broken image
Onity Ht24 Lock Manual
Onity Safe Manual Free
Onity sells Cleaning Cards, which are felt cards with a cleaning solution applied to them. To use them, simply insert and remove the card several times in each lock. Page 132 Daylight Savings Time. The PP tests the batteries and the electronic switches in the lock. When testing an Onity HTCombo safe, the PP is also used to test the keypad. Featuring a unique design, Onitys new drawer safe can easily be hidden in a desk or side table. Ubigate Ibg1000 Manual there. Large enough to accommodate a 15 laptop, this safe provides additional protection for your guests valuables and peace of mind. Also known as Fail safe keys. HT RFID - Onity User manual instruction guide for RFID TRANSMITTER HTRFIDMFR01 Onity, Inc. Setup instructions, pairing guide, and how to reset. User manual instruction Page 5/7. Download File PDF Onity Ht22 Manual guide for RFID TRANSMITTER.
Dieter Gollmann Wiley.Computer.Security.3rd.Edition. Dieter-gollmann-computer-security-third-edition 1/2 Downloaded from carecard.andymohr.com on November 28, 2020 by guest Download Dieter Gollmann Computer Security Third Edition Getting the books dieter gollmann computer security third edition now is not type of inspiring means. Computer Security 3rd Edition pdf pdf. Computer security / Dieter Gollmann. Includes bibliographical references and index. ISBN 978-0-470-74115-3 (pbk.). This third edition ofComputer Securityreects this development by including new material on web security. The reader must note that this is still an active area. DownloadComputer security 3rd edition dieter gollmann pdf. Free Pdf Download Having great difficulty with everything running slower and things crashing. Skypbx provides you with the use of skype, fxo, fxs, gsm and interface router. Computer security 3rd edition dieter gollmann pdf. Pdf edition dieter gollmann Computer security 3rd. DownloadComputer security 3rd edition dieter gollmann pdf. Free Pdf Download Having great difficulty with everything running slower and things crashing. Skypbx provides you with the use of skype, fxo, fxs, gsm and interface router. Computer security 3rd edition dieter gollmann pdf.
SleepyHead Test Build for Mac OS X Breathe Jimbo. This should run on both Snow Leopard and Lion. However, it appears that you need a Mac new enough to run. Yup I downloaded and can run it on my mac with Lion; I was also able to build 0.8.2 with QT on this machine. Posts: 17282. Sleepyhead test build for mac. SleepyHead is a free, cross-platform, open-source research tool for exploring data produced by CPAP machines, and related equipment, which are used in the treatment of sleep apnea and other sleep disorders. SleepyHead supports data capable CPAP machine models from the following series: ResMed S9, Philips Respirioncs System One, Fisher & Paykel. 1
HT24W / HT28 Smart Technical Manual Version 2.x
Release, 10/2002
Contents Hardware...................................................1 Communications Windows Distributor H2XCMDIW.............................1 Description.......................................................1 Connections......................................................1 Specifications.....................................................2 Special Windows Distributor Uses....................................2 Portable Programmer......................................................3 Description.......................................................3 Connections......................................................4 Maintenance......................................................4 Specifications.....................................................5 Gemplus GemPC410 External Smart Card Encoder.............................5 Description.......................................................5 Connections......................................................5 Specifications.....................................................6 Online Revalidator........................................................6 Description.......................................................6 Connections......................................................6 Specifications.....................................................7 HTCOMBO Safe.........................................................8 Operation........................................................8
HT28 Lockset...............................................9 Description..............................................................9 Light Indications.........................................................10 Lock States.............................................................10 Office Mode.....................................................10 Standard Mode...................................................10 Privacy Mode....................................................10 Modes of Operation......................................................11 Normal Guest Room Mode.........................................11 Foyer ..........................................................11 Selective .......................................................11 Maintenance............................................................11 Diagnosis.......................................................11 Debris in the Reader...............................................11 Cleaning the Reader...............................................11 Cleaning the Lock Body...........................................12 Specifications...........................................................12
HT24W / HT28 Smart Technical Information.....................13 General Description......................................................13 Differences Between HT24DOS and HT24W/HT28 Smart (v2.x)..................13 File Descriptions.........................................................14 OnityHT28..................................................14 OnityHT28Data..............................................15 OnityHT28LocalDir..........................................16
i
Contents
System Limits...........................................................16 Creating Locking Plans...................................................17 General.........................................................18 Configuration....................................................18 Lock Hardware Configuration.......................................23 Calendar........................................................24 Time Tables.....................................................25 Masters.........................................................26 Locks..........................................................27 Keying .........................................................30 Peripherals......................................................33 Cards..........................................................35 Flags...........................................................37 PMS Interface...........................................................41 TCP/IP.........................................................41 HTCOM Device Communication............................................41 IPCOM Device Communication............................................41 Software Tools..........................................................42 Data Menu Restore Tables........................................42 Data Menu Test Database Integrity.................................42 Data Menu Pack Tables..........................................42 Restore Codes...................................................43 Restore Backup..................................................43 Load HT22......................................................43 Parameters for Special Configurations........................................44 /D directory name.................................................44 /Snumber.......................................................44 /NOVERIFY....................................................44 /REVALIDATOR................................................44 /NOREVAL.....................................................44
ii
Contents
Hardware
Communications Windows Distributor H2XCMDIW Description The H2XCMDIW Win Dist is used to convert standard RS232 (19200 baud) from a PC to the proprietary Onity HTCOM RS485 network of devices. The unit is powered by an external 12VDC transformer and has three (3) LED indicators. The LED labeled POWER is lit whenever the unit is powered. The LED labeled IN flashes when a packet of information is received from the PC. The LED labeled OUT flashes whenever an HTCOM packet is received from a Onity device.
Connections
1
Hardware
1. 12VDC Power Input
6. DB9F HTCOM connector for PP cable
2. DB9M RS232 input from PC
7. HTCOM indicator
3. Terminal connector for repeater
8. RS232 indicator
4. DB9F HTCOM cable connector
9. Power indicator
5. Terminal connector for wall readers, etc.
To the PC The PC is connected to the rear of the Communications Distributor using a standard NULL Modem cable. Unlike previous Onity communications distributors, the Windows distributor communicates at 19200 baud using standard RS232. This connection is usually to the PC, but we can use the standard protocol to our advantage to use other devices to extend the HTCOM network in ways that were never possible before.
To the HTCOM Network Onity HTCOM devices can be connected with standard HTCOM cables to the Win Distributor through either of the female DB9 connectors. Devices, such as wall readers, that require a twowire HTCOM connection must connect to the AB connector on the rear of the unit. If you need to make your own cable with DB9 connector, use A to pin 3 and B to pin 2. Also on the rear of the unit is a 5 conductor terminal connection for a repeater. There is no new repeater required for the HT24W / HT28 Smart system, as the existing HT24 repeater works on both HT24DOS and HT24W / HT28 Smart systems. The HTCOM network uses a proprietary adaptation of the RS485 communications protocol. This 9600 baud communications protocol cannot be retransmitted or converted by any known, off-the-shelf device. This means that the HTCOM network can only exist with proper wiring and within the 4500 foot distance limit. This distance may be increased by using special equipment such as repeaters.
Specifications Display: Three (3) red LEDs. Case Material: Black ABS. Dimensions: 2' x 6' x 6 1/4'. Weight: 1.0 lb. Operating Voltage:12 volts DC.
Special Windows Distributor Uses Because the Windows distributor can convert the proprietary HTCOM protocol to standard RS232, there is enough flexibility to solve almost any Onity network problem. Hardware 2
There are many devices on the market today to convert RS232 to Ethernet. This means that a string of Onity encoders can be placed at a remote check-in point using an existing LAN or WAN. This solution is an expensive one, but is solves a problem that previously could not be solved. The diagram below is a real example of using protocol conversion to accomplish a networking challenge. In this example, the property had two buildings separated by a great distance and the only existing link between buildings was over fiber optic cable. The Onity server was connected to the PMS server in the computer room. A local encoder is connected to encode master cards. The other encoders are at the front desk in another building. The property had the necessary equipment to transfer RS232 over the fiber, so Onity simply used the existing equipment.
Portable Programmer Description The Onity Portable Programmer is used to transfer data between the main computer and the electronic locks.
3
Hardware
1. Connection to Onity Locks 2. Connection to PC
Connections To the Lock Connect the Portable Programmer (PP) to a lock or offline reader by inserting the PP plug into the jack on the bottom of the lock or reader. Turn the programmer on, and use the menu button to select an option. If required, use the cursors to select the proper door information from the list, and press the TX key to initiate communications.
To the Computer Connect the Portable Programmer (PP) to the computer using the 9-pin connector on the top of the PP and a standard Onity HTCOM cable. This cable may be plugged directly into the PP connector on the front of the Onity Communications Distributor.
Maintenance The only maintenance required on the Portable Programmer is changing the batteries when they are low. The PP uses four (4) AA alkaline batteries. The batteries will last for 50 hours of operation. To extend battery life, the PP will
Hardware 4
automatically turn itself off after 30 seconds of inactivity. When the batteries are removed from the PP, the PP will lose all of the information recorded in its memory. Simply reload the PP from the computer to begin normal operation. The battery compartment is located on the back of the PP. Slide the battery cover up to expose the batteries for maintenance. Be sure to insert the batteries in the correct polarity. Polarity markings can be found at each battery position.
Specifications User Interface: Membrane keypad. Display: 2 x 16 character LCD. Case Material: Black ABS. Dimensions: 7-1/2 x 4 x 1-7/8. Weight: .70 lb. without batteries; .92 lb. with batteries. Operating Voltage: 6VDC supplied by 4 AA Alkaline batteries. Memory Capacity: 128K RAM available for storage of data.
Gemplus GemPC410 External Smart Card Encoder Description The Gemplus GemPC410 External smart card Encoder is used to read and write information to the smart cards used in the Onity HT28 Smart System. The green LED on the top of the unit is the only indication used by the GEMPC410. The LED flashes every second when powered and is lit continually until the card is removed after a read/write operation.
Connections The GemPC410 encoder is connected to the PC/PMS - RS232 connector on the rear of an HT22i encoder. The encoder controls the Onity HTCOM communication with the PC and monitors the status of the Gemplus encoder. A 5VDC power connection is required to operate the GemPC410 encoder. It has a PS/2 connector for this purpose.
5
Hardware
Specifications Display: One (1) green LED Case Material: White ABS with detachable base Dimensions: 3-1/2 x 3-1/2 x 5/8 Weight: .30 lb. Operating Voltage: 5VDC MAX
Online Revalidator Description The Online Revalidator provides a way to securely manage staff cards. Each staff card holder can be required to 'recharge' his or her key at a management defined interval by using the Online Revalidator. The Online Revalidator comes in either a Magnetic Stripe version or a Smart Card version.
Connections The operating component of the Online Revalidator is an HT22i encoder. This encoder will either have the magnetic stripe card reader/writer or be modified to hold a Gemplus GEMPC410 smart card reader/writer. Regardless of the type of encoding device, the connections to the HTCOM network are the same. This HTCOM connection is made by connecting 18/2 Shielded Cable to the AB connection of the HT22i. (See 2 in diagram below). This cable may need to be Plenum rated as well. Power is supplied by a 12VDC 1.2A power transformer. If using the smart card version, a separate 5VDC 1A power transformer must be added to power the smart reader/writer. This is connected in the same way the Gemplus External Smart Card Encoder power connection is made. (See previous section.) The Gemplus Smart Card DB9 connection is made to 3 in the diagram below.
Hardware 6
1. Not Used With This System
6. On/Off Switch
2. HTCOM Connection AB Format 7. Not Used With This System 3. RS232 Connection
8. HTCOM Connection
4. 12VDC Power Input
9. HTCOM Connection
5. Strain Relief
Specifications Display: Case Material: Dimensions: Mounted
7x20 character LCD Aluminum and Steel 14-5/16' x 9-9/16' x 4-1/2' - Surface
14-5/16' x 9-9/16' x 3-13/16' Flush Mounted Weight: 12.4 lb. Surface Mounted; 9.4 lb. Flush Mounted Operating Voltage:12VDC HT22i and 5VDC Gemplus Smart Card Encoder
7
Hardware
HTCOMBO Safe The Onity HTCOMBO guest room safe is designed to provide in room storage of guest valuables. The safe is designed to resist forced entry attacks using common hand tools. It is operated by a user selectable 4 digit code entered by each new user of the safe.
