event shall include the date. The system shall conform to UK DD243:2000 false alarm prevention Programmable Outputs The system shall have 6 outputs on the main panel and be be expandable to a maximum of 70 programmable outputs to operate external devices in response to activities related to alarms. a ”door” contact input. Upload/Download Software The Upload/Download software shall be Windows based with a friendly graphical user interface.space using access control.

EXECUTION (** TBD by Specifier) A&E Specifications Page 51 / 51 www. Full online help shall be available.telephone line. The latest version of the software shall support the complete range of the manufacturer’s control panels. EN Security Grade The system shall support EN50131 Security Grade 3 or Grade 2 installations. Program Transfer Module The system shall support a program transfer module which is capable of downloading. without the need for a phone line. INTERCOM INTEGRATION (** TBD by Specifier) 9. a PC or any other peripheral device. FIRE ALARM INTEGRATION (** TBD by Specifier) 8. 7. The software shall enable remote monitoring of system status and shall have several security level and password controlled access. uploading and storing the system’s programming without power. The program transfer module shall be connected to the main panel via quick plug in connector. BUILDING MANAGEMENT INTEGRATION (** TBD by Specifier) 10.com . OTHER THIRD PARTY DEVICE INTEGRATION (** TBD by Specifier) 11. The software shall support shared database capability enabling multiple users to work on the same database via the network.riscogroup.