HT28 Technical Manual - Release 10-2002 - en
HT28 Technical Manual - Release 10-2002 - en
HT28 Technical Manual - Release 10-2002 - en
Release, 10/2002
Contents
Hardware.....................................................................................................1
Communications Windows Distributor H2XCMDIW.........................................................1
Description.............................................................................................................1
Connections............................................................................................................1
Specifications.........................................................................................................2
Special Windows Distributor Uses........................................................................2
Portable Programmer............................................................................................................3
Description.............................................................................................................3
Connections............................................................................................................4
Maintenance...........................................................................................................4
Specifications.........................................................................................................5
Gemplus GemPC410 – External Smart Card Encoder.........................................................5
Description.............................................................................................................5
Connections............................................................................................................5
Specifications.........................................................................................................6
Online Revalidator................................................................................................................6
Description.............................................................................................................6
Connections............................................................................................................6
Specifications.........................................................................................................7
HTCOMBO Safe..................................................................................................................8
Operation................................................................................................................8
HT28 Lockset..............................................................................................9
Description...........................................................................................................................9
Light Indications.................................................................................................................10
Lock States.........................................................................................................................10
Office Mode.........................................................................................................10
Standard Mode.....................................................................................................10
Privacy Mode.......................................................................................................10
Modes of Operation............................................................................................................11
Normal Guest Room Mode..................................................................................11
Foyer ...................................................................................................................11
Selective ..............................................................................................................11
Maintenance.......................................................................................................................11
Diagnosis..............................................................................................................11
Debris in the Reader.............................................................................................11
Cleaning the Reader.............................................................................................11
Cleaning the Lock Body......................................................................................12
Specifications.....................................................................................................................12
Contents •
i
System Limits.....................................................................................................................16
Creating Locking Plans......................................................................................................17
General.................................................................................................................18
Configuration.......................................................................................................18
Lock Hardware Configuration.............................................................................23
Calendar...............................................................................................................24
Time Tables..........................................................................................................25
Masters.................................................................................................................26
Locks....................................................................................................................27
Keying .................................................................................................................30
Peripherals............................................................................................................33
Cards....................................................................................................................35
Flags.....................................................................................................................37
PMS Interface.....................................................................................................................41
TCP/IP..................................................................................................................41
HTCOM Device Communication.......................................................................................41
IPCOM Device Communication........................................................................................41
Software Tools....................................................................................................................42
Data Menu – Restore Tables................................................................................42
Data Menu – Test Database Integrity..................................................................42
Data Menu – Pack Tables....................................................................................42
Restore Codes......................................................................................................43
Restore Backup....................................................................................................43
Load HT22...........................................................................................................43
Parameters for Special Configurations...............................................................................44
/D directory name.................................................................................................44
/Snumber..............................................................................................................44
/NOVERIFY........................................................................................................44
/REVALIDATOR................................................................................................44
/NOREVAL.........................................................................................................44
Contents •
ii
Hardware
Description
The H2XCMDIW Win Dist is used to convert standard RS232
(19200 baud) from a PC to the proprietary Onity HTCOM RS485
network of devices.
The unit is powered by an external 12VDC transformer and has
three (3) LED indicators. The LED labeled POWER is lit
whenever the unit is powered. The LED labeled IN flashes when
a packet of information is received from the PC. The LED
labeled OUT flashes whenever an HTCOM packet is received
from a Onity device.
Connections
Hardware •
1
1. 12VDC Power Input 6. DB9F HTCOM connector for PP
cable
2. DB9M RS232 input from PC 7. HTCOM indicator
3. Terminal connector for repeater 8. RS232 indicator
4. DB9F HTCOM cable connector 9. Power indicator
5. Terminal connector for wall
readers, etc.
To the PC
The PC is connected to the rear of the Communications
Distributor using a standard NULL Modem cable. Unlike previous
Onity communications distributors, the Windows distributor
communicates at 19200 baud using standard RS232. This
connection is usually to the PC, but we can use the standard
protocol to our advantage to use other devices to extend the
HTCOM network in ways that were never possible before.
Specifications
Display: Three (3) red LED’s.
Case Material: Black ABS.
Dimensions: 2" x 6" x 6 1/4".
Weight: 1.0 lb.
Operating Voltage:12 volts DC.