Operation Upon arrival at the hotel the guest receives a new room key. This key may contain an optional authorization that may be required to operate the safe. Upon arrival to the room the guest opens the door as usual. To operate the safe the guest inserts the room key into the safe reader. (The safe MUST be unlocked). Upon insertion of the card both the green and red LEDs illuminate. The guest should enter any random 4 digit code number. Both LEDs will flash rapidly for 1 second, then go out. The guest should close the door and enter the code again to confirm the code and lock the safe. To unlock the safe again, enter the code number. The guest card is not used to operate the safe; it is only used to program the code number for a new guest. Instructions for using the safe are provided in the form of a large cardboard card suitable for wall mounting and a decal affixed to the outside of the door of the safe. The card is provided in English, French, Spanish, and German. Should the guest arrive in the room and discover that the safe is locked, the guest card will not operate the safe. Under these conditions, the safe must be opened by management using either the safe master card or the Portable Programmer.
Hardware 8
HT28 Lockset
Description The Onity HT28 lock is stand-alone dual technology lock that can read smart cards and high or low coercivity magnetic stripe cards. The lock can open to as many as 250 different cards identifying each card individually in a 500 record audit trail.
9
1. Rear View
8. Battery Access Cover
2. Side View
9. Battery Access Cover Screw
3. Front View
10. Portable Programmer Connection
4. Privacy Indicator Connection
11. Mounting Posts
5. Clear Button
12. Spindle
6. Light Indicators
13. Escutcheon Screws
7. Card Insertion Slot
14. Back Cover Screws
HT28 Lockset
Light Indications To operate the guestroom lock, insert and remove the card. The LEDs located to the immediate left of the card slot will display one of the following indications:
Green Light Valid Opening. Operate the handle to gain access to the room. Note: For Smart Cards, if the lock is configured not to open until the card is removed, the lock will read the card and the green light will blink slowly until the card is removed.
Red Light Invalid Attempt. Card may have expired, been voided by a new guest card, or may be for a different room.
Alternating Red and Green Lights Privacy indication or card out of shift.
Flashing Red Light Blocked.
Flashing Green Light Office Mode.
Delayed Red Light (Illuminates six seconds after card insertion) Card not encoded or incorrectly inserted.
Green Light with Flashing Red Light Low battery indication.
Flashing Green and Red Lights This is the indication when using a canceling card.
Lock States Office Mode The lock can enter Office Mode (free passage no card required) automatically at scheduled times or by inserting an authorized card twice in immediate succession. The act of inserting the card twice is known as double dipping. When the card is removed from the lock following the second insertion the green light will flash indicating the mode change. The lock will remain in this mode until it is double dipped by another authorized card, or it is scheduled to automatically relock.
Standard Mode This is the normal operation of the lock. An authorized card that is not yet expired and is within its shift can unlock the door.
Privacy Mode If the privacy indicator on the inside of the lock is activated, only certain cards with a special Privacy Override attribute can unlock the door. Cards without this attribute will invoke an alternating green and red light as described in the previous section.
HT24W / HT28 Smart Technical Information 10
Modes of Operation Normal Guest Room Mode The standard operation of an HT28 lock is normal guest room mode. In this mode, a single guest card code is allowed to enter along with any selected master cards. To gain access, the card must have the proper site code, the correct card code, any applicable authorization, within the activation and expiration date.
Foyer A foyer lock does not keep an audit trail or card codes. To gain access, the card must have the proper site code, any applicable authorization, and within the activation and expiration date.
Selective The selective lock is a combination of corridor and back-ofhouse locks found in HT24DOS systems. Essentially, a selective lock is a freely keyable lock that can accept as many as 250 users with an audit trail, or 500 users without. Guest room keys and staff cards can be set to have access in the locking plan. To gain access, the card must have the proper site code, the correct card code, any applicable authorization, within the activation and expiration date. Note: You can encode cards and make copies and one-shot cards for a selective lock.
Maintenance Diagnosis The TEST function of the portable programmer should be used to properly diagnose any Onity lock. This test will check the functionality of the privacy and card detection switches and the battery level. If an invalid card is inserted, the PP will display the reason for the denial.
Debris in the Reader If small debris should be inserted into the card slot it will most likely fall through the insertion path into a collection area. However, if this collection area becomes full of debris and the card insertion path is blocked, the reader can be easily disassembled. Remove the four screws labeled 13 in the diagram above to remove the reader cover and clean out the collection area.
Cleaning the Reader Over time, poor quality cards, dust, salt and other elements build up and may cause the magnetic read head or the smart
11
HT28 Lockset
card contacts in the lock to read poorly. In extreme cases, there can be a noticeable loss in performance. The problem can easily be solved by using reader cleaning cards. Cleaning the readers once or twice per year will prevent this build up in most cases.
Cleaning the Lock Body The only safe and effective way to clean the body of the lock is with a wet cloth. The use of solvents, thinners, polishes or abrasive materials on the lock will damage the finish. Some Onity locks undergo a varnishing process over the finish that will be severely damaged by products mentioned above.
Specifications Display: One (1) green LED, One (1) red LED Dimensions: 11-1/8 x 2-3/4 x 2 Weight: 6.5 lb. Operating Voltage: 6VDC supplied by 4 AA Alkaline batteries. Operating Temperature: -40 - 167 F Humidity: Up to 95 without condensation
HT24W / HT28 Smart Technical Information 12
HT24W / HT28 Smart Technical Information
General Description HT24W / HT28 Smart is the first Windows based hotel management software from Onity. The features of the system are largely the same as HT24DOS with a few additions made possible by the power of modern software and hardware. This manual will not assume any prior knowledge of the HT24DOS system. HT28 Smart can be used with HT24 locks and magnetic cards or the new HT28 locks which can read magnetic and a variety of smart cards.
Differences Between HT24DOS and HT24W/HT28 Smart (v2.x) HT24W / HT28 Smart adds a few new features to the hotel management system. The following list highlights the major enhancements. This is used as reference only and may not be a complete list.
The ability to use smart cards as well as magnetic cards HT28 locks only. The smart cards can maintain a record of locks that have granted access to the card.
Loading of Daylight Savings Time information into the locks.
Three day types HT22 has this feature.
Multi-tasking communications Load the portable programmer without interrupting PMS or other activity.
IPCOM communications network allows workstation PCs to control multiple encoders or other devices.
HT24W / HT28 Smart Technical Information 13
File Descriptions HT24W / HT28 Smart is written in Delphi and uses relational Paradox database tables. This combination provides a robust platform with an established history. Because the tables are relational, any changes to one table may affect others. Be aware of this when deleting or copying files. Paradox databases have the file extension .db and require an index file with the extension .px. If the index files are missing, HT24W / HT28 Smart will require the tools program to recreate the indexes. The following is a list of files, their location, and some general comments about their purpose.
OnityHT28
HT28.exe this is the primary executable file for the software. This program includes the user software and the system build/modification software.
Tools.exe this executable provides tools that can diagnose and fix corrupted files.
_isreg32.dll this library is used by HT28.exe
tutil32.dll this library provides utilities specifically for the software to operate with other Onity equipment.
HT28.bmp This bitmap file is displayed while the software loads and checks the status of the database tables.
Mensa.db/px this database contains all of the messages displayed in the program. Includes any loaded languages.
Ht28.cnt this file is the contents of the on-line help system.
Ht28.hlp this on-line help file contains all of the information provided in the users manual.
_deisreg.isr required file used by Delphi
DeIsL1.isu required file used by Delphi
Messages.xx this file is a plain text file that contains all of the messages displayed in the software. One of these files is required for each language used. The file extension is used to identify the language.
Returns.txt, Support.txt, Sales.txt this is a plain text file used by the English on-line help file that provides the proper contact information for the end user. This file must be changed to reflect the proper contact information for the customer.
HT24W / HT28 Smart Technical Information 14
OnityHT28Data
Auditor.db/px contains the system audit records
Calendar.db/px contains the day types and holidays for all years established during system build
Configur.db/.px contains information about the site, such as system code, authorization names, etc.
Confreva.db/px contains the parameters for the Emergency mode of the revalidator
Group.db/.px contains the current list of groups
Grrooms.db/.px contains the list of rooms assigned to the current groups
Keying.db/.px contains the access list for each lock
Levels.db/.px contains the PIN level required to access each menu item
Lockaux.db/.px contains the related locks information
Locks.db/.px contains the list of locks defined during system build
Locktype.db/.px contains the list of all defined hardware types
Masters.db/.px contains the list of assigned master cards
Mastuser.db/.px contains the list of master users established by the customer
Network.db/.px contains information about the PC workstations
Newcod.db/.px contains information about new codes for the encoders
Operator.db/.px contains the list of operators and related information
Perifs.db/.px contains the list of peripherals defined during system build
Planperi.db/.px contains the access list for any online devices including readers and identifiers
Semaphor.db/.px contains data used to prevent the modification of some databases by different users at the same time
Shifts.db/.px contains the list of shifts and automatic changes defined for each day type and time table
System.db/.px contains data used internally to track available codes
HT24W / HT28 Smart Technical Information 15
Timechan.db/.px contains the dates of Daylight Savings Time changes established during system build
Timetabl.db/.px contains the list of timetable names
Flags.ht2 this ASCII text file contains all of the flags to customize the features of the system
Pdoxusrs.net used by the database engine to maintain control of the databases
*.x*, *.y* - index files used by the database engine to manage the data more quickly.
OnityHT28LocalDir The localdir folder contains information about the PC that is used in network systems. This information is used by the local PC and the server to keep control of the database tables when there are multiple users. Do not try to manipulate these files in doing so you could cause irreparable damage to the Onity databases.
System Limits The following is a list of limits of the HT24W / HT28 Smart system and the HT28 locks. Audits (HT28 lock)
500/00
With 250 users or less, the HT28 can store 500 audits. With over 250 users no audits are stored.
Audits (HT24 lock)
100
With 15 users, 15 audits with 100 users
Authorizations
8
Used to access amenities such as concierge floors, pool, elevators, etc. These amenities require the authorization to be encoded on the card, in addition, the card must be authorized and within the activation and expiration period.
Automatic Lock/Unlock
Yes
8 automatic changes per day
Day Types
3
Automatic changes and shifts can be set to behave differently according to 3 day types.
Daylight Savings Time
Yes
HT24 and HT28 locks will automatically adjust to one DST change. The lock must be loaded 2 times each year to maintain the correct date of the next DST change.
Dial Up Support
Yes
Through pcAnywhere
Encoded Track
1,2,3
Locks read track 3. Motorized encoders can encode tracks 1 and 2
HT24W / HT28 Smart Technical Information 16
for other purposes Expiration Date
Yes
Selectable at time of encoding
Expiration Time
Yes
Selectable at time of encoding
Group preencoding
Yes
Selective lock limit
None
Initial Date/Time
Yes
Selectable at time on encoding
Master Types per Lock
Up to 250
The HT28 lock can accept up to 250 master types. Note: Loading more than 15 masters into each lock requires more memory and reduces the number of locks a PP can store.
Max. System Audit
200,00 0
Selectable at time of setup. Default is 90 days.
Max. Locks
6000
Up to 10,000 with software revision
Max. Operators
No Limit
Multiple Cards
Yes
Off-line wall readers
Yes
On-line wall readers
Yes
Passwords
8 char
PMS Interface
Yes
3 room max for insertion mag-stripe encoders. 4 room max with motorized or smart card.
1200-19,200 baud through RS232 serial Also available through Ethernet using TCP/IP Note: Protocol packets are the same regardless of connection type.
Power Back-up
UPS
Suites
Yes
Safes
HT Combo
Temporary Masters
None
Time Shifts
8
Time Tables
200
Creating Locking Plans Creating locking plans in the HT24W / HT28 Smart system is very similar to previous Onity systems. However, this manual HT24W / HT28 Smart Technical Information 17
will provide enough information that a technician with no experience with other Onity systems will be able to prepare a locking plan. When appropriate, references will be made to other systems so that experienced users will have direct explanation of the differences and enhancements of HT24W / HT28 Smart.
