background image

Programming the Card Reader

tSec Readers can be programmed for a wide range of functionality to suit your site's requirements.

Card reader programming is configured by applying specific TLV (Type Length Value) settings to the reader to
enable, disable and configure reader options. tSec Reader configuration can be programmed using:

A mobile device running the Protege Config App

An encoded MIFARE config card

A 125kHz programming card

Programming options are dependent on hardware compatibility and firmware versions.

Important:

tSec Readers can only be programmed within 2 minutes of startup. In order to program the reader

you will need to disconnect power and complete programming within 2 minutes of powering up.

For detailed information on programming tSec Readers, refer to

AN-283: Programming tSec Reader Functions

.

Protege Config App

The Protege Config App provides a secure, convenient and flexible method for programming a Bluetooth®
enabled tSec Reader.

To use the Config App you will need:

An app account

A mobile credential

To use the Config App to program a tSec Reader, the reader must meet the following requirements:

Firmware version 1.04.254 or higher

Bluetooth® capability

Programming Summary

To program a tSec Reader using the Config App:

1.

You will first need to log in to the app using your app account.

2.

Select your

Credential Profile

.

Your credential profile is automatically assigned to your app account with your mobile credential, and is
based on the credential issuer and site the credential was allocated to.

3.

Create a

Reader Configuration

(config) comprising the required TLV settings.

4.

Activate Bluetooth® on your device (if not already activated).

5.

Power cycle the reader you want to program.

6.

Select the

Config

to program the reader with.

7.

Apply the configuration to the reader, within two minutes of startup. Hold your mobile device close to the
reader and tap

Scan Closest

to apply the configuration.

When programming is successful, the reader will beep 5 times quickly then restart.

Config App Programming Examples

The following examples illustrate programming some common tSec Reader configuration requirements, using
the Config App.

PRX-TSEC Range | tSec Multi-Technology Card Reader with Bluetooth® Technology | Installation Manual

18

Summary of Contents for PRX-TSEC

Page 1: ...PRX TSEC Range tSec Multi Technology Card Reader with Bluetooth Wireless Technology Installation Manual...

Page 2: ...or any purpose without the express written permission of Integrated Control Technology Limited Designed and manufactured by Integrated Control Technology Limited Protege and the Protege Logo are regis...

Page 3: ...ry Exit 16 OSDP Reader Connection 17 OSDP Baud Rate Requirement 17 Programming the Card Reader 18 Protege Config App 18 Config App Programming Examples 18 MIFARE Config Card 21 ICT Encoder Client 21 E...

Page 4: ...ULC S319 34 UL 294 34 FCC Compliance Statements 35 Industry Canada Statement 36 Disclaimer and Warranty 37 PRX TSEC Range tSec Multi Technology Card Reader with Bluetooth Technology Installation Manua...

Page 5: ...control or security product Current features include Multi card technology provides support for 125KHz MIFARE and DESFire cards Encrypted RS 485 un encrypted configurable RS 485 or standard Wiegand co...

Page 6: ...nology Card Reader with Bluetooth Wireless Technology PRX TSEC STD KP BT B PRX TSEC STD KP BT W tSec Standard Multi Technology Card Reader with Keypad and Bluetooth Wireless Technology PRX TSEC STD KP...

Page 7: ...oth Wireless Technology PRX TSEC EXTRA KP BT B PRX TSEC EXTRA KP BT W tSec Extra Multi Technology Card Reader with Keypad and Bluetooth Wireless Technology PRX TSEC EXTRA KP BT B VRC tSec Extra Multi...

Page 8: ...PRX TSEC MINI BT B PRX TSEC MINI BT W tSec Mini Multi Technology Card Reader with Bluetooth Wireless Technology PRX TSEC MINI DF BT B tSec Mini 13 56MHz Card Reader with Bluetooth Wireless Technology...

Page 9: ...ed MIFARE Card Format Secured MIFARE is the compromise between secured cards and cost Card data is protected with a diversified authentication key and encrypted with an AES256 algorithm These cards ar...

Page 10: ...ic methods it fully complies with the requirements for fast and highly secure data transmission and flexible application management Fully compliant to all levels of the international standard ISO IEC...

Page 11: ...ystems CAN ULC S302 Installation and Classification of Burglar Alarm Systems for Financial and Commercial Premises Safes and Vaults CAN ULC S561 Installation and Services for Fire Signal Receiving Cen...

Page 12: ...y area The cable entry area should align with a hole cut through the plaster wall board Cables are intended to be run inside the wall Use appropriate screws not supplied to affix the case to the wall...

Page 13: ...120ohm The recommended cable types for Wiegand are 22 AWG alpha 5196 5198 18 AWG alpha 5386 5388 Warning The reader outputs D0 green wire and D1 white wire can switch to a maximum capacity of 50mA Exc...

Page 14: ...connected SHIELD 1 2 3 4 5 6 7 8 9 0 X V V C BZ L2 L1 D1 D0 NB NA Readers must be programmed to operate in dual LED mode For more information see Programming the Card Reader page 18 Using the recomme...

