You are on page 1of 2

De-Securite Technologies

RZF 1/81, Mahavir Enclave, New Delhi – 110045


Mob : +91-8010353542, 9211432418
Email : desecurite@gmail.com
www.de-securite.com

Guard Tour System Manual

JWM-9000

1
De-Securite Technologies De-Securite Technologies
RZF 1/81, Mahavir Enclave, New Delhi – 110045 RZF 1/81, Mahavir Enclave, New Delhi – 110045
Mob : +91-8010353542, 9211432418 Mob : +91-8010353542, 9211432418
Email : desecurite@gmail.com Email : desecurite@gmail.com
www.de-securite.com www.de-securite.com
1. What is guard tour system? *Open the software installed on the computer, enter the login interface, the default
A guard tour system is a system for logging the patrols of employees in a variety of situations. administrator password is “999” and the operator password is “123”. Please modify them
It helps ensure that the employee makes his or her appointed rounds at the correct intervals and after login.
can offer a virtually indisputable record for legal or insurance reasons. Essentially, the system *For details about setup and usage of the software, please refer to the “Setup and Function
provides a means to record the time when the employee reaches certain important points on Introduction” enclosed with the CD.
their tour. A guard tour system consists of a reader, a usb cable, RFID tags, guard ID card and 4.Usage of Reader:
the software.
1) Checkpoints reading: Hold the head of the reader near the RFID card within 3-4 cms of the
2. How does a guard tour system work?
checkpoint. The reader will collect the data of the RFID card automatically instead of collecting
The employee carries a reader which is activated at each checkpoint. The checkpoints can by contacting. A “Beep” with flash confirms a successful reading.
consist of proximity microchips such as RFIDs Tags. During the patrol the reader stores the 2) Data download: First, connect one end of the USB cable with reader and the other end with
serial number of the checkpoint with the date and the time. Once completed, the information is the USB port of computer; then open the software --- click “data reading”, the patrolling data
downloaded from the reader into a computer where the checkpoint's serial number will have an will be displayed on the interface. Click button “save” to save the data in the software.
assigned location (i.e. North Door, Cell Number 1, etc.). 3) Two flashes when reading means the battery is low, please replace with a new one.
The reader can also be programmed to ignore duplicate checkpoint activations that occur 4) Three “Beeps” when reading means that reader’s time is not correct. Please connect the
sequentially or within a certain time period. Computer software used to compile the data from reader with computer for synchronizing.
the reader can print out reports that pinpoint the missed checkpoints or patrols. Then the 5) Four “Beep” when reading means that the card should be read again.
administrator doesn’t have to review all the data collected. 6) Six “Beeps” when reading mean that the memory of the reader has reached the maximum
3. System Requirements and Software Installation: capacity. The data should be uploaded to the computer to free some space.
1) Minimum System requirements:
*Operating System: Windows2000/XP/Vista 5. Tips:
*Performance: MMX / Pentium 4, 512MB RAMS 1) Before the first use, the reader should be connected with the computer for deleting the data
*CD-ROM Driver and RS232/USB Port stored inside.
*16 color at 800*600 pixels 2) Do not put the reader over fire.
2) Software installation: 3) Do not disassemble the reader by yourselves.
*Insert the CD of software into the appropriate drive and locate the software which matches 4) The RFID card contains auxiliary electronic devices and components, do not put the RFID
with your product. Then double click the “Setup.exe” icon to begin the installation (make card over fire and do not hit the RFID card with a blunt object.
the USB port free during the installation). Follow the instructions on screen, the installation
5)Do not locate the RFID card on the surface of metal object or inside metal object.
will take about 5 minutes to complete.
2 3

You might also like