Excel Security Manager (R610) Part - 3. CSI 3-Part Specifications.
Excel Security Manager (R610)
For each tour, the user defines a guard ID (equivalent to the guard's card key number), the first tour position, the time allowance to reach the first position, and up to 75 tour checkpoints consisting of card readers or other digital inputs.
For every tour checkpoint, the user specifies a time allowance for the guard to arrive at that location and up to 16 door points (digital inputs)
requiring alarm inhibiting.
Once a tour starts, at each step of the tour the door alarms are inhibited and digital input points are controlled to the access state. If the next
step in the tour is reached within the time allowance, the door and digital input points are enabled and reset to the secure mode. If the next
step in the tour is not reached within the time allowance, a late arrival alarm is generated, door alarms are enabled, and digital input points are
set to the secure mode. In the case of an early arrival, an alarm occurs with the priority configured on the guard tour overview display.
Upon activation, deactivation, and successful completion of a tour, an event is logged in the event file and sent to the printer. The event message includes the date and time, guard ID, tour number, and a corresponding message.
Deadman Timer
The deadman timer option monitors operator activity at an operator station. It provides a safeguard to ensure that an operator is actively at their post and that all alarms are acknowledged promptly. The deadman timer functions as follows:
� If there is no operator activity for a user-defined time period, XSM automatically signs off the operator. A warning message can be configured to notify the operator before automatic log off. If that operator does not sign-on to the system again within a specified deadman timer period, XSM automatically activates user-selected output control points to alert external personnel.
� If alarms are not acknowledged in a user-defined time period (regardless of other system activity), the deadman timer can generate an alarm and set an output control point to a preconfigured state.
� The deadman timer can generate periodic alarms (regardless of normal system activity) to ensure the operator has alarms to acknowledge. The generated alarms ensure operator activity and safety.
Operator Security
XSM offers sophisticated methods for controlling access to sensitive data. Each operator password consists of an alphanumeric string
between 5 and 6 characters. Operators can change their own passwords at any time. New passwords can not be the same as any previous
passwords used in the past three months. All XSM passwords are encrypted when stored and transferred.
Areas
All data in the system can be partitioned into areas such as different locations or tenancies in a building. Each XSM area includes a logical set of points, cards, reports, and displays. Each operator can be assigned the capability to view, monitor, and control those points within designated areas. Operators do not view or access inapplicable data from other parts of the system.
Operator Sign-On
Each operator has a unique identification and password which defines their security profile once successfully signed on to the system. After a
series of unsuccessful sign-on attempts at an operator station, the operator interface becomes locked for a configurable amount of time.
Sign-on capability for individual operators can be restricted to only certain operator stations and certain times. XSM assigns operators either single or multi-user passwords. Single user passwords enable the operator to sign-on to only a single operator station at one time. Multi-user passwords enable an operator to simultaneously access more than one operator station. Typically multi-user passwords are reserved for operators with high security access level.
It is possible for an operator to indicate they are signing on under duress. On recognition of the situation, XSM issues a control to alert appropriate personnel and to request assistance.
Control Levels
All output modes of physical and software outputs can be activated manually or automatically by time or event initiated programs, by guard
tours, and by the deadman timer. XSM incorporates control levels to limit manual control of doors, locks, or sensors. Only operators with
appropriate control levels can issue manual keyboard commands to these points.
Security Levels
XSM restricts editing of data fields and activating certain operations by operator security levels. The system supports six levels of operator
security with capabilities as follows:
Command Assignment
Control of field devices can be restricted to individual states of an output, such as locking a door but not unlocking it. Operators can be assigned a set of commands for each assigned area. These commands can be mapped against the output state of any given digital point in an area to determine whether a control command is permissible for a particular operator.
Historical Data Collection
Excel Security Manger can continuously collect and store analog and status point process variables as historical data. XSM supports
standard, extended, and fast history. Standard history data consists of a value snapshot taken at a specified interval and various averages of
this snapshot representing the average value over longer periods of time. Extended and fast history data are a series of snapshots.