Hardware
•2
There are many devices on the market today to convert RS232
to Ethernet. This means that a string of Onity encoders can be
placed at a remote check-in point using an existing LAN or WAN.
This solution is an expensive one, but is solves a problem that
previously could not be solved.
The diagram below is a real example of using protocol
conversion to accomplish a networking challenge. In this
example, the property had two buildings separated by a great
distance and the only existing link between buildings was over
fiber optic cable. The Onity server was connected to the PMS
server in the computer room. A local encoder is connected to
encode master cards. The other encoders are at the front desk
in another building. The property had the necessary equipment
to transfer RS232 over the fiber, so Onity simply used the
existing equipment.
Portable Programmer
Description
The Onity Portable Programmer is used to transfer data
between the main computer and the electronic locks.
Hardware •
3
1. Connection to Onity Locks
2. Connection to PC
Connections
To the Lock
Connect the Portable Programmer (PP) to a lock or offline reader
by inserting the PP plug into the jack on the bottom of the lock
or reader. Turn the programmer on, and use the menu button to
select an option. If required, use the cursors to select the proper
door information from the list, and press the TX key to initiate
communications.
To the Computer
Connect the Portable Programmer (PP) to the computer
using the 9-pin connector on the top of the PP and a standard
Onity HTCOM cable. This cable may be plugged directly into the
PP connector on the front of the Onity Communications
Distributor.
Maintenance
The only maintenance required on the Portable Programmer is
changing the batteries when they are low.
The PP uses four (4) AA alkaline batteries. The batteries will last
for 50 hours of operation. To extend battery life, the PP will
Hardware
•4
automatically turn itself off after 30 seconds of inactivity. When
the batteries are removed from the PP, the PP will lose all of the
information recorded in its memory. Simply reload the PP from
the computer to begin normal operation.
The battery compartment is located on the back of the PP. Slide
the battery cover up to expose the batteries for maintenance.
Be sure to insert the batteries in the correct polarity. Polarity
markings can be found at each battery position.
Specifications
User Interface: Membrane keypad.
Display: 2 x 16 character LCD.
Case Material: Black ABS.
Dimensions: 7-1/2” x 4” x 1-7/8”.
Weight: .70 lb. without batteries; .92 lb. with
batteries.
Operating Voltage: 6VDC supplied by 4 AA Alkaline
batteries.
Memory Capacity: 128K RAM available for storage of data.
Description
The Gemplus GemPC410 External smart card Encoder is used to
read and write information to the smart cards used in the Onity
HT28 Smart System.
The green LED on the top of the unit is the only indication used
by the GEMPC410. The LED flashes every second when
powered and is lit continually until the card is removed after a
read/write operation.
Connections
The GemPC410 encoder is connected to the PC/PMS - RS232
connector on the rear of an HT22i encoder. The encoder
controls the Onity HTCOM communication with the PC and
monitors the status of the Gemplus encoder.
A 5VDC power connection is required to operate the GemPC410
encoder. It has a PS/2 connector for this purpose.
Hardware •
5
Specifications
Online Revalidator
Description
The Online Revalidator provides a way to securely manage staff
cards. Each staff card holder can be required to "recharge" his
or her key at a management defined interval by using the
Online Revalidator. The Online Revalidator comes in either a
Magnetic Stripe version or a Smart Card version.
Connections
The operating component of the Online Revalidator is an HT22i
encoder. This encoder will either have the magnetic stripe card
reader/writer or be modified to hold a Gemplus GEMPC410
smart card reader/writer. Regardless of the type of encoding
device, the connections to the HTCOM network are the same.
This HTCOM connection is made by connecting 18/2 Shielded
Cable to the AB connection of the HT22i. (See #2 in diagram
below). This cable may need to be Plenum rated as well. Power
is supplied by a 12VDC 1.2A power transformer. If using the
smart card version, a separate 5VDC 1A power transformer
must be added to power the smart reader/writer. This is
connected in the same way the Gemplus External Smart Card
Encoder power connection is made. (See previous section.) The
Gemplus Smart Card DB9 connection is made to #3 in the
diagram below.
