iProtect - Release notes 10.4

Table of contents

1. Introduction

These release notes provide information about the latest features of iProtect, including required software versions and hardware installation and operating manuals.

2. System requirements

This chapter lists the required hardware and software for iProtect, including the licensing scheme of iProtect upgrades and other important information.

2.1 Supported servers

For installation and support of the iProtect server, the system requirements of Ubuntu server are followed. This may differ depending on system use and size.
In addition, the duration of support is determined by the lifespan of the hardware. This is issued by the hardware manufacturer and described as MTBF (Mean Time Between Failure).

2.2 Hardware specification

The hardware specification depends on many variables, so the required specification is customer specific.

Guide lines for 2500 card users and 250 readers and 5 concurrent users*.

Version

CPU

Ram

Disk

10.4

>= 2.0 Ghz dual core

16 GB

>= 500GB

Test system (small)

1.6 Ghz dual core

4 GB

100GB

For large systems (>1000 readers, >20 concurrent users), a minimum of 32GB internal memory and 8 cores is recommended. *

Depending of the use of images (keymaps, photo’s), the disk space should be checked.

Deploying iProtect on a virtual environment, the performance of the disk read/write can be depended to the other virtual machine deployed on the same hypervisor.

2.3 Software

The required operating system version for iProtect:

Version

O.S./ Firmware

Maintenance / serverbox

Internet connection required

iProtect 10.4

Ubuntu 20.04 LTS

>= 10.02.xxxx

Yes, for installation and updates

For iProtect 10.04 and Ubuntu 20.04, there is a TKH repository with all needed files for installing and maintaining the setup files.

The operating system can be downloaded from Ubuntu's default repository.

2.4 Update policy

TKH security works non-stop to improve its products and their safety.
From iProtect version 10.4, the software version from which you update and the software version to which you update must be taken into account.

Why is this change? The security policy prevents newly installed software from working or communicating with software that does not meet these security requirements, so that a roll-back will no longer work.

2.4.1 Which iProtect version supports which Pluto RootFS

To ensure a reliable and secure system, the following software versions are required:

iProtect

Linux

RootFS

iProtect

Linux

RootFS

10.1 or lower

Ubuntu 16.04

V5-68a

10.2 or higher

Ubuntu 20.04

≥ V6-12 

2.5 Software and firmware

Software versions of the connected hardware are managed from iProtect by default.
Below you will find an overview of the most used hardware and the minimum version that are installed (provisioned) when updating iProtect.

Hardware / Device

Software / Firmware (minimum)

Note

Pluto (RootFS)

6.12.03

 

Reader manager

5.03.68

 

Orion

1.5.34

 

iX-serie Reader firmware

2.9.6

 

RIO firmware

1.2.50 / 2.16.0

 

TANLock

1.0.0

 

2.6 Encrypted JDBC connection

Required .Jar files for iProtect v10.03.xx and higher:

  • java-library-xx.x.x.jar

  • keyprocessor-jdbc-xx.x.x.jar

  • log4j-api-x.x.xx.jar

  • log4j-core-x.x.xx.jar

  • icu4j-73.1.jar

    • to ensure correct sort order for non ASCii characters (10.3.15+, 10.4+)

  • tyrus-standalone-client-x.xx.jar

2.6.1 API documentation available (on request)

If desired, new API documentation is available:

  • JDBC over SSL

  • iProtect XML API v2.16

2.6 License

When a major version number changes, it should be taken into account in advance that a new license is necessary. Please contact TKH Security service department or your account manager for this.

From version

To version

New license needed

From version

To version

New license needed

10.01.x

10.3.x

Yes

10.02.x

10.3.x

Yes

10.3.x

10.4.x

Yes

10.4.x

10.4.x

No

2.7 Browser support

All tests are done with default browser settings, if some functionalities require changes to the settings, this will be mentioned in the specific manual. The following browsers are supported in iProtect:

Browser

Version

Browser

Version

Google Chrome

127.0

Mozilla Firefox

127.0

Microsoft Edge

127.0

3. End of support

  • Sirius 1 support in combination with Reader manager version 6

3.1 Advance notice

Making use of the hta-tool can entail security risks. That was the reason we wanted to deprecate this.
Since many customers are still using this tool, an option has been added to continue using this hta tool. This usage is disabled by default.

The following option has been added to the dialog:

  • Installation | Settings | System parameters, tab: Other, “HTA enable”.

3.2 Pre-announcement

3.2.1 Network controller

  • Polyx Network controller: End of life: 31-12-2025

  • Apollo 1: End of life: 31-12-2025

  • iPU-8: End of life per: 31-12-2025

3.2.2 Support of INVR / License plate recognition on Polyx and IPU-8

iProtect 10.4 will be the last version which supports an iNVR Node on a iPU-8 or Polyx controller. If this situation occurs, the advise is to move the INVR node to a local server line.

4. iProtect server and application

This chapter describes the additions and/or changes of the application.

General improvements are:

  • 64bit database.

  • Log functionality by all services (for analyzing purposes).

  • Sense maintenance: Reduce the amount of getdivalist calls.

  • New date time format support carddata interpretation (DDxMMxYYYY where x could be any seperator).

  • Output table increased form 8192 to 12280.

4.1 DOM API support with mobile devices

Establishing a close collaboration with DOM Security, we have developed a solution to gain access to both wired and battery-powered locks with a mobile device or traditional MIFARE DESFire tag or card. IPROTECT connects to the DOM controller(s) based on a REST API. The connection works in real time, so both systems are always fully synchronized. No more use of “old-fashioned” XML import and export files. Now, customers have one technology partner that offers a seamlessly integrated solution for hardware, software, mobile app, and cloud services.

Supported hardware and functionalities

Support

Supported hardware and functionalities

Support

  • Sirius iX-reader family

  • DOM ENiQ Pro v2

  • DOM ENiQ Guard

  • DOM ENiQ LoQ

  • Mifare Desfire UID/AID

    • Tags

    • Cards

  • IPROTECT ACCESS APP (Mobile access)

    • IOS

    • Android

  • DOM: minimum version: v5.9

  • Sirius: minimum version: v2.9

  • DOM Controller

 

  • minimum version: v24.07.31

  • ENiQ RF NetManager V2

    • max. 8 ENiQ devices

    • max. 15m (BLE)

 IMPORTANT:

  • No support of online access

  • No support of support online events

Device is used to update configurations of the connected devices (max. 8) and send commands like: Reader mode changed to: Normal, Closed, Open and Pulse lock/reader.

  • Online access: NO

  • Online events: NO

  • Lock software update: YES

  • Lock configuration updates: YES

  • Set lock/reader:

    • Normal

    • Closed

    • Open

  • Pulse lock/reader

    • Pulse in seconds

  • Minimum version: v5.9

For more information, please consult the manual:

4.2 Pager charging cabinet - Ooperon / Pager services

Effectiveness is important to prevent many 'expensive’ pagers from remaining unused in the charging station. When presenting a valid access card to a specific card reader, an event is sent automatically to the (Ooperon or Pager services) server containing the personal pager number, name, location and profile number (which are managed in iProtect). This immediately loads the profile of the employee into a charged available pager.

  • The number of pagers in use is optimized as much as possible.

  • Pager number and profile managed by iProtect.

  • Pager requests logged in iProtect.

For more information, please consult the manual:

4.2.1 Extensive functionalities and support

  • Support Ooperon CV4-v7 protocol

  • Support Pager Services

  • Single call or groups call

  • Number of characters of display text can be limited

  • Send the person's name to the pager or a separate pager name

  • Personal name can be limited to number of characters (16)

4.3 Deister Key Cabinet

A key cabinet is a lockable cabinet that can hold a large number of KeyTags. These KeyTags are locked in specific positions that are monitored and controlled by the management software. iProtect reads all linked Deister cabinets, including panels and key positions. It is therefore important that the key cabinet(s) are correctly created and configured within the Deister software. By presenting an identification means (i.e. access card) to the reader that is connected to the key cabinet, the cabinet is unlocked. In iProtect you can define which person can take out one or more KeyTags. Every handling will processed and registered in iProtect.

4.3.1 Extensive functionalities and support

  • Generate alarm if key fob is not returned in time

  • Only allowed to take a KeyTag from Keycabinet when person is present

  • Determine the maximum number of KeyTags is owned

For more information, please consult the manual:

4.4 Functionality

iProtect contains many functionalities that can make it difficult for a system user to determine which fields should be used. To increase the user-friendliness of the user interface, only the functions that are actually used can now be enabled.

Functionality groups can be added and per group it can be defined which functionalities should be assigned to it. The functional group must then be added to a user group.

The following menu has been added:

  • Installation | Authorization | Functionality group

The following option has been added to the dialog:

  • Installation | Authorization | User group. Select “Functionality group”.

For more information, please consult the manual:

4.5 Check data through an external web service

An option has been added to (for example, by presenting an encrypted QR code to a reader) decode data and checked by an external provider/ Web service.