General In the HT24W / HT28 Smart System, locking plan and other modifications are accomplished through a built-in, hidden area of the software. This hidden area is only accessible with a level 9 password or the maintenance password the MODIfication menu opens this portion of the software. The level 9 password does not have complete access to all data, such as site code, but is allowed to make general locking plan changes. Because of the ability to completely change the system, any and all PC workstations must be out of the software in order to enter the MODIfications menu. If workstations are running the software and a user tries to enter the MODIfications menu, a message will appear stating that the databases could not be opened in exclusive mode. The modification screen is menu driven in a fashion similar to MODI2 for HT24DOS systems. Some screens have multiple views which can be accessed through a tabbed form. Each view will be discussed thoroughly below.
Configuration The configuration screen is where the most basic information is entered. This information includes such data as the site name, site code, authorization labels, emphasized authorization assignments, etc. This screen is divided into 3 tabs, general ,options and technologies.
HT24W / HT28 Smart Technical Information 18
General Tab
Date Last Edit shows the date of the last modification to the locking plan files.
Edition shows the number of modifications that have been made to the locking plan.
Hotel Name defines the name of the property. This information is not displayed, but is important for maintaining the system.
Address defines the address of the property. This information is not displayed, but is important for maintaining the system.
System Code uniquely identifies each property and prevents cards from other properties from opening the locks.
Onity Maintenance password that allows Onity technicians to make modifications and have access to all features and functions of the software.
Maximum number of codes per lock defines the largest number of general master types and individual master users allowed through the lock. With HT24 locks, this number is 15 (see System Limits on page 16). With HT28 locks, this number is 250. Be aware that increasing HT24W / HT28 Smart Technical Information
19
this number may use memory otherwise used for keeping audit records. The number of locks that can be loaded into a Portable Programmer depends on the number of masters in each lock. Do not make this number any larger than is absolutely necessary.
Application language the default language for MODIfications screens and when the software is entered with the maintenance password.
Authorizations up to 8 auxiliary privileges can be granted with authorizations. Locks may require specific authorizations to allow access.
Description displayed on new guest and guest copy screens to allow the operator to select the privileges to grant
Emphasized records are kept of the 'sale' of each emphasized authorization. The record includes the operator, date of transaction, number of days on the card and authorization number. If guests check out early, a negative entry is made in this record.
Options Tab
HT24W / HT28 Smart Technical Information 20
Dates in USA format (month, day) selects whether dates are in US (month/day) or European (day/month) format.
Lock's custom fields These fields can hold information like building number, lock finish, location, floor, etc. The information can only be seen from the MODIfication screens.
Dates
Note: In versions 1.x of the software, Groups cannot have a start date unless the Use Initial Date box is checked
Use Initial Date selects if and how an initial date is used when encoding cards.
Check-In hour initial time starts at the top of the hour before that card was encoded. Example, encoded at 8:15, Start time = 8:00
Specific Hour all cards start at the time indicated in the default box
Initial by default the time cards will begin to work if the specific time option is selected
Expiration Date
Disabled no expiration dates are used in this system
Enabled expiration dates are allowed, but not required
Obligatory expiration dates are required on all cards
Expiration Time the default time that the card will expire
Number of Nights the default duration of the card
HT24W / HT28 Smart Technical Information 21
Technology Tab
Check the box for any card technology that will be used in the system. If you select the Chip option there are some important details that must be set on the Cards menu. The Cards menu does not appear if the system is mag-stripe only.
HT24W / HT28 Smart Technical Information 22
Lock Hardware Configuration
Lock Hardware identification of this type. The ID is used in the lock list to identify the hardware.
Name of lock description of the hardware type
Opening Delay the number of seconds the lock will remain open after a valid card is used
Opening only on withdrawn card the lock will unlock only after a valid card is removed from the card slot. This prevents a guest from accidentally leaving a card in the lock.
Close when lever released the lock will automatically detect when the lever is used and lock itself. This prevents unauthorized users from following an authorized user through the door while it remains unlocked.
Guest card codes look ahead the number of future authorized codes the lock will recognize for any user. If a new key is made for a user, the lock recognizes the new code as being in its lookahead and the code is advanced. Group cards default to the lookahead to prevent group cards from locking out other guests.
Master card codes look ahead the number of future master card codes the lock will recognize for any master user.
Low battery indication to guests determines if low battery indications are shown to the guests.
HT24W / HT28 Smart Technical Information 23
Calendar
The calendar in HT24W / HT28 Smart consists of 3 day types. Day types affect the shifts and automatic changes of the locks. If the property is not using shifts or automatic changes, choose the option to make all days like work days. The calendar also sets the dates for Daylight Savings time. With this software, HT24 and HT28 locks are loaded with the date of the next DST change. This change will happen automatically on the appropriate day. This means that the locks must still be updated 2 times per year, but the update change does not need to be on the day of the DST change. The software will automatically establish the DST dates for each established year based on Windows settings.
Day of DST Forward - Select Day select a date on the calendar, then click the button to change the DST date.
Day of DST Backward - Select Day select a date on the calendar, then click the button to change the DST date.
Reset DST Dates clears all DST dates for the current year.
HT24W / HT28 Smart Technical Information 24
Time Tables
Timetables establish the hours that cardholders are allowed to enter certain doors as well as the possible automatic changes the lock can be programmed with. A guest can have only one shift number; but as this shift depends on the table, the access will change from one lock to another. Each cardholder can be assigned one of eight shifts (or no shift) and each door can be assigned to a timetable. The system can handle up to 200 different timetables.
HT24W / HT28 Smart Technical Information 25
Masters
The master cards list contains all of the master types that are available. A property can set up many master users that all use the same type. Master types can be set so that a certain minimum password level is required to encode a card. Each master type has a unique code that the lock must remember, and each card of that type is encoded with that code. An HT28 lock can hold codes for up to 250 master types in memory. HT24 locks can hold codes for only 15 master types in memory. (see System Limits on page 16)
HT24W / HT28 Smart Technical Information 26
Locks List of Doors
Type Mode of operation
R Room This is the standard operating mode with only one guest code accepted. New cards lock out old cards.
