Professional Documents
Culture Documents
CLASSIC
After starting the software the user has to log on to use the system. The following logon screen appears:
The User ID and Password have to be entered. Press OK to enter the software.
The keycard software has different parts. Each part can be opened by clicking one of the big buttons in the
menu bar on top:
The following chapters give an overview of the different types of keys that can be made.
Depending on the authorization of your user account, some of the keys can or cannot be created.
After clicking the button, the following menu to create guest keys appears:
Select the room numbers and press [Select] to add them to a key. Click [OK] to go back to the guest menu.
o By choosing [Duplicate] or [Add Key] an extra key can be made for the room, without blocking the
existing key.
o By selecting [New Key] a complete new key will be made. As soon as the new key is used on the
lock(s), the existing keys are blocked.
For each type of Staff Key, the following functions are the same:
o Open Deadbolt: when checked, the key is allowed to overrule the “Privacy Function”.
o Meeting Status Function: when checked, the key can be used together with a Meeting Card to set the
lock in stand-open mode.
o Time Controls:
o None: no end date or time
o Valid Date: end date only
o Valid Date + Time Zone: end date and daily work hours
o Week + Time Zone: end date, work days and daily work hours
The screen shows the different types of keys that have been made in the past:
If you have the rights to change the key information, you can change it in the menu.
Using the button Modify, you can save the changes.
Using the button Erase, the key is deleted.
Insert the user information and click Next. The following menu appears:
Insert the read and write-rights for each card type. Then click [Finish].
o The information is read of the key. The following screen with opening information is shown:
o On top of the menu the date of the opening scan be selected. Using button Report a printout can be
made. Using the button Excel a document can be created in Microsoft Excel.
General:
Hotel Name
Checkout Time: standard checkout time
Net Port: port number used on the network
Default day: standard amount of days
Encoder Port: COM/USB-poort of the encoder
Please Input Room No. There is no room number information Insert the room number
Read/Write Error The key on the encoder cannot be Take another key
written
Blue – Lock opens and locks after some seconds The lock responds normally
Red – Lock does not open The lock does not accept the key: the card is invalid for
that lock.
The lock is not programmed correctly. Reprogram the lock.
Blue and Alarm signal – Lock opens The lock accepts the key, but the battery level is low.
Replace the batteries.
Red blinking light The lock is locked from the inside. The privacy function is
activated.
The lock is locked from the inside. The lock only accepts
keys that have “Unlock Deadbolt” activated.
Blue blinking light The lock does not have any or incorrect date/time. Use a
Clock card.
o Fix the Small screw on the front side of the door. Check if the cylinder is fixed.
o Install the metal plate on the lockcase and fix with the 2 small screws.
o Install the spindles on front and backside of the lockcase.
o Install the longer and smaller spindle on the inside of the door. Insert the longest part in the lockcase.
o Install the card reader on the front side and connect the cables..
o Then install the backside of the lock and fix it with the 4 screws.
o Make shure that all cables are well in the holes and if necessary, install the battery cap.
o Program the Parameter card based on the room number (see 2.3.3 for detailed explanation Parameter
Card)
o Program the Clock Card (see 2.3.4 to program the Clock card.)
Programming Steps:
1. Take the programming keys to the lock.
2. Use the System. Two responds are possible
Blue light and alarm beep: Lock is reset,
Blue light and normal beep: System ID is accepted
3. Use the Parameter Card. The lock gives a normal beep and blue light.
4. Use the Clock Card.
5. Test the lock using a valid key.
Click with the right mouse button on “SQL Server” and then “Stop”
Copy the files “Lock_Mifare.mdf” and “Lock_Mifare_Log.LDF” to another network location or USB
device.
Restart the SQL Server to use the old computer again.
Click “I Accept the licensing terms and conditions” and then [Next]
Wait until the installation files are loaded and click [Next]. The following screen appears:
When the configuration check is finished, click [Next]. The following screen appears:
Turn the option “Hide advanced configuration options” off. Click [Next]. The following screen appears:
Select “Default Instance” and click [Next]. The following screen appears:
Click [Next]
Click [Next].
Click [Install]
Click [Finish]
Start the software via the start menu:
Click [Exit]
Click with the right mouse button on “SQL Server” and then “Stop”
Go to “Customer Service”: