*IPR-QR-Surf-Out

Installation Manual | IM-20221004-MB-01

Access Control | Readers |

 

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

1. Introduction

This document is the installation and operation manual for the IPR-QR-Surf-Out (Barcode/QR reader).

IPR-QR-Surf-Out

This Barcode reader is supported on stacked (USB) Orions only and iProtect version 10.01 or higher.

2. Connecting the reader

2.1 Assembly

The Opticon reader is connected to a plug-in power supply with default a cable length of 1.5m.

Power supply input

Power supply output

Power supply input

Power supply output

100-240V ~ 50/60Hz

5.0V DC

400mA Max.

2.A A (10W)

If a plug-in power supply cannot be placed near the reader, consider the reader's specifications when extending the power cable.

2.2 Wiring

ORION PRT1

DELOCK RS3232 - RS485 converter

CAT5 cable > Orion PTR1

R+

Orange

R-

Orange / White

GND

Brown

VCC

Not connected

 

ORION PRT2

DELOCK RS3232 - RS485 converter

CAT5 cable > Orion PTR2

R+

Orange & Green

R-

Orange / White & Green / White

GND

Brown

VCC

Not connected

2.3 Cable length

From device

To device

Cable length (meter)

From device

To device

Cable length (meter)

Orion

DELOCK converter

100

NLV-5201 RS232C

DELOCK converter

3

2.3 Dimensions and color

Device

Dimensions

Device

Dimensions

IPR-QR-Surf-Out

Hight: 10.6 cm

Width: 6.25 cm

Dept: 5.4 cm

Black

3. Configuration

This chapter describes all necessary settings.

3.1 Card configuration (step 1)

3.1.1 Card number presentation

In iProtect, browse to menu: Access | Settings | Card coding | Card number presentation.

  • Right click in the search field and choose “add Card number presentation”:

Card number presentation details

Card number presentation details

Name

Enter a logic name

Format

Hexadecimal or Alpha numeric (case sensitive)

Calculated length

Depending on project demands, see Chapter 5. Examples

3.1.2 Card data interpretation

In iProtect, browse to menu: Access | Settings | Card coding | Card data interpretation or

  • Right click on the “Card number presentation” that was just created and choose “add Card data interpretation”.

Card data interpretation details

Card data interpretation details

Name

Enter a logic name

Reader communication protocol

Hexadecimal

All other settings

Depending on project demands, see Chapter 5. Examples

 

In Chapter 5. Examples you will find the most common reader settings.

3.2 Provisioner (step 2)

3.2.1 Create provisioner elements

In iProtect, browse to menu: Installation| Settings | Provisioner | Provisioner element

  • Check if the element “stx-etx, stxetx_001_Serialnumber_v1.0.xml” already exists. If present, you can proceed to chapter 3.2.2 Provisioner group.

  • Add provisioner element

Provisioner element 1

Provisioner element 1

Name

Enter a logic name

Provisioner file

stxetx_001_Serialnumber_v1.0.xml

Active

True

Type

Reader - Serial (RS485) RX-only

  • Right click in the search field and choose “add provisioner element”.

Provisioner element 2

Provisioner element 2

Name

Enter a logic name

Provisioner file

stxetx_type_9600_n_8_1.xml

Active

True

Type

Reader - Communication settings

3.2.2 Create provisioner group

In iProtect, browse to menu: Installation| Settings | Provisioner | Provisioner group

  • Right click in the search field and choose “add provisioner group”.

Provisioner group

Provisioner group

Name

Enter a logic name

Visible

True

Type

Reader

  • Select the new provisioner group in the treeviw and open the Provisioner group list

  • Select the newly created Provisioner element 1 and Provisioner element 2 and press save.

3. Reader (step 3)

 

We assume that the reader has already been created within iProtect.

In iProtect, browse to menu: Installation| Hardware | Reader

  • Search- and select the reader

  • Select the <Card data interpretation> as described in chapter 3.1.2 Card data interpretation

  • Select the <Provisioner group> as described in chapter 3.2.2 Create provisioner group

  • Configure all other settings as desired and save

4. Operational reader settings

This chapter describes the operational settings for the barcode reader in combination with iProtect.