Hardware
•6
1. Not Used With This System 6. On/Off Switch
2. HTCOM Connection – AB Format 7. Not Used With This System
3. RS232 Connection 8. HTCOM Connection
4. 12VDC Power Input 9. HTCOM Connection
5. Strain Relief
Specifications
Display: 7x20 character LCD
Case Material: Aluminum and Steel
Dimensions: 14-5/16" x 9-9/16" x 4-1/2" - Surface
Mounted
14-5/16" x 9-9/16" x 3-13/16" – Flush
Mounted
Weight: 12.4 lb. Surface Mounted; 9.4 lb.
Flush Mounted
Operating Voltage:12VDC HT22i and 5VDC Gemplus Smart
Card Encoder
Hardware •
7
HTCOMBO Safe
The Onity HTCOMBO guest room safe is designed to provide in
room storage of guest valuables. The safe is designed to resist
forced entry attacks using common hand tools. It is operated by a
user selectable 4 digit code entered by each new user of the safe.
Operation
Upon arrival at the hotel the guest receives a new room key. This
key may contain an optional authorization that may be required to
operate the safe. Upon arrival to the room the guest opens the
door as usual. To operate the safe the guest inserts the room key
into the safe reader. (The safe MUST be unlocked). Upon insertion
of the card both the green and red LED’s illuminate. The guest
should enter any random 4 digit code number. Both LED’s will
flash rapidly for 1 second, then go out. The guest should close the
door and enter the code again to confirm the code and lock the
safe. To unlock the safe again, enter the code number. The guest
card is not used to operate the safe; it is only used to program the
code number for a new guest. Instructions for using the safe are
provided in the form of a large cardboard card suitable for wall
mounting and a decal affixed to the outside of the door of the safe.
The card is provided in English, French, Spanish, and German.
Should the guest arrive in the room and discover that the safe is
locked, the guest card will not operate the safe. Under these
conditions, the safe must be opened by management using either
the safe master card or the Portable Programmer.
Hardware
•8
HT28 Lockset
Description
The Onity HT28 lock is stand-alone dual technology lock that
can read smart cards and high or low coercivity magnetic stripe
cards. The lock can open to as many as 250 different cards
identifying each card individually in a 500 record audit trail.
HT28 Lockset •
9
Light Indications
To operate the guestroom lock, insert and remove the card. The
LEDs located to the immediate left of the card slot will display one of
the following indications:
• Green Light – Valid Opening. Operate the handle to gain
access to
the room.
Note: For Smart Cards, if the lock is configured not to
open until the card is removed, the lock will read the
card and the green light will blink slowly until the card
is removed.
• Red Light – Invalid Attempt. Card may have expired, been
voided by a new guest card, or may be for a different room.
• Alternating Red and Green Lights – Privacy indication or card
out of shift.
• Flashing Red Light – Blocked.
• Flashing Green Light – Office Mode.
• Delayed Red Light (Illuminates six seconds after card
insertion) – Card not encoded or incorrectly inserted.
• Green Light with Flashing Red Light – Low battery indication.
• Flashing Green and Red Lights – This is the indication when
using a canceling card.
Lock States
Office Mode
The lock can enter Office Mode (free passage – no card
required) automatically at scheduled times or by inserting an
authorized card twice in immediate succession. The act of
inserting the card twice is known as ‘double dipping’. When the
card is removed from the lock following the second insertion the
green light will flash indicating the mode change.
The lock will remain in this mode until it is double dipped by
another authorized card, or it is scheduled to automatically re-
lock.
Standard Mode
This is the normal operation of the lock. An authorized card that
is not yet expired and is within its shift can unlock the door.
Privacy Mode
If the privacy indicator on the inside of the lock is activated,
only certain cards with a special ‘Privacy Override’ attribute can
unlock the door. Cards without this attribute will invoke an
alternating green and red light as described in the previous
section.
Foyer
A foyer lock does not keep an audit trail or card codes. To gain
access, the card must have the proper site code, any applicable
authorization, and within the activation and expiration date.
Selective
The selective lock is a combination of corridor and back-of-
house locks found in HT24DOS systems. Essentially, a selective
lock is a freely keyable lock that can accept as many as 250
users with an audit trail, or 500 users without. Guest room keys
and staff cards can be set to have access in the locking plan. To
gain access, the card must have the proper site code, the
correct card code, any applicable authorization, within the
activation and expiration date.
Note: You can encode cards and make copies and one-shot
cards for a selective lock.
