Mercury SR-10K Mag-Stripe Access System manual Cipher Codes Related Commands Commands 15 through

Page 7

CIPHER CODES Related Commands (Commands 15 through 17)

Up to 10 cipher codes may be defined (user slots 0 through 9). Each cipher code may be from 1 to

6 digits long. Cipher codes shorter than 6 digits are terminated with the "#" key. Just like cards can produce different results when read "upward", cipher codes can be entered in the "reverse" direction. For example, cipher code "123" entered as "3", "2", "1", "#" will produce the action specified for "reverse" entry of a user having the User Level assigned to cipher code "123".

Command 15 - Add Cipher Code(s)

(

* 1 5 1-3

0-9

0-9 ( 0-9 )

0-9, 0-9

* #

#

#

-select Command 15

-select the user level: 1, 2, or 3

-select the user number: 0 to 9

-enter a 1 to 6 digit cipher code, end with '#'

-additional codes will be added into successive slots )

-any other action quits the 'add loop'

Command 16 - Delete a cipher code

* 1 6

- select Command 16

 

 

- select the user number to delete: 0 to 9

0-9

 

Command 17 - Delete a range of cipher codes

* 1 7 0-9 0-9

-select Command 17

-select the first user number to delete: 0 to 9

-select the last user number to delete: 0 to 9

BLOCK Database Mode Commands (Commands 20 through 23)

Use these commands to manage the card holders if the BLOCK database mode was selected (Command 93 set to mode "1"). The block number is set by Command 94.

Command 20 - Add a card (activate a user)

* 2 0 1-3

0-1 0-9

0-9

0-9

-select Command 20

-select the user level (1, 2, or 3)

-enter the user slot to activate (0000 through 1599)

Command 21 - Delete a card (deactivate a user)

* 2 1 0-1 0-9

0-9

0-9

-select Command 21

-enter the user slot to deactivate (0000 through 1599)

Command 22 - Add a range of cards (block activate)

* 2 2 1-3

0-1 0-9

0-1 0-9

0-9

0-9

0-9

0-9

-select Command 22

-select the user level (1-3)

-enter the first user slot to activate (0000 through 1599)

-enter the last user slot to activate (0000 through 1599)

Command 23 - Delete a range of cards (block deactivate)

*

2 3

 

0-1

0-9

0-9

0-1

0-9

0-9

Mercury Security Corporation, © 2005

- select Command 23

0-9- enter the first user slot to delete (0000 through 1599)

0-9- enter the last user slot to delete (0000 through 1599)

SR-10K

Doc. 10107-0007 Rev 1.04

Page 7

Image 7
Contents SR-10K Mag-Stripe Access System Users Guide Table of Contents Programming DescriptionCard Database Options Multi-Reader Sites Cipher CodesUser Levels Operating ModesLost Master Card Configuration PlanningInterpreting the LED and Buzzer Indicators Quick StartCommand 13 Delete a range of cards Command 10 Add cardsCommand 11 Delete a card, using the user slot Command 12 Delete a card, using the cardBlock Database Mode Commands Commands 20 through Cipher Codes Related Commands Commands 15 throughConfiguration and Database Copy Commands Commands 41through System Configuration Settings Commands 91through User Level Specifications Operating Mode Access Control with Door MonitoringConfiguration Description Operating Mode Access Control and Alarm Panel Control Description Operating Mode Two-Door Access Control Operating Mode Supervisor Restricted Access ControlOperating Mode Output Toggle on Valid Access Operating Mode Access Control with Door Buzzer ControlRelay Contact Protection/Noise Suppression InstallationSpecification MaintenanceStrike Addendum Revision C

SR-10K, SR-10K Mag-Stripe Access System specifications

The Mercury SR-10K Mag-Stripe Access System is a cutting-edge access control solution designed for environments that require robust security and reliable performance. This system is well-suited for various applications, including commercial buildings, educational institutions, and industrial facilities. With its advanced technology and user-friendly design, the SR-10K provides a comprehensive security platform that streamlines access management.

One of the main features of the SR-10K is its compatibility with both magnetic stripe cards and ISO 7810-compliant cards. This flexibility allows organizations to implement existing card technologies without the need for extensive infrastructure changes. The system supports both single-door and multi-door configurations, making it adaptable to different facility requirements.

The SR-10K includes a powerful embedded controller that ensures efficient processing of access control transactions. This controller leverages smart technology to manage access rights and monitor activities in real-time, providing operators with immediate insights into system status. Additionally, it incorporates a user-friendly interface, allowing for straightforward programming and administration of the access control system.

Durability is a key characteristic of the SR-10K, as it is designed to withstand the rigors of everyday use in demanding environments. The system features weather-resistant components, making it suitable for both indoor and outdoor installations. This robustness contributes to the overall reliability of the security solution, reducing maintenance and operational costs over time.

The SR-10K also integrates seamlessly with existing security infrastructures, supporting various communication protocols such as Wiegand and RS-485. This connectivity allows organizations to enhance their security measures by integrating the access control system with surveillance cameras, alarms, and other security devices. The SR-10K can be easily scaled to accommodate future growth, ensuring that the system remains effective as security needs evolve.

In addition to its technical features, the SR-10K prioritizes user experience. The system offers intuitive software for system management, which simplifies the process of managing user profiles, access permissions, and activity logs. This accessibility ensures that security personnel can effectively monitor and respond to access events.

Overall, the Mercury SR-10K Mag-Stripe Access System stands out as a versatile and reliable access control solution. Its combination of advanced features, robust construction, and ease of use makes it an ideal choice for organizations seeking to enhance their security while maintaining operational efficiency.