Honeywell Inc.  

Excel Security Manager (R610) Part - 2. CSI 3-Part Specifications.

Excel Security Manager (R610)


Point Groups
wpe18.jpg (1904 bytes)

XSM can group a number user-selected points based on alarm inputs, outputs, controller, area, doors, or elevators (lifts).  This collection of points in one group allows an entire group of points to be monitored/ controlled as one entity.

An on-line display summary show information about the point groups including the number of points in a group and the number of points in each possible state.

Point Processing
Through user-defined algorithms, XSM can assign additional processing selected points. This processing enables actions such as:

� Calling card holder information when a card is presented at a reader
� Enabling output controls based on a logical combination of inputs
� Alarming a master point based on the alarm states of subordinate points

Event Management
wpe19.jpg (1678 bytes)

System events include alarms, changes of state in status points, card holder movements, changes in system status, and operator actions. As system events occur, XSM creates a journal of the events in an system event file.  Journalized event entries include a description, condition, message, time of occurrence, and responsible operator. 

The system event file stores event data in an on-line buffer.  When the on-line buffer becomes full, XSM transfers the event data to an archived buffer and notifies the operator to save the file to external media. The on-line buffer can continue to store events without interruption. An operator can retrieve current or archived system event data for use on-line or in the reports.

Alarm Management
wpe1A.jpg (1682 bytes)

The comprehensive alarm management facilities of Excel Security Manager ensure that operators are immediately notified of any attempted security violations. Operators can easily respond to alarms and locate alarm data using dedicated function keys:

Acknowledge � An operator can simply use the mouse to select the alarm point on the display and press the Acknowledge key to acknowledge the condition. The event file and the printer record this operator activity by operator ID and acknowledgment message.

Alarm summary � An operator can press the Alarm Summary key at any time to view a display showing all currently active alarms. The alarm messages are color coded to show priorities. Through the summary page, an operator can acknowledge alarms and access an associated display defined for the point.

Associated Display � By just pressing the Associate Display key, XSM recalls the display associated with the point currently listed in the dedicated alarm line. By using the mouse to first select any alarm point on the display and then pressing the Associated Display, an operator can pinpoint the display applicable to that alarm point.  XSM annunciates alarms as follows:

� Audible Tone. The audible tone is based on a *.wav file on each Windows operator station.
� Alarm Line. A dedicated alarm line appears on all displays and shows either the most recent or oldest (user-configurable), highest priority, unacknowledged alarm in the system.
� Alarm Indicator. An alarm indicator appears on all displays and flashes red when there are any pending unacknowledged alarms. The indicator turns solid red if all alarms are acknowledged but not all alarms have returned to normal.
� Dedicated Line on Graphic Display. For a point in alarm, the graphic display provides a dedicated line that shows the point identifier, type, and description. If subsequent alarms occur, associated messages overwrite the dedicated display line if they have a higher reporting priority. Previously displayed information moves to an unacknowledged alarm list.
� Alarm Summary Display. An alarm summary page shows all collective alarms in the system and color codes them to indicate priority and severity.
� Alarm Printer Output. Alarm messages printout on the alarm printer for a hard copy record.

Alarms annunciate at operator stations even if no user is currently signed on. This feature applies to network connected operator stations as long as the computer running the operator station software remains logically connected to the network. If the operator station is minimized in the Windows environment, the audible tone sounds and the operator station icon flashes to indicate the alarm.  

An active point can report an alarm condition. If a point is inhibited, the point no longer reports alarms. However, when the point is reactivated, the point immediately reports the alarm condition.

Alarms can be associated with all points states; each with priorities and subpriorities to allow for sophisticated prioritization. Alarm priorities and associated actions are as follows:

wpe1B.jpg (21428 bytes)

Each alarm priority classification supports up to 15 subpriorities. All alarm actions are journaled in an event file that can be recalled, viewed, and accessed for reports at any time. 

It is possible to configure a time period for acknowledging an alarm. If an alarm is not acknowledged within the allotted time period, its alarm priority is elevated to the next higher priority level.

When an alarm occurs, an advanced alarm management option allows an operator to proceed to an alarm instruction page which can detail appropriate alarm handling procedures.  The operator can enter a response that indicates the actions taken to correct the situation.

Card Holder Management

Card Holder Information
wpe1C.jpg (1879 bytes)

Excel Security Manager provides an easy-to-use card holder management system with a database that supports a virtually unlimited number of card holders (up to 100,000 cards).   Users can completely configure card access information using full-color displays at the XSM operator stations.

wpe1D.jpg (1938 bytes)

For each card in the system, the following information is recorded:

� Card number (XSM can generate a 16-digit random card number)
� 4 user definable index fields
� Area code
� Full name
� 6 user definable text fields
� 5 user definable combobox fields
� Address
� Comments
� Alarm priority
� Card State (Active, lost, stolen, inactive, expired)
� Card trace option
� 8 Access levels
� Last door accessed
� Card commencement date
� Expiration date
� Lighting control zone
� Visitor card
� Long access (controller specific)
� Escort required (controller specific)
� Escort capable (controller specific)
� Cost override (controller specific)
� Event lockout override (controller specific)
� Card Class A, B (controller specific)
� Personal Identification Number, or PIN, (controller specific)
� High resolution color image of card holder

Combobox fields predefine a number of choices so that a user can select from a list of these choices when defining card holder data. For example, department names can be predefined so a user can select the appropriate department from a list when assigning card holder data. The combobox fields facilitate data entry procedures and ensure data consistency.

