backpic
Product Ranges
IP Camera, Access Control, Intercoms, Building Automation
Contact Us
  • Identiv, Inc.

  • Country: United States of America
  • City: 1900 Carnegie Ave. 92705
  • Address: Santa Ana
  • Contact Person: Leigh Dow
 


Key Specifications
Wireless Intrusion Detection and Alarm System. Consists of a premises unit and a monitoring unit in separate ruggedized cases. The premises unit consists of a specially configured DIGI*TRAC M2N with currently shipping CCM firmware, AEB8, REB8, SNIB expansion cards and ScramblePad in ES1 stand with connector cable. Wireless transceivers and antennae are installed in the controller for network communications, pager communications, and sensor communications. Two wireless PIR motion detectors and two wireless door contacts are also included. The monitoring unit consists of an HTS7 notebook computer configured with Windows 7U64, Hirsch Velocity software, and a default database, factory installed & tested. A wireless transceiver and two pager units are also included. The RDK will support a maximum of 4 wireless sensors.


The DIGITRAC controller includes three expansion boards - one for network communications (SNIB), one for alarm inputs (AEB8), and one for relay outputs (REB8) to a pager system. Also, packaged in the expansion board stack is a wireless transceiver for the network communications to the notebook computer. The enclosure also contains wireless transmitters for communications to the sensors (wireless door contact and wireless PIR motion detector) and pagers. An uninterruptable power supply (UPS) is included which provides 4 hour backup power to all system components.


The network communications and the local pager antennae are screwed in place during deployment and are suitable for most applications.


A Hirsch ScramblePad is included with a prefabricated cable and connector that only has to be plugged into the side of the controller to become operational. The ScramblePad is used for arming and disarming the premises and provides local audible annunciation of the armed state.


The DIGITRAC controller is configured for 115VAC power with a removable USA cord and plug. A field conversion adaptor "plug" is provided to reconfigure the power supply for 230VAC. All the above equipment is packaged in a foam cushioned, hard sided case with wheels and extendable handle.


Monitoring site equipment includes a notebook computer, preloaded software, default database, and a transceiver for encrypted network communications to the DIGI*TRAC controller. In addition, two pagers are included to provide notification of alarm conditions to other personnel. This equipment comes in a lightweight, heavy-duty Pelican foam cushioned case with handle.


Encrypted Wireless Communications
Network communications are encrypted using Hirsch's 64 bit HEC encryption in addition to a Frequency Hopping Spread Spectrum (FHSS) technology originally developed for the US Department of Defense.


Typical Sequence of Operation
The RDK ships preconfigured for the following operation: Authorized personnel are assigned unique PIN codes for identification. They are also assigned common extension digits for common functions, such as arm and disarm. Upon commissioning, the system can be armed by entering a PIN number and arming extension digit onto the ScramblePad. This event is reported to the monitoring station and a 30 second timer is started. The individual has to pass through and close the door before the timer expires. When the timer expires, the ScramblePad will emit an audible tone (which can be heard outside the door) that indicates the system is armed. This, too, is reported to the monitoring station. When personnel reenter the secure area, an event is reported to the monitoring station and the individual has 30 seconds to enter a PIN code and disarm extension digit on the ScramblePad. If the disarm code is not entered in time, an alarm will be sent to the monitoring station and pagers. Individual sensors can be masked to provide perimeter protection even when the room is occupied.


Alarm & Event Monitoring
From the Alarm Viewer, an operator can acknowledge and silence an alarm. Each alarm in the Alarm Viewer will have an indication of the type of alarm, priority level, time/date, and current condition. Once acknowledged, the alarm can be cleared


Real-time event monitoring is available from the Event Viewer. The Event Viewer has columns for Date and Time, and a Description of the Event.


Every alarm and event is logged to disk for permanent storage or retrieval in reports. There are many standard reports with options for sorting and searching by date and time.

Hirsch Identive RDK Rapid Deployment Kit
Other Products
uTrust TS Premises Readers
uTrust MX Controller
uTrust SmartID 80K Smart Card with 125 kHz Proximity
Identive HIRSCH M8N Controller
Identive CLOUD 2700 F Contact Smart Card Reader
Identive CLOUD 2700 R Contact Smart Card Reader
Identive HIRSCH Mx Controller
1 of 4
https://www.asmag.com/project/resource/index.aspx?aid=16&t=secutech-made-in-taiwan-products-and-solutions