S Suite A Suite can be keyed to open to its own code and the codes of any sub-suites immediately following it in the rooms list . Each additional guest code takes a slot for one master card. All guest cards (Suite and sub-suite) are locked out if a new code is presented for any of the guest cards.
/ - Sub-Suite A sub-suite can be keyed to accept its own guest code and the code of the suite door immediately above it in the doors list. All guest cards (Suite and sub-suite) are locked out if a new code is presented for any of the guest cards.
? Foyer lock A foyer lock will open to any card with the proper site code, any required authorization, and within the activation and expiration dates. A Foyer lock does not record an audit trail.
* - Selective lock A selective lock will open to multiple guest and master cards. Each card is sequenced individually. Audits are kept for each valid entry if the number of users is within the masters limit -
HT24W / HT28 Smart Technical Information 27
15 for HT24 (see System Limits on page 16), 250 for CT20/HT28.
Room Number Up to 7 letters or numbers uniquely identifies the lock
Hardware type Defines the opening delay and other features that are set in the Hardware Types menu.
Timetable Defines the hours for each shift and the automatic changes. The Default is '0' no automatic changes, all shifts are 24 hrs.
Requested authorization The lock can require an authorization to open, in addition to the correct code. The default is '0' no authorization required.
Office Function A lock cannot go into office mode unless this feature is checked. When checked, an automatic change or a card with the office mode privilege is required to put a lock in office mode.
Programming card The programming/spare card system will only work in the lock if this feature is checked. Locks in non-guestroom locations are typically left with this feature unchecked.
Related Locks HTCombo safes operate off of the same code as the guestroom lock on the room. The safe is defined as a related lock for this room. This is only one example of a related lock.
Authorizations Some authorizations, like the authorization allowing the elevator to access a particular floor, should be automatically assigned when a guestroom card is encoded. Any automatic authorizations should be checked in this list.
Optional Authorizations Some authorizations, such as an in-room safe, are not given to each customer who occupies a guestroom. These optional authorizations can be assigned or denied at the time of check-in.
Shift This shift is automatically encoded on the guestroom card at the time of check-in. The default is '0' no shift.
Override Privacy This check box defines if a guestroom card will open the lock if the privacy switch is thrown from the inside.
Password level There may be some guestrooms that only certain
HT24W / HT28 Smart Technical Information 28
employees can check someone into. If the PIN or Password level is set to 1, any operator can encode the card. If the PIN is set to 5, only operators with password levels of 5 or higher can encode cards for this guestroom.
Related Locks
Related locks, such as HTCombo safes, operate with the same cards as the lock they relate to. The related lock can, however, have other parameters that are different from its lock.
Name This is the name of this type of related lock.
Hardware type Defines the door open time, lookahead, and other parameters.
Required Authorization The related lock can require a specific authorization to operate.
Related Timetable Related locks can automatically open and can define shifts based on the timetable selected.
Default Master Card This master must be previously declared in the masters list.
Programming card The spare card system will only function in a related lock if the option is selected on this screen.
HT24W / HT28 Smart Technical Information 29
Keying
To enter the keying plan for a room, highlight a room in the list and click Modify. You can select any room that appears in the selection screen. Red rooms are selected to have access to the room. To select a group of rooms, hold the left mouse button down and drag the mouse then press the SPACE bar. The list on the right of the main keying screen shows all of the rooms allowed trough this lock and the room total. Remember that locks cannot have more cards selected than the setting on the Configurations screen.
HT24W / HT28 Smart Technical Information 30
Successive The successive function ADDS ALL of the masters in the 'Copy' list to the keying for the selected rooms.
With the successive feature, you can easily copy the keying from one lock to another. All masters in the 'Copy' list will be copied. To remove a master from the 'Copy' list, highlight it and press the DELETE key. In the example above, EK, FM1, GM, and MM will all be ADDED to any existing keying for rooms 101-138. The existing keying for these rooms will not change.
HT24W / HT28 Smart Technical Information 31
Delete
The delete feature works in a similar fashion to the Successive feature. All of the masters in the 'Cards to delete' list will be removed from the keying of the selected rooms. To remove a master card from the 'Cards to be deleted' list, simply highlight the master card and press the DELETE key.
Selective
Many cards can be authorized to open a selective lock. You can use the Modify button to select individual locks from the list, but sometimes a range of cards need to be assigned to a lock. The Selective button allows you to select a beginning and end of a range of guestroom cards that should have access to this selective lock.
HT24W / HT28 Smart Technical Information 32
Peripherals
All online wall readers, revalidators, identifiers, and encoders must be declared in the peripherals list. With the IPCOM feature, peripherals can be connected to any workstation PC, but all devices must be declared in this list. Note: Declaring peripheral devices that are not connected to an HTCOM network will slow down the communications polling and may reduce system performance.
Name Applies to all Enter the name of the device Encoder 1, for example.
Peripheral Type Applies to all Choose the device type Reader Writer, Wall reader or Identifier
Automatically Collect Openings Applies to Readers and Identifiers Wall Readers and Identifiers can be programmed to send their openings to the system automatically, or to hold the openings until a report is requested. This feature will save time if more than one PC will be used to view the openings report.
Required Authorization Applies to Readers and Identifiers Identifiers and Wall Readers can be programmed only to accept cards in the locking plan and with a specific authorization. Set the required authorization on this screen.
HT24W / HT28 Smart Technical Information 33
Related Timetable Applied to Wall Readers Wall readers can be programmed to automatically open according to a timetable. The timetable also assigns the hours for the shifts. Set the time table on this screen. The default is '0', no timetable with 24 hour shift assignments.
One Door / Two Doors Applies to Wall Readers An online wall reader controller can be programmed to control two read heads. The two readers can control the same door with relay 1, or they can control 2 separate doors by using relays 1 and 2. Use this parameter to define if the controller will energize only relay 1 or both relays. Both readers are assigned with the same locking plan and other parameters.
Opening Delay Applies to Wall Readers Set the time that the relay is energized after a valid card is presented.
Open To Checked Out Cards Applies to Wall Readers Online wall readers get instant updates of checked out guests and canceled master users. There are some cases when checked out guests need to be granted access, such as exit gates from parking garages.
