Pin Codes - The N Command; Controlling Access - Bosch K2200 Series User Manual

Readykey controllers
Table of Contents

Advertisement

K2200 Series | User Guide | 4.0
7. At this point, you can use the up and down
arrow keys to move through the database to find
the key you want to delete. You can also press
the FastFind (*) button to return to the ID
prompt.
WHO SMITH AB
8. Once you have selected the key you want to edit,
press [ENT].
9. You can change the access code by typing the
new value and pressing [ENT].
ID 27
AC 7
Press [NXT] to go to the next field.
10. If using the 12-character ID only, you can enter a
new name. Either type over the existing name or
press [CLR] to clear the field before typing a new
name.
WHO SMITH AB
Press [ENT] when you have finished.
Press [NXT] to go to the next field.
11. You can enter a holiday profile. Enter a value
between 0 and 24 and press ENT.
ID 27
HOLS 0
12. Either press [ESC] to return to the CMD prompt,
or use the up and down arrow keys, or FastFind
(*) button to search for another key to edit.
When a key has been edited, the changes to access
code and/or holiday profiles will be observed by all
the readers in the system. This will not be the case if:
Slave door controllers are disconnected or not
communicating with the master.
A download is in progress to a slave door
controller, in which case the new information
will not reach the slave until completion of the
download.
4.1.5
PIN Codes – The N Command
You may have a special type of Readykey reader on
your system that requires a Personal Identification
Number (PIN) to be entered in addition to a key
being presented. Readykey PIN readers work by
calculating a 4-digit (0000-9999) number from the
unique token code embedded in the Readykey key.
The keyholder must then enter this PIN code
correctly before the key will be allowed access by the
door controller.
An additional feature of the door controllers is that
they allow a time profile (see Section 4.2.5 Time
Profiles) to control when a reader requires a PIN with
the key or just the key:
When the time profile is active, the PIN reader
operates like a conventional key reader,
requiring no PIN.
When the time profile is inactive, a key plus the
PIN is required to gain access.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
Key Administration/ Access Control
This feature must be set using the Doors (D)
command, although the time profile is set using the
Time Profile (T) and Time Periods (PR) commands
PIN Reader Duress
Another feature of the PIN reader is the ability to
generate a duress alarm. If a keyholder is being
forced to open a door, by adding one to their PIN,
the door will open as normal. However, a duress
alarm will be reported at the master controller.
Example
If a keyholder has a PIN of 1234 and they enter 1235
(PIN plus 1), the door will open as normal but a
duress alarm will be generated. You should add one
to the code numerically, e.g. a PIN of 1239 gives
1240 as the duress code.
How to Find a Key's PIN
N Command
To find out the PIN of any Readykey key (it does not
have to be in the database):
1. Present an editor key to the faceplate reader.
2. Enter the password and press [ENT], if required.
Note:
The editor key must have an editor level that allows the
viewing of PIN codes.
3. You will now see the CMD prompt.
4. Type [N] and press [ENT].
CMD N_
5. Present a key to the faceplate reader.
* PRESENT KEY *
6. The 4-digit PIN will be displayed for about 2
seconds.
PIN NO IS
7. Either present other keys to determine their PIN
codes, or press [ESC] to return to the CMD
prompt.
4.2

Controlling Access

This section describes how you control the access of
individual keyholders. This is achieved by assigning
each keyholder an access code. This code is created
by combining access levels (where a person has
access) and time profiles (when a person has
access).
An additional feature allows you to apply a holiday
profile to a keyholder. This is a range of dates
during which they will be denied access at times their
access code would normally allow.
1234
EN | 20

Advertisement

Table of Contents
loading

Table of Contents