Standard History is:
� 1 minute snapshots
� 6 minute averages
� 1 hour averages
� 8 hour averages
� 24 hour averages
Extended History is:
� 1 hour snapshots
� 8 hour snapshots
� 24 hour snapshots
Fast History is:
� 5 second snapshots.
The historical data can be retrieved by trend sets, operating groups, user-built schematics, point detail trends, and point detail numeric history displays. Historical data can also be used in reports, application programs, or archived to off-line media for long term storage.
Operators can review history either in real-time or with an historical offset. Data in the history file can be selected by scrolling backwards/ forwards through the data.
Trend set displays are available to show historical data in the following formats:
For each trend set display, an operator can configure the number of historical samples and ranges. Points configured in trend sets shall be changeable on-line. Operators can zoom in on trend set displays for closer inspection. Scroll bars allow an operator to move the trend set backwards and forwards across the historical records.
Reporting
Excel Security Manager provides comprehensive reporting facilities including a range of standard reports, the ability to create custom reports in a user-selected tool, and the ability to export and import information from other systems.
To provide the most commonly requested security information, Excel Security manager provides a range of standard reports shown in the table that follows.
Excel Security Manager provides open database connectivity (ODBC) access to sections of its database from any ODBC compliant tool. This enables the user to create reports with a tool such as Microsoft Access or Crystal Reports based on data in Excel Security Manager. Custom reports allows the user to produce a single report by combining information from other parts of the business organization with security information such as:
� Access Level Information: Lists zones and time periods which make up an access level.
� Time Period Information: Lists days and times which make up a time period.
� Zone Information: Lists doors which make up a zone.
� Access to Zone: Lists all card holders who have access to a zone or door.
� Zones Accessible: Lists all zones which a card holder can access.
� Card Details: Lists information about all card holders.
� Alarm Event: Searches and queries the event log.
Excel Security Manager also provides a facility to export card holder and configuration information in a standard ASCII CSV format for import into another system. Information can also be imported into the XSM database. Coordination of overall system information can reduce data entry requirements and ensures data consistency.
All standard reports can be generated on demand from the reporting subsystem or from a custom graphic. Also the reports can be scheduled to periodically active or can be initiated by event. A report detail display defines the report name, automatic scheduling information, and the output destination (printer, operator station, or internal file).
Report |
Description |
Access Data |
Contains card related details in an ASCII format ready to be exported from XSM into a third party database package. It is also possible to import ASCII files into XSM to update the system from information from other third party database systems. The following parameters can be configured for import or export in the report:
To reduce duplication and report file size, the operator can choose to only include cards that have been modified since a particular date. It is also possible to configure the report so that after an import operation, a download to the field devices occurs automatically. |
Alarm Duration |
Calculates how long certain points have been in alarm. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. |
Alarm Event |
Summary of all events of a specified type for selected points occurring in a time period. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. This report can also summarize all changes made by a specific operator. |
Card List |
List card details for cards corresponding to specified search criteria based on any card holder field. The card details can be specified as a range, as matching, or partial matching. Operators can specify which details are part of the search criteria and which details are to output in the report. |
Card Usage |
Calculates the total number of access movements (including no movements ) for card holders over a given period of time. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. The report provides the ability to search by card holder field. |
Door History |
Lists all card holders that accessed any specified door or group of doors within a specified time period. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. The report contains the date, time, and card holder for each access occurrence. |
Group Card Trail |
Lists all doors accessed by an individual or group of card holders during a specified time period. Operators specify card holder search criteria. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. The report contains the date and time of access and the point identifier of each accessed door. |
Point Attribute |
Lists all points specified by one of the following attributes:
|
Point Change |
Calculates the total number of changes of state (including none) for specified points over a given time period. The time period can be specified as an absolute starting and ending date and time or as a period of time relative to the current time. |
Point Cross |
Lists the following information for user selected points:
|
Occupancy |
Lists card holders in a specified area at that time. Operators specify card holder search criteria. Also, the operator specifies the area by listing the door entrances for both the in and out directions. |
® U.S. Registered Trademark |
74-2875 |