Maintenance
Diagnosis
The TEST function of the portable programmer should be used
to properly diagnose any Onity lock. This test will check the
functionality of the privacy and card detection switches and the
battery level. If an invalid card is inserted, the PP will display
the reason for the denial.
HT28 Lockset •
11
card contacts in the lock to read poorly. In extreme cases, there
can be a noticeable loss in performance. The problem can
easily be solved by using ‘reader cleaning cards.’ Cleaning the
readers once or twice per year will prevent this build up in most
cases.
Specifications
Display: One (1) green LED, One (1) red LED
Dimensions: 11-1/8” x 2-3/4” x 2”
Weight: 6.5 lb.
Operating Voltage: 6VDC supplied by 4 AA Alkaline
batteries.
Operating Temperature: -40° - 167 ° F
Humidity: Up to 95% without condensation
General Description
HT24W / HT28 Smart is the first Windows based hotel
management software from Onity. The features of the system
are largely the same as HT24DOS with a few additions made
possible by the power of modern software and hardware. This
manual will not assume any prior knowledge of the HT24DOS
system.
HT28 Smart can be used with HT24 locks and magnetic cards or
the new HT28 locks which can read magnetic and a variety of
smart cards.
…\Onity\HT28\
• HT28.exe – this is the primary executable file for
the software. This program includes the user
software and the system build/modification
software.
• Tools.exe – this executable provides tools that
can diagnose and fix corrupted files.
• _isreg32.dll – this library is used by HT28.exe
• tutil32.dll – this library provides utilities
specifically for the software to operate with other
Onity equipment.
• HT28.bmp – This bitmap file is displayed while the
software loads and checks the status of the
database tables.
• Mensa.db/px – this database contains all of the
messages displayed in the program. Includes any
loaded languages.
• Ht28.cnt – this file is the contents of the on-line
help system.
• Ht28.hlp – this on-line help file contains all of the
information provided in the users manual.
• _deisreg.isr – required file used by Delphi
• DeIsL1.isu – required file used by Delphi
• Messages.xx – this file is a plain text file that
contains all of the messages displayed in the
software. One of these files is required for each
language used. The file extension is used to
identify the language.
• Returns.txt, Support.txt, Sales.txt – this is a plain
text file used by the English on-line help file that
provides the proper contact information for the
end user. This file must be changed to reflect the
proper contact information for the customer.
…\Onity\HT28\LocalDir\
The localdir folder contains information about the PC that is
used in network systems. This information is used by the local
PC and the server to keep control of the database tables when
there are multiple users. Do not try to manipulate these
files – in doing so you could cause irreparable damage to the
Onity databases.
System Limits
The following is a list of limits of the HT24W / HT28 Smart
system and the HT28 locks.
Audits (HT28 500/00 With 250 users or less, the HT28 can
lock) store 500 audits. With over 250 users
no audits are stored.
Audits (HT24 100 With 15 users, 15 audits with 100
lock) users
Authorizations 8 Used to access amenities such as
concierge floors, pool, elevators, etc.
These amenities require the
authorization to be encoded on the
card, in addition, the card must be
authorized and within the activation
and expiration period.
Automatic Yes 8 automatic changes per day
Lock/Unlock
Day Types 3 Automatic changes and shifts can be
set to behave differently according to
3 day types.
Daylight Yes HT24 and HT28 locks will
Savings Time automatically adjust to one DST
change. The lock must be loaded 2
times each year to maintain the
correct date of the next DST change.
Dial Up Support Yes Through pcAnywhere
Encoded Track 1,2,3 Locks read track 3. Motorized
encoders can encode tracks 1 and 2
General
In the HT24W / HT28 Smart System, locking plan and other
modifications are accomplished through a built-in, hidden area
of the software. This hidden area is only accessible with a level
9 password or the maintenance password – the MODIfication
menu opens this portion of the software. The level 9 password
does not have complete access to all data, such as site code,
but is allowed to make general locking plan changes.
Because of the ability to completely change the system, any
and all PC workstations must be out of the software in order to
enter the MODIfications menu. If workstations are running the
software and a user tries to enter the MODIfications menu, a
message will appear stating that the databases could not be
opened in exclusive mode.