Anti-Passback Function Applies to Wallreaders Anti-passback means that a card can enter an opening only once without being used to exit through the same opening. This prevents a person from entering and then passing the card back to be used by another person. The Onity anti-passback feature can only be used with online readers set to two door operation. Also, the anti-passback logic applies to one controller only, meaning that if a card is used to enter through controller A and then leaves through controller B, the card will not be allowed through controller A again. Note: For life safety reasons, cards are always allowed through the exit reader.
Note: Dont forget to select the cards that may have access. In HT24 DOS they where activated by default !
Locking Plan Applies to Wall Readers and Identifiers Only the cards declared in the locking plan of the controller will be considered for access in the device. Required authorizations, shifts, etc are only checked after the card has been found in the access list of the device.
Auto-Logoff Applies to Identifiers only An Identifier can be set to operate only after a password has been entered. (The password is assigned through the Peripheral HT24W / HT28 Smart Technical Information 34
Diagnosis screen when the unit is addressed) The device can be programmed to return to the password screen after a period of inactivity.
Cards The cards menu is only available if chip cards are selected in the Technologies Tab. This screen is used to define smart card operating parameters for guest cards, master cards, and special cards.
Card Technology
The card technology tab is used to select the type of card used for guests, masters and special cards such as blocking and programming cards. There are three tabs at the bottom of the screen to make selections for each card type. Any technologies selected on the Configuration screen Technology tab are available on this screen. If you want the software to ask which card technology you would like to use each time you encode a card, select the last option 'Before Encode'. The default type is the one selected in the drop down list. Also, each type of card can be programmed to recover information from the locks. If the box on the right of the screen is checked, the smart cards will recover the information. However, you may be using smart cards for guests and you do not wish to recover audits. In this case, do not check the box.
HT24W / HT28 Smart Technical Information 35
Card Configuration
The Card Configuration tab applies to ALL card types guests, masters, and special cards. This field sets the size of the file on the card that is used to recover the information from the locks. Once this file is created on a new card, the file size cannot be changed, that is you cannot make a card recover more information than is required at the first encoding of the card. You can, however, establish a large file and instruct the card to retrieve only a few audits. This, of course, wastes valuable space on the card.
Infosmart File Size The infosmart file size must be calculated depending on the card capacity (in bytes). Below there is a picture with the different type of information stored in the smart card memory with the space occupied (approximately). The first 104 bytes are the size occupied by default; the different records have a size of 16 bytes (approximately).
Ex. For a card of 32kbits 32kbits=4kbytes 4kbytes=4096bytes
HT24W / HT28 Smart Technical Information 36
4096bytes-104bytes=3992bytes 3992bytes/16bytes per record
250 records
Flags
Flags are used in the software to configure or activate the parameters of certain features in the system. The flags are kept, in ASCII format, in a file called Flags.ht2 located in the HT28Data folder. The following is a description of all system flags and their parameters.
AUDITOR= x x = number of days to keep audits Example:
AUDITOR=7 audits more than 1 week old will be deleted
AUTOBACKUP= x x = path to backup directory Example:
AUTOBACKUP=C:OnityBACKUP
BACKUPTIME= x x = time (hour) of the backup in 24 hour format. There can be several instances of this line. Example:
BACKUPTIME=2 BACKUPTIME=8 BACKUPTIME=14 BACKUPTIME=20
GROUPJUMP= x x = the number of codes a group card will be ahead of the current card code. The number must be between 1 and 250. The default is one half of the guest code lookahead.
MASTERCOPY Allows the hotel to encode multiple copies of master cards HT24W / HT28 Smart Technical Information 37
MICROS Automatically places information on track 1 or 2 in the following format: ROOM NUMBER (not padded) EXPIRATION DATE (YYYYMMDD) This information can be used directly by the Micros POS system.
MULTIMASTER Allows the hotel to switch the locks between 3 master keying schemes, A, B, and C.
NOPADTRACK Instructs HT24W / HT28 Smart not to pad tracks 1 2 with insignificant characters after the encoded information. By default, the software will fill the track.
NUMSPARE= x Spare cards can be made in batches of identical cards so guests can have more than one card. The number x can be from 1 to 9. Example:
NUMSPARES=3
PINPADSAFE, x x = the number of hours a Safe Master card is valid. The Safe Master card can be used in conjunction with the guest room key to open PIN pad safes. The default is 3 hours. Example:
PINPADSAFE,1
PINPP Requires the hotel to enter a PIN for the PP when it is loaded.
PMS Enables PMS communication
PMSBUFFER If an encoder is busy and a new task is requested, this option activates a buffer so the tasks will be sent to the encoder after the previous task is finished. The maximum number of buffered messages is 4. After the 4th message is buffered a OV (overflow) error message will be sent to the PMS. Note: Requires display encoder.
PMSFILE Enables a record of all PMS transactions called AuditPMS.ht2
PPDAYS= x x = the number of days the PP will retain its data. After this period of time, the PP can not be used except to TEST. HT24W / HT28 Smart Technical Information 38
READCARD Allows HT20i encoders to read cards by pressing the READ button This flag has no affect on HT22I terminals.
REPEAT Instructs HT24W / HT28 Smart to automatically repeat PMS commands if there is an encoding error. Use this option when connected to a PMS that does not handle error messages. Note: Requires display encoder.
SEPARATOR= x x = a number from 33 to 254 indicating the ASCII value of the character that separates PMS fields. The default is x = 179.
TRACK1= x x = 1: allows users to place any valid information on track 1 -default = none x = 2: allows users to place any valid information on track 1 -default = pre-defined information x = 3: allows pre-defined information only on track 1 Pre-defined information defined below: ROOM NUMBER (padded with insignificant characters up to 7 characters) AUTHORIZATIONS EXPIRATION DATE (YYMMDDHH) Note: The rest of the magnetic stripe is padded with insignificant characters until the end. Note: If the MICROS command is in the file, the pre-defined information follows the Micros format.
TRACK2= x x = 1: allows users to place any valid information on track 2 -default = none x = 2: allows users to place any valid information on track 2 -default = pre-defined information x = 3: allows pre-defined information only on track 2 Pre-defined information defined below: ROOM NUMBER (padded with insignificant characters up to 7 characters) AUTHORIZATIONS EXPIRATION DATE (YYMMDDHH) Note: The rest of the magnetic stripe is padded with insignificant characters until the end. Note: If the MICROS command is in the file, the pre-defined information follows the Micros format.