Page 15: ...LD Shield is frame grounded at one point Shielded Cable RED BLACK GREEN WHITE ORANGE BROWN BLUE YELLOW SHIELD Data ENTRY EXIT V V C BZ L2 L1 D1 D0 NB NA 1 2 3 4 5 6 7 8 9 0 X V V C BZ L2 L1 D1 D0 NB N...

Page 16: ...LLOW VIOLET Shield not connected SHIELD 1 2 3 4 5 6 7 8 9 0 X V V C BZ L2 L1 D1 D0 NB NA When the green and orange wires are not connected together the reader defaults to an entry reader RS 485 Reader...

Page 17: ...d Reader next page For more information about OSDP support on tSec Readers including configuring readers for secure channel communications see Application Note 321 Configuring tSec Multi Technology Ca...

Page 18: ...ial To use the Config App to program a tSec Reader the reader must meet the following requirements Firmware version 1 04 254 or higher Bluetooth capability Programming Summary To program a tSec Reader...

Page 19: ...y default so it is necessary to program the configuration 1 Log in to the Protege Config App using your app account 2 Select your Credential Profile 3 Add a new Reader Configuration called ISO14443 Ga...

Page 20: ...s from high frequency cards However for lower security sites using third party cards it can be useful to read and send the Card Serial Number CSN instead WARNING The CSN of your MIFARE card can be rea...

Page 21: ...kly then restart ICT Encoder Client The ICT Encoder Client is a software application that allows users to encode credentials for use with their ICT tSec Readers Protege access control system and optio...

Page 22: ...DESFire EV2 tags the ISO14443 gain should be set to 6 Some tSec Reader firmware versions do not contain the required ISO14443 gain configuration by default so it is necessary to program the configurat...

Page 23: ...gand Output Mode By default tSec Readers are configured to output Wiegand data However if the reader is ever connected to a reader expander configured to use RS 485 the reader will switch into RS 485...

Page 24: ...e Reader Configuration component and create a New Config called CSN Reading Mode 4 Click Add and select the Card Serial Number Reading option 5 Select all the appropriate CSN Reading options to enable...

Page 25: ...r using a 125kHz programming card 1 You will first need to power cycle the reader you want to program 2 Within two minutes of startup present the programming card to the reader to enter Programming Mo...

Page 26: ...t installation of the tSec Standard Reader All measurements are shown in millimeters 27 16 36 16 38 84 47 84 117 00 66 00 84 00 23 00 23 00 46 00 4 5mm Screw Hole 4 5mm Screw Hole 4 5mm Screw Hole 4 5...

Page 27: ...t installation of the tSec Extra Reader All measurements are shown in millimeters 117 00 42 33 33 33 32 67 41 67 66 00 84 00 37 50 37 50 75 00 4 5mm Screw Hole 10mm Cable Hole 4 5mm Screw Hole 4 5mm S...

Page 28: ...elp ensure the correct installation of the tSec Mini Reader All measurements are shown in millimeters 85 00 36 48 48 52 33 02 26 98 60 00 23 00 23 00 46 00 4 5mm Screw Hole 10mm Cable Hole 4 5mm Screw...

Page 29: ...of the dimensions of the tSec Reader models 117mm 4 61 85mm 3 35 46mm 1 81 75mm 2 95 4 5mm Screw Hole 4 5mm Screw Hole 10mm Cable Hole 10mm Cable Hole 4 5mm Screw Hole 4 5mm Screw Hole PRX TSEC Range...

Page 30: ...88 Max Distance 150m 492ft Module comms RS485 Belden 9842 or equivalent Max distance 900m 3000ft OSDP Communication OSDP standard 2 1 5 with Secure Channel Protocol Bluetooth Wireless Technology Bluet...

Page 31: ...and Multi Technology models only Applies to Bluetooth wireless technology enabled models only Applies to NFC capable models only The size of conductor used for the supply of power to the unit should b...

Page 32: ...itter Product Statement The R NZ compliance label indicates that the supplier of the device asserts that it complies with all applicable standards PRX TSEC Range tSec Multi Technology Card Reader with...

Page 33: ...arise from inappropriate waste handling Please contact your local authority for further details of your nearest designated collection point Penalties may be applicable for incorrect disposal of this...

Page 34: ...ot impair the operation of panic hardware and emergency egress If fire resistance is required for door assembly portal locking device s must be evaluated to UL10B or UL10C Must be installed with UL 10...

Page 35: ...the interference by one or more of the following measures Re orient the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit...

Page 36: ...tal apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe A est conforme la norme NMB 003 du Canada CAN ICES 3 A NMB 3 A PRX TSEC Range tSec Multi Technology Card Reader with B...

Page 37: ...under any circumstances to any party in respect of decisions or actions they may make as a result of using this information In accordance with the ICT policy of enhanced development design and specifi...

Page 38: ...eserved Disclaimer Whilst every effort has been made to ensure accuracy in the representation of this product neither Integrated Control Technology Ltd nor its employees shall be liable under any circ...

Reviews: