I. Definitions
S.2.1 system (S)
S.2.1 system is understood as all elements required to provide correct operation of the TECHCODE- RFID multi-compartment cabinet and to perform all functions available in the System applied in the cabinet.
TECHCODE RFID cabinet is the central element of the S.2.1 system, as it integrates the remaining elements of the System. Other elements forming the System include among others: readers, controllers, expanders, applications, software, etc.
TECHCODE RFID cabinet
TECHCODE RFID cabinet with the S.2.1 System is operated in a single mode, in several schemes. The cabinet is equipped with LAN input (Ethernet or Wi-Fi), thanks to which the cabinet can be operated and managed via the Network. The following TECHCODE RFID cabinets can be provided with the S.2.1 System:
System administrator (A)
TECHCODE RFID cabinet must be managed by the System Administrator. Administrator is understood as the User, who has been granted authorisation to manage the System or TECHCODE RFID cabinets.
Administrator’s duties include entering certain data in the System (e.g. Users data), granting authorisations to particular Users and providing current administration of the TECHCODE RFID cabinets (e.g. remote opening and vacating booked compartments, taking information about malfunctions, etc.).
user (U)
TECHCODE RFID cabinet with the S.2.1 System can be used only by the Users, who were defined in the System by the Administrator. Each time the Administrator decides, how a User is to be defined (i.e. entered in the database):
1. by providing the User’s personal data (e.g. name and surname), or
2. by providing other data that identify the User e.g. guest, serial number of the User, post, name of department, room number, etc.
A User can be a member of a Group/Groups of Users.
Identification and authorisation
In order to be granted access (Authorisation) to a cabinet/compartment/drawer or to perform certain function in the S.2.1 System, identification process must be correctly completed.
Thanks to the S.2.1 System certain carriers (e.g. identifying cards, PIN codes) can be individually assigned to a User and different Identification modes can be set.
Depending on the Identification mode chosen by the Administrator, a User needs to follow one or more (advanced) identification methods.
III. Managing S.2.1 SYSTEM by the administrator
TECHCODE RFID cabinet with the S.2.1. System must be managed by the System Administrator (A). S.2.1 System is managed remotely by means of encrypted communication in LAN (Ethernet or Wi-Fi) via dedicated software available in:
- Web application that run on the browser,
- Mobile application that run on mobile devices with Android or IOS.
configuration of the cabinet’s parameters
Review of:
Events register (who opened which cabinet/compartment/drawer and when it happened), including registration of Events pertaining to particular compartments (who opened a given compartment and when)
notifications on the occurrence of particular Events (e.g. authorisation of a given Identifier, opening of a particular compartment). Occurrence of any Event can automatically launch Notification function. Notification can take the form of a message displayed on the screen, or of e-mail sending.
- assigning Roles to the Users (e.g. User with Master Authorisations, guest)
- creating Users database (creating catalogue of Users with their characteristics like a photo, a post, etc.). There is also a possibility to create own fields characterising the User, that broadens description available in the System.
- granting Authorisations to the Users (e.g. temporary access to the compartments etc.). Authorisation specifies, when a given action (function) can be performed and by whom. Authorisation can be assigned directly to an Identifier, a User or a Group of Users.
- creating Groups of Users - Users can be Group members. Groups can form hierarchical structures having certain Authorisations.
- alarms - detecting and signalling anti-sabotage alarms. Alarm centre comprises a list of alarming events (e.g. forced opening, tampering, etc.) that were registered by the cabinet controller during certain period.
- reports on all actions performed by a given User
- reports on events registered during the chosen time limit
- cabinets occupation - which compartments are occupied / who occupies particular cabinet/compartment
- registers of events and reports on the System operation. Events registered in the Reports Centre can be exported to external storage (flash drive) using USB port in the controller, to internal memory, or can be sent to e-mail address defined in Configuration window. Data can be exported in .xls and .pdf. formats.
Granting authorisations by the S.2.1 system administrator
In the S.2.1 System, the Administrator can grant Authorisations to the:
1. User
2. Defined items/equipment (e.g. a parcel with QR code)
3. User’s Identifiers
4. Groups, to which the User belongs
5. Groups of User’s identifiers.
Therefore, the User’s Authorisations can stem from:
- assigning individual Authorisations to the User
- assigning the User to the Group of Users, which was granted certain Authorisations
- assigning individual Authorisations to the User’s Identifier
- assigning group of Authorisations to the User’s Identifier.
Defining authorisations by the S.2.1 system administrator
S.2.1 System allows to define basic and advanced Authorisations e.g.:
Authorisations can cover group of functions.
During the Authorisation process the System verifies:
IV. database
The System can use one of the following databases:
Events registered in the System are being recorded in the System’s database on a regular basis. Events History is downloaded automatically and requires no Application that manages the System. In case there is no communication with the server, Events are reordered by the controllers in their internal memory buffers.
V. using the cabinet by the users
Methods to identify the user in the S.2.1 SYSTEM
In the S.2.1. System identification can be performed:
1. by means of different carriers e.g. proximity cards, PIN codes, biometric data
2. using mobile devices i.e. mobile phones with Android or iOS - in that case the mobile phones acts as an identifier.
When the Authorisation is completed, the System automatically performs actions assigned to:
1. a given method of identification (i.e. a given card/PIN code)
2. the User:
• irrespective of the methods to be used to perform identification
• based on methods of identification assigned to the User, which were used to define individual Authorisations (e.g. Authorisations granted by the A card are different from the ones granted by the B card, or PIN code).
Methods to use the cabinets by the users
TECHCODE RFID cabinets with the S.2.1. System are operated by means of a reader and cards (biometric lines) that are approached to the reader, or by entering PIN code.
The cabinets can be accessed using a single and common reader. Alternatively, separate readers can be dedicated to a group of cabinets/compartments.
SCOPE OF THE USER’S AUTHORISATIONS
In order for the User to perform certain actions in the S.2.1 System, the User may be required to hold Authorisations relevant for that action. S.2.1. System allows the Administrator to grant individual, personalised Authorisations (basic and advanced). Authorisations can cover group of functions.
All Authorisations assigned individually to the User or granted to him due to his membership in a given Group/Groups, are accumulated. Therefore, actions that the User will be able to perform in the S.2.1 System depend on the Authorisations granted to him by the System Administrator.
VI. MODES, IN WHICH TECHCODE RFID CABINET CAN OPERATE
TECHCPDE RFID cabinet with the S.2.1. System can operate in a single operation Mode, in several schemes (example of a TECHCODE RFID multi-compartment cabinet with S.2.1 System):
S.2.1 System can be connected to a camera and a warning horn, which are useful when unauthorised opening of a cabinet / compartment / drawer takes place; The System can also inform about the doors that were left open and monitor the opening of a cabinet / drawer / compartment.