The modification screen is menu driven in a fashion similar to
MODI2 for HT24DOS systems. Some screens have multiple
views which can be accessed through a tabbed form. Each view
will be discussed thoroughly below.
Configuration
The configuration screen is where the most basic information is
entered. This information includes such data as the site name,
site code, authorization labels, emphasized authorization
assignments, etc. This screen is divided into 3 tabs, general
,options and technologies.
Options Tab
Check the box for any card technology that will be used in the
system. If you select the Chip option there are some important
details that must be set on the Cards menu. The Cards menu
does not appear if the system is mag-stripe only.
The master cards list contains all of the master types that are
available. A property can set up many master users that all use
the same type. Master types can be set so that a certain
minimum password level is required to encode a card.
Each master type has a unique code that the lock must
remember, and each card of that type is encoded with that
code. An HT28 lock can hold codes for up to 250 master types
in memory. HT24 locks can hold codes for only 15 master types
in memory. (see “System Limits” on page 16)
Related Locks
To enter the keying plan for a room, highlight a room in the list
and click Modify. You can select any room that appears in the
selection screen. Red rooms are selected to have access to the
room. To select a group of rooms, hold the left mouse button
down and drag the mouse – then press the SPACE bar.
The list on the right of the main keying screen shows all of the
rooms allowed trough this lock and the room total.
Remember that locks cannot have more cards selected
than the setting on the Configurations screen.
With the successive feature, you can easily copy the keying
from one lock to another. All masters in the 'Copy' list will be
copied. To remove a master from the 'Copy' list, highlight it and
press the DELETE key. In the example above, EK, FM1, GM, and
MM will all be ADDED to any existing keying for rooms 101-138.
The existing keying for these rooms will not change.
Selective
Cards
The cards menu is only available if chip cards are selected in
the Technologies Tab. This screen is used to define smart card
operating parameters for guest cards, master cards, and special
cards.
Card Technology
The card technology tab is used to select the type of card used
for guests, masters and special cards such as blocking and
programming cards. There are three tabs at the bottom of the
screen to make selections for each card type.
Any technologies selected on the Configuration screen
Technology tab are available on this screen. If you want the
software to ask which card technology you would like to use
each time you encode a card, select the last option 'Before
Encode'. The default type is the one selected in the drop down
list.
Also, each type of card can be programmed to recover
information from the locks. If the box on the right of the screen
is checked, the smart cards will recover the information.
However, you may be using smart cards for guests and you do
not wish to recover audits. In this case, do not check the box.
Flags
AUDITOR= x
x = number of days to keep audits
Example: AUDITOR=7
audits more than 1 week old will be deleted
AUTOBACKUP= x
x = path to backup directory
Example: AUTOBACKUP=C:\Onity\BACKUP\
BACKUPTIME= x
x = time (hour) of the backup in 24 hour format. There can be
several instances of this line.
Example: BACKUPTIME=2
BACKUPTIME=8
BACKUPTIME=14
BACKUPTIME=20
GROUPJUMP= x
x = the number of codes a group card will be ahead of the
current card code. The number must be between 1 and 250.
The default is one half of the guest code lookahead.
MASTERCOPY
Allows the hotel to encode multiple copies of master cards
MULTIMASTER
Allows the hotel to switch the locks between 3 master keying
schemes, A, B, and C.
NOPADTRACK
Instructs HT24W / HT28 Smart not to pad tracks 1 & 2 with
insignificant characters after the encoded information. By
default, the software will fill the track.
NUMSPARE= x
Spare cards can be made in batches of identical cards so guests
can have more than one card. The number x can be from 1 to
9.
Example: NUMSPARES=3
PINPADSAFE, x
x = the number of hours a Safe Master card is valid. The Safe
Master card can be used in conjunction with the guest room key
to open PIN pad safes. The default is 3 hours.
Example: PINPADSAFE,1
PINPP
Requires the hotel to enter a PIN for the PP when it is loaded.
PMS
Enables PMS communication
PMSBUFFER
If an encoder is busy and a new task is requested, this option
activates a buffer so the tasks will be sent to the encoder after
the previous task is finished.
The maximum number of buffered messages is 4.
After the 4th message is buffered a OV (overflow) error
message will be sent to the PMS.
Note: Requires display encoder.