The following option has been added to the dialog:

  • Installation | Hardware | Reader. Select “Authentication method”.

4.6 Output type added

To be able to send an output based on the LED behavior of the card reader, the following option has been added to the dialogs:

  • Installation | Hardware | Output. Select “Source”.

  • General | Settings | Logical programming | Logical expression. Select “Source”.

4.7 Output follows interlocking status

To be able to send an output based on the status of a group of doors (interlocking). Sending an output based on the status of a group of doors (locking)
This function allows multiple door groups (interlocking) to be physically linked together and extend the interlocking function.

The following option has been added to the dialog:

  • Installation | Hardware | Output | Select “Source”

4.8 Structure of dialogues adjusted

To make the dialogues more readable, tabs have been added. After opening the dialog, only the primary fields will initially be shown.

The following option has been added to the dialog:

  • Installation | Hardware | Node

  • Installation | Hardware | Line, Select “Function of the line”, Virtual line.

4.9 Locking pulse

The following option has been added to the dialog:

  • Installation | Hardware | Reader

    • Tab: Input/Output | Output

      • Locking pulse (new output type)

    • Tab: Door behavior | Door control | Unlock behavior:

      • Pulse open output + pulse close output

        • Requires the use of the <Closing pulse> output

          • Requires the use of the <Deadbold> input

          • Requires the setting <Unlocking behavior>

          • The <Door control> will now follow the <Pulse time for opening and closing>

          • The <Closing pulse> will follow the <Pulse time for opening and closing>

Basic function

4.10 Copy/Paste Card data interpretation

When selecting an existing Card data interpretation in the tree-view, copy- or paste options have been added.

The following option has been added to the dialog:

  • Access | Settings | Card data interpretation

4.11 TANLock - Provisioner element added to the reader

In the Node dialog, a firmware element can now be selected and in the Reader dialog, the reader settings/configuration. Previously this was only possible to provision this from the Node.

The following option has been added to the dialog:

  • Installation | Hardware | Node

  • Installation | Hardware | Reader

4.12 UID support TANLock

With the TANLock reader, a 7 byte UID configuration can be set as a provisioner group.

The following option has been added to the dialog:

  • Installation | Hardware | Reader

4.13 Authorization group is added to Guarded area group

An Authorization group is added to Guarded area group

The following option has been added to the dialog:

  • Installation | Hardware | Alarm system | Guarded area group

4.14 Pincode field is moved to the person dialog

Because only 1 PIN code can be used, the PIN field that could be entered with the card has been moved to the person dialog.

The following option has been added to the dialog:

  • General | Person

4.15 Enable NAT on Network controller

It is now possible to create two Nodes with the same IP-address communicating with the same Network controller.

The following option has been added to the dialog:

  • Installation | Hardware | Line

4.16 Menu bar

The menu bar is changed. The menu options have moved to the left because “file” has been dropped. Instead, two entries have been added to the right side of the menu bar

4.16.1 Menu bar: Help and About

By pressing the question mark image-20240611-081324.png , help and about can be chosen.

4.16.2 Menu bar: Change password and Log out

To allow a system user to manage his or her own password, a menu entry has been added to the menu bar.

When pressing on the person-icon image-20240611-081718.png, the login password- and system language can be changed.

4.17 SimonsVoss Wireless online Keypad reader

The keypad reader can be used as an alternative access or as additional authentication for an SV wireless online reader by entering a PIN code into the keypad reader.

The access management of the PIN code cards takes place entirely in iProtect.

For more information, please consult the manual:

4.18 Reader access rights events

If you add or remove a reader with a specific time zone directly to or from a Card (Reader list below the card), an event is generated in iProtect.

4.19 Number of intercom stations increased

The number of intercom stations to be connected is increased from 800 to 1200.

4.20 Online and offline readers in one reader group

It is possible to create a reader group of online- (Sirius-iX) and offline (OSS) readers.

4.21 Support re-calculation on card-numbers

It is possible to perform automatic expression on the source data read from the card to calculate the card number.

4.22 UNii intrusion panel improvements

  • The UNii now supports UTF8 (previous ASCII), we have better support for various characters in all languages.

  • Equip information record UNii version 3 implemented

4.23 TrakaWeb integration with salary number

When the connection with the TrakaWEB service is established, the following information is synchronized between the iProtect database and the TrakaWEB database for the cards that are member of the card group defined in the service details form:

  • Person Name

  • Salary number (in Traka: Staff Number)

  • Card number

  • Validity

  • Expiration date