4.1 Default settings

The barcode below programs the reader:

After presenting the configuration barcode the reader will beep multiple times.

 

This QR code contains the following settings:

High lights

Settings

Communication

9600 baud, no partity, 8 databits, 1 stopbit

Read mode

Auto trigger

Barcode support

Interleaved 2 of 5

Barcode support

2D Code > QR code

Barcode support

2D Code > Micro QR code

5. Examples

This chapter describes the two most common settings.

5.1 Barcode HEX format

Barcode : AAABBCCCCCCCCCCDDEEEE

Barcode

Format

Length

Value

Note

AAA

Hex

Max 24

Don’t care

Will not be checked

BB

Hex

2

AA

Start detection cardnumber

CCCCCCCCCC

Dec

10

 

Card number

DD

Hex

2

FF

End detection cardnumber

EEE

Hex

Max 24

Don’t care

Will not be checked

5.1.1 Example HEX format

Barcode: ABCAA0123456789FF223344556677

Result: In this case the card number is in between AA and FF  (0123456789)

5.1.2 Card configuration

5.1.2.1 Card number presentation

Card number presentation details

Card number presentation details

Name

Enter a logic name, e.g. QR code

Code:

 

Next available number

 

Format:

Hexadecimal

Authorisation group

 

Abbreviation

 

Calculated length

10

5.1.2.1 Card data interpretation

Card data interpretation details

Card data interpretation details

Name

Enter a logic name, e.g. QR Code 10hex

Format:

 

Reader communication protocol:

Hexadecimal

Card type:

None

Data Length:

 

System code

Start:

1

Length:

0

Code:

 

Facility

Start:

1

Length:

0

Code:

 

Card number:

Start

1

Length:

10

Modulo:

 

Offset:

 

Interpretation selection

Start:

1

Length:

0

Code:

 

Keypad

Intrusion system arming key:

 

Pincode only key

 

Office mode key

 

Offset distress key:

 

Key pincode use only:

 

PIN length:

4

Pinocde enabled key

 

Offline Validity

Minimum offset (hh:mm):

12:00

Validity window (hh:mm):

08:00

SV WO

Length calamity card (Bytes)

10

Calamity card SetupNumber (0-4)

0

ByteSwap

No

Consistancy

Consistancy check required:

No

Filter

Start Tag

AA

End Tag

FF

 

 5.2 Barcode ASCII format

Barcode : AAABBBCCCCCCCCCCDDDEEEE

 Barcode

Format

Length

Value

Note

AAA

ASCII

Max 100

Don’t care

Will not be checked

BB

ASCII

2

A-

Start detection cardnumber

CCCCCCCCCC

ASCII

10

 

Card number

DD

ASCII

2

-F

End detection cardnumber

EEE

ASCII

Max 100

Don’t care

Will not be checked

 5.2.1 Example ASCII format

Barcode: ABCA-12345abCDE-Fhhfalsfl

Result: In this case the card number is in between A- and -F  (12345abCDE)

5.2.2 Card configuration

5.2.2.1 Card number presentation

Card number presentation details

Card number presentation details

Name

Enter a logic name, e.g. QR code

Code:

 

Next available number

 

Format:

Alpha numeric (case sensitive)

Authorisation group

 

Abbreviation

 

Calculated length

0

5.1.2.1 Card data interpretation 

Card number presentation details

Card number presentation details

Name

Enter a logic name, e.g. QR code

Format

 QR Code  ascii

Reader communication protocol:

Alpha numeric (case sensitive)

Card number

Start

1

Length:

10

Modulo:

 

Offset:

 

SV WO

Length calamity card (Bytes)

10

Calamity card SetupNumber (0-4)

0

ByteSwap

No

Consistancy

Consistancy check required:

No

Filter

Start Tag

A-

End Tag

-F