Card holder data only becomes active after the card commencement date and up to the card expiration date.

Card Modification
A card detail display summarizes all card holder assignments currently in effect. It is possible for an authorized user to add, modify, or delete a card holderÕs configuration parameters.  When assigning card holder data, XSM presents a listing of all possible access levels. Card holder assignment changes do not take effect until the data is downloaded to the access  controllers.

Zone Control
wpe1E.jpg (1982 bytes)

A facility can be subdivided into different zones of access capabilities. XSM supports a minimum of 512 zones, expandable to 1024 zones. Each zone consists of a description, area code, and up to 128 doors. When configuring door information XSM presents a listing of all available doors in the system.  

Operators can access a summary display that lists all zones and associated data currently in effect. Authorized users can change zone configurations as needed and then download the information to the access controllers. Zone changes do not take effect until the data is downloaded.

The detail page for each card holder can indicate the current zone being accessed. XSM can also provide a list of all card holders in a particular zone and can enable anti-passback zones. XSM supports a single level of anti-passback where a card holder entering a site through an entry card reader can not access this reader again without first exiting the site via an exit reader.

Time Periods
wpe1F.jpg (2033 bytes)

XSM supports 256 time periods. The time periods schedule access days and times.  Each time period defines a group of days such as Monday through Friday and an associated start and stop time range such as 8:00 AM to 5:00 PM.

Users can display a summary that lists all time periods and their descriptions currently in effect.  Authorized users can change time periods as needed and then download the information to the access controllers. Time period changes do not take effect until the data is downloaded.

Access Levels
wpe20.jpg (1984 bytes)

XSM supports a minimum of 512 access levels, expandable to 1024 access levels.  Each access level consists of a description, area code, and up to 256 zone and time period pairs. Each card holder can be assigned up to 8 access levels. When assigning access levels, XSM presents a listing of all available zones and time periods defined. 

Operators can access a summary display that lists all access levels and associated data currently in effect. Authorized users can change access level assignments as needed and then download the information to the access controllers.  Access level changes do not take effect until the data is downloaded. 

An on-line display shows all
access events (distinct from system events). Access event entries include the date, time, door, and card holder who attempted the access, and whether access was granted or denied. If access was denied, an associated message indicates the reason.

Card Holder Tag Names
To ensure speedy access to card holder information, XSM allows a user to recall card details by entering any of six different tag names such as:

� Card number
� Full name
� Index 1 (user-defined field such as abbreviated name)
� Index 2 (user-defined field such as vehicle registration)
� Index 3 (user-defined field such as employee number)
� Index 4 (user-defined field such as mailbox number)

Partial entry of any one of these tag names can recall the card detail display if this partial tag is unique to the card holder. Otherwise a list of possible matches appears for operator selection.

Lighting Control Coordination
A group of lights can be associated with individual card holders. When a card holder accesses the building after hours and presents their card to a reader, associated lighting points optionally can turn on automatically for a predefined time period. XSM gives card holders the flexibility to have lights on when they need it and avoids lighting unoccupied areas. When the time period expires, lights automatically turn off.

Card Image Database
XSM can interface to a photo imaging system so that images captured in the photo imaging system can appear on the operator stations in the card detail displays. The photo imaging system stores images on a file server such as the XSM core computer. 

It is also possible for XSM and the photo imaging system to exchange card holder data. Users can configure when and how often the data transfer from one system to the other occurs.

The card holder detail display and corresponding photo image can be invoked automatically by an access event. For example, when a card accesses a reader, the corresponding card holder detail display and photo image display at the operator station.

Elevator Control
wpe21.jpg (2216 bytes)

Excel Security Manger is capable of controlling access to different floors of a building by interfacing to an elevator controller. The elevator controller can support up to 256 access groups and a maximum of 64 floors per elevator. 

The XSM core computer handles scheduling of floor access. Schedules are initially downloaded to the elevator controller. The elevator controller then maintains the schedules independently of the core computer. In the event that communications between the elevator controller and the core computer fails, the elevator controller continues floor access as always. When communications are restored, the elevator controller reports back to the core computer to maintain consistency.

Guard Tour
The Guard Tour option provides the ability for Excel Security Manager to program and track a guard through defined tours of a building or facility. The system administrator has the flexibility to program guard tours using any logical combination of card readers and input points in the system as tour checkpoints. Tours can switch cameras, disable alarms, or toggle lights. It is possible to activate or deactivate guard tours independently.

® U.S. Registered Trademark
Copyright © 1997 Honeywell Inc.
All Rights Reserved

74-2875