3.4.3 Programming the Instruction Message – 1815 Systems

The instruction message scrolls across the screen from right to left when the system is not in use and follows the user message programmed in 3.4.2. The instruction message can be a maximum of 52 characters (spaces count as a character) and is entered into the system memory in three blocks. The first two blocks contain 20 characters while the third block contains 12 characters. The example below shows how the sample instruction message was divided into three blocks and programmed into the system. Use the blank matrix to organize your own message. Only upper case letters, numbers and spaces can be programmed from the system keypad.

Factory Default Instruction Message: Push A-Z To Find Name Or No. Enter Code Or Push Call

NOTE: The factory default instruction message was programmed from a PC, therefore upper and lower case letters, dashes (-) and periods (.) are allowed.

Example

PUSH A OR Z BUTTON TO FIND NAME ENTER CODE OR PUSH CALL

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 1

P

U

S

H

 

A

 

O

R

 

Z

 

T

O

 

F

I

N

D

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 2

N

A

M

E

 

E

N

T

E

R

 

C

O

D

E

 

O

R

 

P

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 3

U

S

H

 

C

A

L

L

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Block 3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

After organizing the instruction message in the matrix above, follow the instructions below to enter the message into the system. After each desired letter, number or space is displayed on the directory, remember to press * to enter that character. Spaces count as a character and must be entered into memory as a character. After a complete block has been entered, press * to enter the block, then start the next block.

1.Press *81 and enter the four-digit MASTER CODE _ _ _ _ (beep). The screen will display: BLOCK 1.

2.Enter the characters into block 1. Remember to press * (beep) after each character.

3.After the last character in block 1 has been entered, press * (beep) to enter the entire block. The screen will display: BLOCK 2.

4.Enter the characters into block 2. Remember to press * (beep) after each character.

5.After the last character in block 2 has been entered, press * (beep) to enter the entire block. The screen will display: BLOCK 3.

6.Enter the characters into block 3. Remember to press * (beep) after each character.

7.After the last character in block 3 has been entered, press * (beep) to enter the entire block.

8.Press * to enter all three blocks into the system memory.

9.Press 0# together to end this programming step (beeeeeep).

10.The new user message will begin to scroll across the screen

39

Page 39
Image 39
DKS Enterprises 1803PC, 1817 owner manual Programming the Instruction Message 1815 Systems

1815, 1803PC, 1817 specifications

DKS Enterprises has established itself as a leading provider of cutting-edge access control solutions, and among its notable offerings are the 1803PC, 1817, and 1815 models. These products stand out in the commercial security landscape, providing businesses with reliable and efficient entry management.

The DKS 1803PC is an advanced digital keyless entry system designed for commercial applications. Its primary feature is the easy-to-use keypad interface, which allows users to input their access codes directly. This model is equipped with a robust memory capable of storing up to 100 unique codes, making it suitable for locations with multiple users. Additionally, the 1803PC supports timed access, enabling businesses to set specific entry windows, which enhances security and access control.

The DKS 1817 model takes entry management a step further with its smart technology integration. It features Bluetooth capabilities that allow users to unlock doors via their smartphones, offering convenience and flexibility. The 1817 can be connected to various security devices, such as alarms and surveillance cameras, providing a comprehensive security ecosystem. It also includes a user-friendly mobile app that enables remote management of access permissions, ensuring that business owners can monitor and control entry points effectively from anywhere.

In contrast, the DKS 1815 model caters to businesses looking for a cost-effective yet reliable access solution. This model features a straightforward keypad interface similar to the 1803PC, but it is designed with essential functionalities to meet basic security needs. The 1815 supports up to 50 access codes and is ideal for smaller businesses or limited access areas. Its durable construction ensures longevity and requires minimal maintenance over time.

All three models employ DKS's proprietary technology that emphasizes durability and security. They are built to withstand harsh environmental conditions, making them suitable for both indoor and outdoor use. Each model adheres to stringent safety standards to protect against unauthorized access, ensuring the safety of personnel and assets.

In conclusion, DKS Enterprises' 1803PC, 1817, and 1815 models represent a diverse range of access control solutions tailored for various business needs. Their features focus on ease of use, advanced technology, and reliability, making them an excellent choice for organizations looking to enhance their security measures while streamlining access management.