background image

PATROL II LCD User's Manual Rev.D 

 

2011-04-01 

 

 

 

Page 

16

 of 

25

 

E

VENT LOG MEMORY

 

Reader is capable to record up to 32.768 events together with their time stamp (date and time). 
Each time the checkpoint/guard ID card is read, reader displays its name and then information 
about remaining free memory. When memory is occupied in 90% reader displays warning 

Event 

log almost full

 accompanied with 2400/1800 Hz modulated alarm signal. To confirm this message 

guard have to press ON/OFF button and then reader will continue its normal work, if not reader will 

switch off and the appears again with the next working cycle.  
The 

Event log almost full

 warning is a prompt for the user to transfer memory content to the 

computer otherwise it may happen that in the nearest future event buffer will be completely 

occupied and some events will be lost.  
In case when buffer is full reader displays warning 

Event log full

 accompanied with the 

2400/1800 Hz alert sound. To confirm this message guard have to press ON/OFF button and then 
reader will continue its normal work, if not reader will switch off and the message will be displayed 
again with next working cycle.  

Both warnings are registered in the reader’s log. Once confirmed through ON/OFF button they are 
no more registered in reader’s memory however they are recalled with every reading cycle but this 

time they disappear automatically after 1s and no sound is generated at all. This repeated 
messages are intended to remind the guard about existing problems. 

Note: When event buffer is overload the new coming events are saved on locations already 

occupied by the oldest ones thus some events are lost and event history is discontinued in some 
degree. 

Events can be downloaded to PC database using command: 

Download events in Readers tab. 

Events which are read are not automatically deleted from reader’s memory, they still exist in the 
reader and can be read again. If you don’t want to keep these events in device use command: 

Delete events from reader. This command protects the program from reading the same events 

again however it doesn’t delete them physically from the memory – thanks to this it is possible to 
read them again using special command: 

Recover deleted events.  

Note: Before you will read event buffer from the given reader assure the 

Patrol Master has already 

opened proper configuration file (the same RGT file which was used for configuration of a given 
reader) otherwise events might be displayed with wrong names of guards and checkpoints.  

Event types 

Reader records following events: 

 

Start of battery charging (

Start of charging

 

End of battery charging (

End of charging

 

Battery charging stopped (

Charging stopped

 

Warning about low battery level (

Battery week

 

Warning about memory being occupied in more than 90%(

Event log almost full

 

Warning about memory being fully occupied (

Event log full

 

Configuration changed (

New configuration uploaded

)  

 

Date/time change  (

Date/time set

 

Event log erasure (

Event log erased

)  

 

Online mode on (

Entry to the online mode

 

Online mode off (

Exit from the online mode

 

Error in configuration settings (

Configuration error

Содержание PATROL II

Страница 1: ...Handheld Guard Tracking System PATROL II LCD Firmware version fv 2 06 0093 Document version Rev D...

Страница 2: ...kpoints dedicated for PATROL II guard tracking system e g PK 2 or PK 3 offered by Roger The PATROL II LCD stores in internal memory checkpoint codes together with dates and times they were read It can...

Страница 3: ...lays guard tour schedule hints Battery charging from PC s USB or AC charger Powered from two LR6 AA batteries Resistant to humidity and water condensation One button intuitive operation Up to 8K reads...

Страница 4: ...ill establish connection with the reader Fig 1 Main window of Patrol Master software After connecting to computer reader displays message Online Mode and remains in it until finishing work with softwa...

Страница 5: ...oads last used configuration file it is however possible to choose it manually if necessary If software will be launched without the right configuration file data loaded from a reader will not be inte...

Страница 6: ...l appear with a list of readers currently connected to USB ports of PC computer Fig 3 Connecting new reader window We choose the reader we want to connect to the system and click OK Software will esta...

Страница 7: ...isposal single use ones Prior to replacement of batteries reader must be configured for the new ones Note If you place non rechargeable batteries and connect reader to USB port or AC charger this will...

Страница 8: ...PATROL II LCD User s Manual Rev D 2011 04 01 Page 8 of 25 Fig 4 Checkpoints tab view In order to define new checkpoint click Add new checkpoint button in Checkpoints tab Fig 5 Add checkpoint window...

Страница 9: ...ID card Programming of the ID cards for guard is not obligatory however when defined in the system they allow to monitor guards activity during his duty hours Each time a guard starts his duty he sho...

Страница 10: ...mment and picture to certain guard Tours Tour is a time schedule which tells guard where and at what time he has to visit next checkpoint As a result tour consist of list of checkpoints and related ti...

Страница 11: ...g 8 Tours tab view Each tour can have assigned additional comment and picture In order to define new tour click Add new tour button in Guards tab In order to define new visit point within existing tou...

Страница 12: ...s duty These event can be for example opened window light switched on intrusion vehicle entering the protected area etc In order to register special events guard is equipped with set of cards each as...

Страница 13: ...an be done in Configure reader window Fig 2 Sending configuration to a reader In order to fully configure a reader it is essential to upload to it a list of checkpoints guards special cards and assign...

Страница 14: ...ing distance is achieved when the reader s axis is approx 45 to the checkpoint s card plane as presented below Fig 13 Example of reading PK 3 type checkpoint Once the reading is accomplished device di...

Страница 15: ...o his individual account i e the Patrol Master displays info that they occurred during his shift Note Reader can log events without a necessity to read a guard s ID card however in such case events wi...

Страница 16: ...tended to remind the guard about existing problems Note When event buffer is overload the new coming events are saved on locations already occupied by the oldest ones thus some events are lost and eve...

Страница 17: ...SUPPLY Reader can be supplied from rechargeable LR6 AA size batteries ordinary one time use batteries PC s USB port AC charger Factory new reader is delivered with NiMh 2100 mAh batteries fully charg...

Страница 18: ...andon battery charging and switch to normal work with time date display In order to resume interrupted charging procedure reader should be disconnected from the USB port and the re connected again aft...

Страница 19: ...g of any proximity transponder of EM 125 KHz standard Transponders proximity tags of this type are very popular and available in various forms The most common are thin ISO card Roger item EMC 1 thick...

Страница 20: ...on on metal surfaces it is recommended to put a non metallic spacer under the checkpoint e g perspex plaster cardboard which should be at least 10mm thick When installed direct on metal reading range...

Страница 21: ...edure is as follows Connect reader to the PC Run RogerISP program and specify communication port the reader is registered in the Windows system there is PATROL II LCD phrase next to the listed COM por...

Страница 22: ...guards it against getting wet and on the other hand protects from mechanical damage in case it falls onto a hard surface ANTI SABOTAGE PROTECTION Reader is equipped with special components and circuit...

Страница 23: ...NiMh batteries where 3000 is achieved when LCD backlight is configured to 100 and 8000 with LCD backlight deactivated 0 Labels memory 1000 Internal memory for checkpoints and guards names Events log 3...

Страница 24: ...distance must be installed between control point and the metal surface EMC 1 Proximity ISO card thin 1 mm the size of an ATM card ISO card s code imprinted EMC 2 Proximity ISO card thick 2mm the size...

Страница 25: ...l and electronic devices Detailed information on recycling can be found at relevant local authorities in a disposing company or in a place where the product was bought Separate gathering and recycling...

Отзывы: