8
Manual XM3 Remote Programmer: Version 4.1
1 Introduction
1.1 Important
Notice
This manual is for use of authorized Cross Point OEM’s only. It is intended to
serve as an example user manual and as a guide to the functions of the
XM3. Authorized Cross Point OEM clients may freely copy and edit the text
and graphics contained in this document for including in their own
documentation.
This manual describes all available procedures for the XM3. For specific
markets, where the OEM client may not need all available options, it is
recommended that those parts of the text which deal with unneeded options
or operations be omitted, provided they are not made accessible to the end
user or installer.
References to the “user” should be interpreted as “the user of the OEM’s end
product”. Where reference is made to the XM3, the OEM should insert the
product name under which the end product is marketed. Other XM3
specific
names like I/O1, I/O2, I/O3 and I/O4 may be changed to the names or
numbers of the input and output ports used in the OEM’s end product.
In the interest of improvement, specifications of the XM3
may vary slightly
due to updates being made. Detailed specifications of updates will be made
available, to be incorporated in the OEM’s manuals when necessary.
This document is subject to changes without prior notice. Cross Point cannot
be held liable for the use of the provided information. In case of doubt please
contact your supplier.
1.2 Proximity
The XM3 applies proximity detection techniques to sense the presence of a
unique RFID tag, as authorization to allow automatic opening or unlocking of
a door, gate or other access.
Proximity detection has the advantage of not requiring physical contact
between ID reader and ID-carrier. The tag functions without use of a battery.
The ID Reader scans the ID-carrier by means of a Long Wave radio
frequency transmission. If within range, the tag is activated and powered by
this signal and in return transmits its specific ID number. This technique
ensures easy to use, highly reliable, vandal proof access control.
The standard tags are available as cards, conforming to the ISO standard, or
as small key tags which can be attached to key rings. The ISO card can
optionally be equipped with a magnetic strip for dual ID applications.
Summary of Contents for XM3 MICROPROXS
Page 1: ...MANUAL Remote Programmer XM3...
Page 2: ......