HT24W / HT28 Smart Technical Information 39
USEIPCOM Enables the distributed Htcom system allowing PMS or terminal encoders to be connected to a workstation PC rather than the server.
HT24W / HT28 Smart Technical Information 40
PMS Interface The Property Management System interface specification for HT24W / HT28 Smart is the same as HT24DOS. The only additional feature offered by HT24W / HT28 Smart is the ability to interface over Ethernet rather than an RS232 serial connection. HT24W / HT28 Smart uses standard TCP/IP communication over the Ethernet. When connecting over Ethernet, the packets do not change. They all begin with STX and end with ETX and an LRC. These control characters are not truly necessary with TCP/IP, all of the data integrity checking is built in. But to remain consistent, the data packets remain the same.
TCP/IP TCP/IP is a standard Ethernet packet transfer protocol. Like RS232 serial communications, TCP/IP uses ports. However, for TCP/IP, ports are simply addresses identifying the sender and the receiver of the data packets. Some ports are reserved and should not be used. For example, port 80 is reserved for FTP transfers. In general, any port greater than 6000 should be available. HT24W / HT28 Smart defaults to port 6669. This is the port the software is 'listening' on. The PMS must know this port number in order to connect.
HTCOM Device Communication Onity devices, such as encoders, online wall readers and revalidators, are connected to the PC running the Onity software through a 2-wire network called HTCOM. This unique communications network is the backbone of many Onity installations. HTCOM operates at 9600 baud and is a 2-wire multi-drop RS485 using 9 bit data packets. The distance limitation of this daisychained network is 1500 meters or approximately 4500 feet. The end of the network should be terminated with a terminating resistor to prevent data echoes that disrupt communications. The Communications Distributor section of this manual contains some other useful information about HTCOM.
IPCOM Device Communication In previous systems, including HT28 version 1, all peripheral devices connect to a single PC through the HTCOM network. Workstation PCs allowed a connection to only one local encoder. A new feature is included in the HT24W / HT28 Smart version 2 software called IPCOM. This system allows multiple Onity PCs to have independent HTCOM networks with multiple peripherals. These peripherals can be PMS encoders, terminal encoders, online wall readers or revalidators.
HT24W / HT28 Smart Technical Information 41
All peripherals must be declared in the MODIfication screens, and each device is assigned a unique number. From each workstation a high level operator can claim and address any peripheral for that local HTCOM network. There is a new button in the peripheral diagnostics screen called Make it Local that is used to claim the peripheral. There is no difference in the way terminals or PMS encoders operate if they are on the HTCOM network of a server or a workstation. The software takes care of all of the message routing 'behind the scenes.'
Software Tools When HT24W / HT28 Smart is properly installed, TOOLS.EXE is also installed. Tools is used to diagnose and repair problems with locking plan databases.
Data Menu Restore Tables This menu option will check every database in the system for errors. If errors are found you will be asked if they should be repaired. This option checks tables independently for structural type file errors.
Data Menu Test Database Integrity Since the HT24W / HT28 Smart database is relational, tables interact with each other. This menu option tests the data in the tables to see that it corresponds properly with the other tables.
Data Menu Pack Tables Over time, database tables can have many holes where data has been deleted. Although these holes do not contain useful data, they do take up space. Packing the tables restructures
HT24W / HT28 Smart Technical Information 42
the files so that they contain only the useful data. This frees up memory that was being used by the 'holes'.
Restore Codes This option will recover the current codes from a motorized encoder. This may be useful if you need to rebuild the system after a catastrophic failure of the main Onity server and there is no recent backup of the files. This step is also done automatically when recovering from a backup.
Restore Backup If the server suffers a catastrophic failure of the hard drive or the data, the system can be recovered from a backup copy of the files. Tools will check the integrity of the backup and rebuild the files. Some data may be lost depending on what has happened since the last backup was made.
Load HT22 Tools can load hex files into an HT22I encoder. This is much faster than loading with the DOS HT21.exe software. The HT22 must be connected to the same serial port that the HTCOM network is on using a 9 pin null modem cable. This is the same cable used to connect the PC and the Windows Communications Distributor.
HT24W / HT28 Smart Technical Information 43
Parameters for Special Configurations The EXE file of the HT24W / HT28 Smart system, HT28.EXE, can be modified with special parameters for special uses of the program.
/D directory name This parameter addresses the path to the database of the selected folder. If ommited, the database will consider the data local directory in the same directory where the HT28.EXE is.
/Snumber This parameter defines a PC in a network. If ommited, this PC will be considered as PC station number 1 (main computer). Obviously in an HT28 network only one PC can be ommmited.
/NOVERIFY It makes the PC to do not check the database integrity. This way the loading is faster. It is not recommended to use this parameter eventhough it can be usefull in cases as demos or in slave PCs where the master has already checked the database intergrity.
/REVALIDATOR This parameter will make the PC to behave exclusively as a revalidator. In this case the parameter /S will be requiered.
/NOREVAL This parameter disables the posibility of revalidating cards from the PC; revalidation can be performed from the other revalidators of the installation (if there are any). Note: It is very important for all networked computers to have the same /D path.
Example of a network with 3 PCs (PC1 with the name MASTER is the server): PC1: C:OnityHT28HT28.EXE /D MASTERDATA /NOREVAL PC2: C:OnityHT28HT28.EXE /D MASTERDATA /S2 PC3: C:OnityHT28HT28.EXE /D MASTERDATA /S3 /REVALIDATOR
HT24W / HT28 Smart Technical Information 44 Onity Ht24 Lock Manual Onity Safe Manual Free
Onity electronic in-room safes are designed for hotel, business and residential applications with comfort, convenience and security in mind. Choose a safe that will easily accommodate a range of.
Electronic digital safes can keep your valuables behind a numerical lock to protect them from burglary and fire. These safes work on the same principle as dial combination locks do, but make it easier to enter a code. Electronic digital safes come in all shapes and sizes, from large industrial safes to small portable safes.
broken image