
Military Time Conversion Chart
Standard Time | Military Time |
1:00 a.m.................................. | 0100 |
2:00 a.m.................................. | 0200 |
3:00 a.m.................................. | 0300 |
4:00 a.m.................................. | 0400 |
5:00 a.m.................................. | 0500 |
6:00 a.m.................................. | 0600 |
7:00 a.m.................................. | 0700 |
8:00 a.m.................................. | 0800 |
9:00 a.m.................................. | 0900 |
10:00 a.m................................ | 1000 |
11:00 a.m................................ | 1100 |
12:00 p.m. Noon ..................... | 1200 |
1:00 p.m. ................................ | 1300 |
2:00 p.m. ................................ | 1400 |
3:00 p.m. ................................ | 1500 |
4:00 p.m. ................................ | 1600 |
5:00 p.m. ................................ | 1700 |
6:00 p.m. ................................ | 1800 |
7:00 p.m. ................................ | 1900 |
8:00 p.m. ................................ | 2000 |
9:00 p.m. ................................ | 2100 |
10:00 p.m. .............................. | 2200 |
11:00 p.m. .............................. | 2300 |
12:00 a.m. Midnight ............... | 2400 |
Programming Category Maximum Quantities*
Category |
|
|
|
Valid Users | 64 | 160 | 320 |
Audit Trail | 64 | 832 | 1,600 |
Temporary Users | 32 | 64 | 64 |
Holidays | 16 | 24 | 32 |
Scheduled Events | 64 | 96 | 160 |
Denied Groups | 96 | 96 | 96 |
* Further upgrades available, consult factory.
Page 30
| Glossary |
Access code | Numeric or alphanumeric data which when correctly entered into a keypad, allows |
| authorized entry into a controlled area without causing an alarm condition. |
Access control | The control of persons, vehicles and materials through entrance and exit of a protected |
| area utilizing hardware systems specialized procedures to control and monitor the |
| movement into, out of or within the protected area. |
Audit trail | A historical record sequentially accounting for all activities with an access control |
| system. Such a record allows reconstruction and analysis of events during a given |
| time period. |
Card reader | A device that scans or reads encoded information in or on access control cards. |
ESD | Electro Static Discharge |
Fail safe lockset | A type of lock set that automatically unlocks when a power failure occurs. |
Fail secure lockset | A type of lock set that automatically locks when a power failure occurs. |
Infrared (IR) | Light waves that are too low frequency to be seen by the unaided human eye. |
Keypad | A device for inputting information into a computer controlled system for the purposes |
| of arming and disarming an alarm system or operating an access control system. |
Magnetic card | A type of access control card with a data encoded strip of magnetic material. |
Personal Identification This number can be a combination of digits and letters, increasing the
Number (PIN) overall number code possibilities.
Proximity card | A radio frequency based card technology that utilizes a microcircuit which when |
| present to a proximity reader, activates the cards circuitry, thus transmitting the data |
| stored in the card. |
Smart card | An identification card containing an integrated circuit allowing it to receive and store |
| data, which gives it limited microprocessor intelligence. |
Tailgating | In access control, tailgating is the act of one or more individuals entering a controlled |
| area by using a single card or code. Also known as piggybacking. |
User Identification | A unique number assigned to each user. The UID has a length 3 to 4 digits. The I.D. |
Number (UID) | number will show up in the audit trail showing that user’s history of events for that |
| lock. |
Terminator | The default setting for the lock has the “*” key acting as the terminator which |
| functions are similar to the “enter” key on a standard computer keyboard. |
Programming key | The lock default setting has the “# “ key as the programming key, note that the “#” key |
| is used during the initialization process for the lock GGM. |
Valid user code | A valid user code is a users’ UID and PIN number, the user must also have the correct |
| security level to complete the function desired. |
| Page 31 |