Introduction to s.2.1 system in multi-compartment cabinets

I. Definitions

S.2.1 system (S)

S.2.1 system is understood as all elements required to provide correct operation of the TECHCODE- RFID multi-compartment cabinet and to perform all functions available in the System applied in the cabinet.

TECHCODE RFID cabinet is the central element of the S.2.1 system, as it integrates the remaining elements of the System. Other elements forming the System include among others: readers, controllers, expanders, applications, software, etc.

TECHCODE RFID cabinet

TECHCODE RFID cabinet with the S.2.1 System is operated in a single mode, in several schemes. The cabinet is equipped with LAN input (Ethernet or Wi-Fi), thanks to which the cabinet can be operated and managed via the Network. The following TECHCODE RFID cabinets can be provided with the S.2.1 System:

  • clothing lockers
  • multi-compartment cabinets
  • file cabinets with drawers
  • office and warehouse cabinets

System administrator (A)

TECHCODE RFID cabinet must be managed by the System Administrator. Administrator is understood as the User, who has been granted authorisation to manage the System or TECHCODE RFID cabinets.

Administrator’s duties include entering certain data in the System (e.g. Users data), granting authorisations to particular Users and providing current administration of the TECHCODE RFID cabinets (e.g. remote opening and vacating booked compartments, taking information about malfunctions, etc.).      

User with master authorisation (M)

System Administrator can grant special Master Authorisation to a User, thanks to which the User can perform reserved functions.

Master Authorisation can be simultaneously granted to the System Administrator.

user (U)

TECHCODE RFID cabinet with the S.2.1 System can be used only by the Users, who were defined in the System by the Administrator. Each time the Administrator decides, how a User is to be defined (i.e. entered in the database):

1. by providing the User’s personal data (e.g. name and surname), or

2. by providing other data that identify the User e.g. guest, serial number of the User, post, name of department, room number, etc. 

A User can be a member of a Group/Groups of Users.

Group of users (UUU)

A Group of Users holding similar authorisations defined by the Administrator.   Groups of Users can form hierarchical structures having certain Authorisations.

A User, who is a member of several Groups of Users, holds Authorisations granted to all Groups to which he belongs.

Identification and authorisation

In order to be granted access (Authorisation) to a cabinet/compartment/drawer or to perform certain function in the S.2.1 System, identification process must be correctly completed.

Thanks to the S.2.1 System certain carriers (e.g. identifying cards, PIN codes) can be individually assigned to a User and different Identification modes can be set.

Depending on the Identification mode chosen by the Administrator, a User needs to follow one or more (advanced) identification methods.

II. Access control and automation of processes 

III. Managing S.2.1 SYSTEM by the administrator

TECHCODE RFID cabinet with the S.2.1. System must be managed by the System Administrator (A).   S.2.1 System is managed remotely by means of encrypted communication in LAN (Ethernet or Wi-Fi) via dedicated software available in:

- Web application that run on the browser,

- Mobile application that run on mobile devices with Android or IOS.

Granting authorisations by the S.2.1 system administrator

In the S.2.1 System, the Administrator can grant Authorisations to the:

1.       User

2.      Defined items/equipment (e.g. a parcel with QR code)

3.      User’s Identifiers 

4.      Groups, to which the User belongs

5.      Groups of User’s identifiers.

Therefore, the User’s Authorisations can stem from:

- assigning individual Authorisations to the User

- assigning the User to the Group of Users, which was granted certain Authorisations

- assigning individual Authorisations to the User’s Identifier

- assigning group of Authorisations to the User’s Identifier.


Defining authorisations by the S.2.1 system administrator

S.2.1 System allows to define basic and advanced Authorisations e.g.:

  • Authorisation to open particular compartments once/numerous times/temporarily
  • possibility to grant access to a number of compartments to one user
  • possibility to configure a few identifiers for one compartment.

Authorisations can cover group of functions.

 

During the Authorisation process the System verifies:

  • all Authorisations directly assigned to a given Identifier, by means of which the User logged in,
  • all Authorisations granted to the User, who holds the Identifier, and
  • all Authorisations assigned to the Groups of Users, to which the User belongs. Authorisations are accumulated.

IV. database

The System can use one of the following databases:

  • Server database - in that case the System can be managed by a few Administrators 
  • File database - is created by the Software and does not require Administering (is dedicated to small installations).

Events registered in the System are being recorded in the System’s database on a regular basis. Events History is downloaded automatically and requires no Application that manages the System. In case there is no communication with the server, Events are reordered by the controllers in their internal memory buffers.

V. using the cabinet by the users

Methods to identify the user in the S.2.1 SYSTEM

In the S.2.1. System identification can be performed:

1. by means of different carriers e.g. proximity cards, PIN codes, biometric data

2. using mobile devices i.e. mobile phones with Android or iOS - in that case the mobile phones acts as an identifier.

When the Authorisation is completed, the System automatically performs actions assigned to:

1.  a given method of identification (i.e. a given card/PIN code)

2. the User:

• irrespective of the methods to be used to perform identification

• based on methods of identification assigned to the User, which were used to define individual Authorisations (e.g. Authorisations granted by the A card are different from the ones granted by the B card, or PIN code).

Methods to use the cabinets by the users

TECHCODE RFID cabinets with the S.2.1. System are operated by means of a reader and cards (biometric lines) that are approached to the reader, or by entering PIN code.

The cabinets can be accessed using a single and common reader. Alternatively, separate readers can be dedicated to a group of cabinets/compartments.

SCOPE OF THE USER’S AUTHORISATIONS

In order for the User to perform certain actions in the S.2.1 System, the User may be required to hold Authorisations relevant for that action. S.2.1. System allows the Administrator to grant individual, personalised Authorisations (basic and advanced). Authorisations can cover group of functions.

All Authorisations assigned individually to the User or granted to him due to his membership in a given Group/Groups, are accumulated. Therefore, actions that the User will be able to perform in the S.2.1 System depend on the Authorisations granted to him by the System Administrator.  

VI. MODES, IN WHICH TECHCODE RFID CABINET CAN OPERATE 

TECHCPDE RFID cabinet with the S.2.1. System can operate in a single operation Mode, in several schemes (example of a TECHCODE RFID multi-compartment cabinet with S.2.1 System):

S.2.1 System can be connected to a camera and a warning horn, which are useful when unauthorised opening of a cabinet / compartment / drawer takes place; The System can also inform about the doors that were left open and monitor the opening of a cabinet / drawer / compartment.

Send an inquiry about cabinets in System S.2.1