PMSFILE
Enables a record of all PMS transactions called AuditPMS.ht2
PPDAYS= x
x = the number of days the PP will retain its data. After this
period of time, the PP can not be used except to TEST.
REPEAT
Instructs HT24W / HT28 Smart to automatically repeat PMS
commands if there is an encoding error.
Use this option when connected to a PMS that does not handle
error messages.
Note: Requires display encoder.
SEPARATOR= x
x = a number from 33 to 254 indicating the ASCII value of the
character that separates PMS fields. The default is x = 179.
TRACK1= x
x = 1: allows users to place any valid information on track 1 --
default = none
x = 2: allows users to place any valid information on track 1 --
default = pre-defined information
x = 3: allows pre-defined information only on track 1
Pre-defined information defined below:
ROOM NUMBER (padded with insignificant characters up to 7
characters)
AUTHORIZATIONS
EXPIRATION DATE (YYMMDDHH)
Note: The rest of the magnetic stripe is padded with
insignificant characters until the end.
Note: If the MICROS command is in the file, the pre-defined
information follows the Micros format.
TRACK2= x
x = 1: allows users to place any valid information on track 2 --
default = none
x = 2: allows users to place any valid information on track 2 --
default = pre-defined information
x = 3: allows pre-defined information only on track 2
Pre-defined information defined below:
ROOM NUMBER (padded with insignificant characters up to 7
characters)
AUTHORIZATIONS
EXPIRATION DATE (YYMMDDHH)
Note: The rest of the magnetic stripe is padded with
insignificant characters until the end.
Note: If the MICROS command is in the file, the pre-defined
information follows the Micros format.
TCP/IP
TCP/IP is a standard Ethernet packet transfer protocol. Like
RS232 serial communications, TCP/IP uses ports. However, for
TCP/IP, ports are simply addresses identifying the sender and
the receiver of the data packets.
Some ports are reserved and should not be used. For example,
port 80 is reserved for FTP transfers. In general, any port
greater than 6000 should be available. HT24W / HT28 Smart
defaults to port 6669. This is the port the software is 'listening'
on. The PMS must know this port number in order to connect.
Software Tools
When HT24W / HT28 Smart is properly installed, TOOLS.EXE is
also installed. Tools is used to diagnose and repair problems
with locking plan databases.
Restore Codes
This option will recover the current codes from a motorized
encoder. This may be useful if you need to rebuild the system
after a catastrophic failure of the main Onity server and there is
no recent backup of the files. This step is also done
automatically when recovering from a backup.
Restore Backup
If the server suffers a catastrophic failure of the hard drive or
the data, the system can be recovered from a backup copy of
the files. Tools will check the integrity of the backup and rebuild
the files. Some data may be lost – depending on what has
happened since the last backup was made.
Load HT22
Tools can load hex files into an HT22I encoder. This is much
faster than loading with the DOS HT21.exe software. The HT22
must be connected to the same serial port that the HTCOM
network is on using a 9 pin null modem cable. This is the same
cable used to connect the PC and the Windows Communications
Distributor.
/D directory name
This parameter addresses the path to the database of the
selected folder. If ommited, the database will consider the data
local directory in the same directory where the HT28.EXE is.
/Snumber
This parameter defines a PC in a network. If ommited, this PC
will be considered as PC station number 1 (main computer).
Obviously in an HT28 network only one PC can be ommmited.
/NOVERIFY
It makes the PC to do not check the database integrity. This way
the loading is faster. It is not recommended to use this
parameter eventhough it can be usefull in cases as demos or in
slave PCs where the master has already checked the database
intergrity.
/REVALIDATOR
This parameter will make the PC to behave exclusively as a
revalidator. In this case the parameter /S will be requiered.
/NOREVAL
This parameter disables the posibility of revalidating cards from
the PC; revalidation can be performed from the other
revalidators of the installation (if there are any).
Note: It is very Example of a network with 3 PCs (PC1 with the name MASTER is the
important for all server):
networked computers
PC1: C:\Onity\HT28\HT28.EXE /D \\MASTER\DATA /NOREVAL
to have the same /D
path. PC2: C:\Onity\HT28\HT28.EXE /D \\MASTER\DATA /S2
PC3: C:\Onity\HT28\HT28.EXE /D \\MASTER\DATA /S3 /REVALIDATOR