Master Lock E72 User Manual

Page 20

Advertising
background image

Military Time Conversion Chart

Programming Category Maximum Quantities*

Page 30

Standard Time

Military Time

1:00 a.m..................................0100

2:00 a.m..................................0200

3:00 a.m..................................0300

4:00 a.m..................................0400

5:00 a.m..................................0500

6:00 a.m..................................0600

7:00 a.m..................................0700

8:00 a.m..................................0800

9:00 a.m..................................0900

10:00 a.m................................1000

11:00 a.m................................1100

12:00 p.m. Noon.....................1200

1:00 p.m. ................................1300

2:00 p.m. ................................1400

3:00 p.m. ................................1500

4:00 p.m. ................................1600

5:00 p.m. ................................1700

6:00 p.m. ................................1800

7:00 p.m. ................................1900

8:00 p.m. ................................2000

9:00 p.m. ................................2100

10:00 p.m. ..............................2200

11:00 p.m. ..............................2300

12:00 a.m. Midnight...............2400

Category

E72-64

E72-150

E72-300

Valid Users

64

160

320

Audit Trail

64

832

1,600

Temporary Users

32

64

64

Holidays

16

24

32

Scheduled Events

64

96

160

Denied Groups

96

96

96

* Further upgrades available, consult factory.

Access code

Numeric or alphanumeric data which when correctly entered into a keypad, allows

authorized entry into a controlled area without causing an alarm condition.

Access control

The control of persons, vehicles and materials through entrance and exit of a protected

area utilizing hardware systems specialized procedures to control and monitor the

movement into, out of or within the protected area.

Audit trail

A historical record sequentially accounting for all activities with an access control

system. Such a record allows reconstruction and analysis of events during a given

time period.

Card reader

A device that scans or reads encoded information in or on access control cards.

ESD

Electro Static Discharge

Fail safe lockset

A type of lock set that automatically unlocks when a power failure occurs.

Fail secure lockset A type of lock set that automatically locks when a power failure occurs.

Infrared (IR)

Light waves that are too low frequency to be seen by the unaided human eye.

Keypad

A device for inputting information into a computer controlled system for the purposes

of arming and disarming an alarm system or operating an access control system.

Magnetic card

A type of access control card with a data encoded strip of magnetic material.

Personal Identification

This number can be a combination of digits and letters, increasing the

Number (PIN)

overall number code possibilities.

Proximity card

A radio frequency based card technology that utilizes a microcircuit which when

present to a proximity reader, activates the cards circuitry, thus transmitting the data

stored in the card.

Smart card

An identification card containing an integrated circuit allowing it to receive and store

data, which gives it limited microprocessor intelligence.

Tailgating

In access control, tailgating is the act of one or more individuals entering a controlled

area by using a single card or code. Also known as piggybacking.

User Identification A unique number assigned to each user. The UID has a length 3 to 4 digits. The I.D.

Number (UID)

number will show up in the audit trail showing that user’s history of events for that

lock.

Terminator

The default setting for the lock has the “*” key acting as the terminator which

functions are similar to the “enter” key on a standard computer keyboard.

Programming key The lock default setting has the “# “ key as the programming key, note that the “#” key

is used during the initialization process for the lock GGM.

Valid user code

A valid user code is a users’ UID and PIN number, the user must also have the correct

security level to complete the function desired.

Glossary

Page 31

Advertising